Please turn on your JavaScript for this page to function normally.
architecture
Hybrid IAM: Addressing the security and experience issues caused by hybrid IT

More than 80% of global IT decision-makers have already adopted, or plan to adopt or expand, cloud-based identity and access management (IAM) initiatives over the next two …

fill online form
93% of consumers concerned about data security when filling out online forms

Source Defense provides in-depth analysis of the client-side threat landscape and specific attacks like formjacking, Magecart and web browser threats. The research offers a …

work from home
How well have remote workers adapted one year on?

Remote workers are still struggling with distracting working environments, stress and an ‘always-on’ culture after a year of working from home, an Egress research has …

zero trust
The importance of a zero trust-based approach to identity security

97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials, a CyberArk survey reveals. As organizations move …

user
As DX acceleration continues, identity and zero trust need to be central in all business decisions

The pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and zero trust security, …

70% of organizations recognize the importance of secure coding practices

A research from Secure Code Warrior has revealed an attitudinal shift in the software development industry, with organizations bucking traditional practices for DevOps and …

Financial services and insurance faring better than most in the pandemic year

While 2020 was one of the most challenging years for every business, those in financial services and insurance have fared better than most. This is the conclusion of a deeper …

find
Challenges and benefits of using threat data feeds

Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …

hands
Distributed and remote work creating a perfect storm for network security teams

Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …

network
Continued WAN and application growth resulting in network complexity

The WAN continues to extend its growth, with the number of enterprises connecting to over 100 inter-regional sites growing by 50%, from 19% in 2020 to 28% in 2021, according …

brain
61% of businesses say competitive intelligence has made a direct impact on revenue

61% of businesses say competitive intelligence has made a direct impact on revenue — a 17% increase over last year’s figure of 52%, a Crayon report reveals. Competitive …

identity theft
Remote workers admit to playing a significant part in increasing their company’s cybersecurity risks

The COVID-19 generation of remote workers are admitting to playing a significant part in increasing the cybersecurity risks facing their companies. An Opinium research shows …

Don't miss

Cybersecurity news