Please turn on your JavaScript for this page to function normally.
cloud
Cloud technology adoption gap between internal audit and other enterprise functions to narrow

Internal audit’s ongoing digital transformation will rapidly accelerate in 2021, with 22% of respondents reporting that they will implement cloud-based technology this year, …

user
3 steps to meeting data privacy regulation compliance through identity programs

Cybersecurity is undeniably a business-critical function. That’s only been reinforced over the past few months by the SolarWinds and Exchange attacks. Consequently, a recent …

biohazard
Nearly 40% of new ransomware families use both data encryption and data theft in attacks

Data-stealing ransomware attacks, information harvesting malware, and supply chain attacks are among the critical threats to organizations, according to F-Secure. One of the …

keyboard
Digital dependence and innovation: Two critical trends in cyber espionage and crime

Being a veteran cybersecurity incident responder with over 21 years of field experience I know I will always have a job and it will always be interesting. In the evolution of …

Trend Micro oil and gas industry
Lack of IT-OT collaboration holding back smart factory security projects

61% of manufacturers have experienced cybersecurity incidents in their smart factories and are struggling to deploy the technology needed to effectively manage cyber risk, …

architecture
Hybrid IAM: Addressing the security and experience issues caused by hybrid IT

More than 80% of global IT decision-makers have already adopted, or plan to adopt or expand, cloud-based identity and access management (IAM) initiatives over the next two …

person
Board directors need to play an active role in protecting their org from cyber risks

Cybersecurity failure is a “clear and present danger” and critical global threat, yet responses from board directors have been fragmented, risks not fully understood, and …

DDoS
DDoS attacks in 2021: What to expect?

We’re only three months into 2021, and Akamai has mitigated 3 out of the 6 largest DDoS attacks they have ever witnessed. Two of these hit the same company on the same …

zero
How to avoid 4 common zero trust traps (including one that could cost you your job)

Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …

cloud security experts
Cloud security experts wanted: You can be one of them

A recent study from Boston Consulting Group and analytics firm Faethm has attempted to predict how digitization and technology will upend labor markets in Australia, Germany, …

fill online form
93% of consumers concerned about data security when filling out online forms

Source Defense provides in-depth analysis of the client-side threat landscape and specific attacks like formjacking, Magecart and web browser threats. The research offers a …

work from home
How well have remote workers adapted one year on?

Remote workers are still struggling with distracting working environments, stress and an ‘always-on’ culture after a year of working from home, an Egress research has …

Don't miss

Cybersecurity news