
The impact of API security on how consumers view brands
ThreatX released the results of a survey which highlights the risk of API attacks on the consumer experience. Nearly every software application and mobile application uses, or …

How Log4Shell remediation interfered with organizations’ cybersecurity readiness
(ISC)² published the results of an online poll examining the Log4j vulnerability and the human impact of the efforts to remediate it. Cybersecurity professionals from around …

How to keep pace with rising data protection demands
The disconnect between business expectations and IT’s ability to deliver has never been more impactful, according to a Veeam report, which found that 89% of organizations are …

Multi-tool/multi-cloud environments reaching the limit of their efficacy
CloudBolt Software released its latest research report, examining industry sentiment in specific dimensions of hybrid cloud/multi-cloud, and aiming to uncover unmet cloud …

Consumers don’t mind handing out their data for better user experience
In a global consumer survey, Axway finds that almost 60% of people believe it’s worth allowing companies to access their personal data if it means a better user …

What do consumers really think about privacy?
Merkle has released a report which has historically reported on the marketing leader’s point of view, but this time turns its focus to consumers, revealing their sentiments …

83% of employees continue accessing old employer’s accounts
In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to …

Visibility is key to optimized cloud infrastructure costs
ESG surveyed IT, DevOps, and AppDev professionals responsible for evaluating, purchasing, managing, and building application infrastructure. Out of 357 professionals, 64% …

Software supply chain security still a pain point
ActiveState announced the results of its survey, providing insights into the security challenges of the software industry’s open source supply chain, which includes the …

Is higher security a benefit of database migration to the cloud?
MariaDB announced key findings from its survey that shows no one’s staying behind as businesses move forward with database migration to the cloud. Those surveyed included IT …

The importance of implementing a zero trust strategy
Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce …

Soaring losses accelerate investments in anti-fraud tech
The pandemic has opened a Pandora’s box of global fraud. Faced with a seemingly endless onslaught of schemes and scams, anti-fraud pros have doubled down on analytics, …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation