- Welcome Guest
- Sign In
Scalable cloud-based solutions are widely popular among IT pros these days. The cost, convenience, and reliability of ready-to-use software as a service make this disruptive technology a favorable choice. Still, the market needs some convincing that backing up to the cloud is both a smart and safe t...
Ransomware is the top supply chain risk facing organizations today, according to a new survey by ISACA, an association for IT professionals with 140,000 members in 180 countries. The survey, based on responses from more than 1,300 IT pros with supply chain insights, found that 73% of the respondents...
Without a detailed accounting of open-source code running within their software, companies have no way to monitor software policies, licenses, vulnerabilities, and versions. That means IT departments are clueless about the overall health of the open-source components they use.
Cloud storage provider Nasuni recently announced a $60 million equity investment by new investor Sixth Street Growth. This is the fourth round of financing for Nasuni over the last five years, during which it has raised a total of $148 million. We spoke with the company's founder and CTO Andres Rodr...
The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.
Under the new Critical Infrastructure Defense Project, companies in particularly vulnerable industries -- such as hospitals and water and power utilities -- will have access to the full suite of Cloudflare's Zero Trust solution, CrowdStrike's endpoint protection and intelligence services, and Ping I...
Remote workers have higher anxiety levels about security and privacy than other types of employees. In a survey of 7,200 people from nine countries, more than two-thirds of remote workers acknowledged they worried about security and privacy, even when nothing was wrong.
Growing use of unified communication and collaboration tools in organizations could hurt productivity in the short term, according to a study released last week by a service assurance and cybersecurity company. In a survey commissioned by Netscout, of Westford, Mass., more than nine in 10 of the 30...
New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...
The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...
Linux Foundation Research and SODA Foundation have released study results on new data and storage trends for enterprise. The 2021 Data and Storage Trends Report reveals enterprise use of data and storage as it relates to cloud services and workloads in the era of cloud native, edge, IoT and 5G. Data...
Businesses are flocking to software-as-a-service applications as a means to improve the efficiency of their operations and the productivity of their employees, but weak control of access to cloud apps is putting the data of many organizations at risk. According to a study by DoControl, the average 1...
Disruptions to power grid systems can have devastating effects. Despite the fact that consistent electric power has been a basic human need for more than a century; more than ever, the grid faces a growing onslaught of threats. We spoke with experts in the field about the critical nature of the grid...
Hackers aren't the only ones evading security measures of many organizations. So are their remote workers. In a new report on remote workforce security, 52 percent of the U.S. IT and cybersecurity professionals surveyed revealed they experienced remote workers finding workarounds to their organizati...