Please turn on your JavaScript for this page to function normally.
lock
Digital life after death: Do you have a password-sharing plan in place?

COVID-19 triggered many American Millennials to finally begin estate planning, according to new research, which found 72% of those respondents with wills created or updated …

PKI
Lack of resources and skills continues to challenge PKI deployment

Driven by organizational changes, enterprise use of Public Key Infrastructure (PKI) and digital certificates has never been higher, while the related skills to manage PKI are …

architecture
As technology pervades, CIOs’ influence on business strategy grows

An IBM Institute for Business Value (IBV) study revealed CIOs’ influence on business strategy and operations is growing as technology pervades surveyed enterprises. When …

DDoS
DDoS attacks were a more serious threat in Q3 2021 than ever before

Link11 has released new data from its network on the development of the DDoS threat: The number of attacks remains at a very high level in Q3 2021. After Q2 2021 had already …

fight
Are you less capable of innovation or more vulnerable to threats than you thought?

A Syntax research shows a critical reality check on perception versus reality among IT and finance decision-makers when it comes to enterprise innovation, whether it is …

ransomware
Organizations believe they are ready for ransomware attacks

Over the past year there has been a dramatic rise in ransomware attacks, and while all organizations are a target, large enterprises are bearing the brunt – experiencing …

hands
As the move to the cloud accelerates, data privacy and security remain critical

Organizations are increasingly adopting multiple cloud technologies to keep up with the scale, speed, and use cases required by modern data teams. 65% of respondents …

cloud money
Cloud adoption growing steadily, but cost and regulatory challenges remain

O’Reilly announced the findings of a survey report which explores the latest trends in cloud, microservices, distributed application development, and other critical …

insider threat
80% of organizations experienced employees misusing and abusing access to business apps

Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats …

People
Younger generations care little about cybersecurity

SailPoint released a survey which aimed to identify gaps within organizations’ cybersecurity postures by analyzing workforce behaviors that blur work and personal lives, …

architecture
Security teams need to become more proactive and risk-driven

83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other …

businessman
Organizations seldom prioritize cybersecurity over business outcomes

55% of large companies are not effectively stopping cyberattacks, finding and fixing breaches quickly, or reducing the impact of breaches, according to a research study from …

Don't miss

Cybersecurity news