Compromised devices and data protection: Be prepared or else
The January 6 riot and storming of the U.S. Capitol demonstrated just how quickly and unexpectedly our devices can fall into the wrong hands. The allegation that one rioter …
Rise in remote work leads to increase in IT security gaps
Companies have not done enough to prevent heightened security risk in light of remote working, according to Lynx Software. In fact, 36% have been, or know someone who has …
Can private data be recovered from “sanitized” images?
Machine learning systems are becoming pervasive not only in technologies affecting our day-to-day lives, but also in those observing them, including face expression …
Most IT pros manage different versions of the same database
The vast majority (82%) of IT professionals admit that they manage different versions of the same database, and 74.4% run into issues with their current data warehouses, …
Getting your application security program off the ground
IT and security professionals are increasingly concerned about attackers compromising their mission-critical applications. According to a recent Ponemon study, the reasons for …
85% of workers are looking forward to returning to the office
At the 1 year mark of quarantine, 85% of office workers are looking forward to returning to the office in some capacity, according to Eden Workplace. The survey was conducted …
Passing a compliance audit in the cloud doesn’t have to be hard
Companies are required to comply with regulations that set standards specific to financial and size thresholds, industry type, customer categories, or other parameters. But …
Alert overload still plagues cybersecurity industry
Alert overload still plagues the cybersecurity industry, according to Critical Start. Forty-seven percent of respondents reported personally investigating 10 to 20 alerts each …
Defending enterprise systems during a pandemic
A new report from Akamai looks back at 2020, examining some of the technological shifts and the patterns that emerged from lockdown-related internet spikes at the beginning of …
The impact of the pandemic on digital transformation and data access
Data access has become more critical for 53% of survey respondents throughout the pandemic as analytics workloads and demands increase significantly, according to a survey …
How to mitigate security risks as cloud services adoption spikes
Millions have flocked to video-conferencing solutions and organizations have relied more heavily on various applications (such as G Suite for end users, Azure for developers, …
2021 Hacker Report: Hackers are not just driven by money
HackerOne released its 2021 Hacker Report that reveals a 63% increase in the number of hackers submitting vulnerabilities in 2020. As organizations’ attack surfaces have …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers