Vanson Bourne

Organizations must reevaluate IT investments to advance their digital transformation
Organizations know that having the right IT in place and leveraging a cloud-first and data-centric mentality is essential in today’s digital economy. However, to advance their …

Move to all-flash object storage to occur within five years
Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry …

SMBs willing to spend more money to protect their data
Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by Vanson Bourne. The report found that organizations are challenged to find a MSP …

Organizations have seen an increase in device encryption
32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …

Top application security challenges: Bad bots, broken APIs, and supply chain attacks
Vanson Bourne surveyed 750 application security decision makers responsible for their organization’s application development and security to get their perspectives on data …

Enterprises increasingly relying on open source software
Enterprises have a deep appreciation for the value of open source software with 100% of the information technology (IT) decision-makers in a recent survey saying that “using …

Lack of IT-OT collaboration holding back smart factory security projects
61% of manufacturers have experienced cybersecurity incidents in their smart factories and are struggling to deploy the technology needed to effectively manage cyber risk, …

IT teams failing to deliver a positive remote employee experience
Conducted during the coronavirus pandemic, 1E unveils the findings of an analysis of the remote employee experience and the digital workplace in 2020. Vanson Bourne and 1E …

The impact of SD-WAN for securing public cloud adoption
While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats …

How do industry verticals shape IAM priorities?
IAM priorities differ by industry vertical, and a one-size-fits-all approach to IAM doesn’t work when every industry and business within that industry is unique, according to …

The true costs incurred by businesses for technology downtime
Technology downtime is becoming a huge issue. IT challenges and poor digital work experiences are costing businesses tens of millions of dollars in lost work time and that the …

Only 11% of organizations can detect intruders in under one minute
The process of detecting, triaging, investigating, and containing a cyber incident takes organizations globally on average nearly seven days of working around the clock …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility