
Why is a well thought-out approach to cloud migration imperative?
The big move to the cloud is bringing as many challenges as opportunities, a database monitoring survey from Redgate has found. With 80% of organizations now using a mix of …

When done right, network segmentation brings rewards
96% of organizations claim to be implementing segmentation in their networks, yet only 2% of those organizations are segmenting all six mission-critical asset classes, …

Online shopping at risk: Mobile application and API cyber attacks at critical high
Protecting mobile applications and APIs against automated threats is a top priority for online commerce businesses, according to data from a study published by DataDome. …

Security priorities are geared toward ongoing remote and hybrid work
Nearly two years into the pandemic, SME IT admins report they’re considered an important voice in company operations and fewer are feeling overwhelmed despite facing continued …

How organizations analyze data to source insights that inform business decisions
ChaosSearch shared key findings from a survey of 1,020 U.S. IT professionals on data retention, data usage, and investments in data lake and cloud data platforms. The findings …

How C-suite executives perceive their organizations’ readiness for ransomware attacks
A new (ISC)² study provides insights for cybersecurity professionals into the minds of C-suite executives and how they perceive their organisations’ readiness for ransomware …

How worried should organizations be about their phishing click rate?
Overall end user click rates remained high in the face of this year’s phishing simulation, a Terranova Security report reveals. It also details the rise in the number of …

Why is trust in legacy vendors on shaky ground?
A Vanson Bourne survey report highlights ransomware payout demands and extortion fees are massively increasing, while trust in legacy IT vendors has dipped and organizations …

30% of online users suffered security breaches due to weak passwords
A GoodFirms survey outlines the current password behavior of online users, risk factors associated with password management, and the best measures, policies, and practices to …

Seller-related fraud threatens long-term customer retention
Socure unveiled its survey, providing a stark warning for e-commerce platforms and marketplaces that consumers have zero tolerance for seller-related identity fraud and won’t …

Burned out workers are less likely to follow security guidelines
Workers in every industry are increasingly burned out, leading to apathy and a lower guard toward workplace security. To understand this burnout phenomenon, 1Password released …

Top practices to improve enterprise security
Cisco released its latest cybersecurity report, surveying more than 5,100 security and privacy professionals across 27 markets to determine the most impactful measures teams …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation