Marry IGA with ITSM to avoid the pitfalls of Identity 2.0

Identity 2.0 vendors are about to face a reckoning. For too long, they’ve focused solely on compliance and missed the mark on the adaptability, automation and integration that modern enterprises require. They’ve also emphasized provisioning at a time w… Continue reading Marry IGA with ITSM to avoid the pitfalls of Identity 2.0

Everyone’s talking about Data Privacy Day, but who’s listening?

It’s January 28th 2021, which means Data Privacy Day is upon us once again. A lot has happened in the past year, including a global pandemic that resulted in many of us becoming more dependent on our devices than ever before. For several years now, the… Continue reading Everyone’s talking about Data Privacy Day, but who’s listening?

CISOs increasingly focus on mitigating mobile security risks

The emergence of the everywhere enterprise has shifted CISO priorities away from combating network security threats and towards mitigating mobile security risks, Ivanti reveals. 87% CISOs surveyed agreed that mobile devices have become the focal point … Continue reading CISOs increasingly focus on mitigating mobile security risks

Most network outages exceed $1 million in damages

Infoblox unveils research into the foundational infrastructure challenges faced by networking and security decision-makers in the US government. The report reveals a disruptive year of workforce transformation forced by the COVID-19 shutdowns during wh… Continue reading Most network outages exceed $1 million in damages

Global IoT in manufacturing market size to reach $1.0388 billion by 2026

The global IoT in manufacturing market size is projected to reach $1.0388 billion by 2026, from $567.2 million in 2020, according to Valuates Reports. Major factors driving the growth of IoT in manufacturing market size are the growing need for central… Continue reading Global IoT in manufacturing market size to reach $1.0388 billion by 2026

Streamlining cloud compliance through automation

As companies migrate to the cloud to take advantage of its scalability and flexibility, many don’t fully realize how this move will affect their compliance with cybersecurity and privacy requirements mandated by laws and standards such as SOX, CC… Continue reading Streamlining cloud compliance through automation

Privacy is not a one-time, check the box activity

New research from ISACA reveals critical skills gaps and insufficient training. The survey report also explores past and future trends in privacy, offering insights into privacy workforce and skills, the use of privacy by design, and the organizational… Continue reading Privacy is not a one-time, check the box activity

The complexity of moving legacy apps remains a huge cloud migration challenge

85% of IT decision makers are planning to increase their IT budgets for 2021, with cloud migration as a priority, a Next Pathway survey reveals. 65% of companies indicate the initiative is a top three area of technology emphasis in 2021. Looking at spe… Continue reading The complexity of moving legacy apps remains a huge cloud migration challenge

Isolation-based security technologies are gaining prominence

Cyberinc shared its insights into the key trends that will shape the cybersecurity industry in the coming year. With evolving tactics that increase the risk and impact of ransomware and phishing, combined with the new normal of remote workforces, Cyber… Continue reading Isolation-based security technologies are gaining prominence

Most with in-house security teams are considering outsourcing security efforts

Syntax surveyed 500 IT decision-makers in the US on the impact of the COVID-19 pandemic on their businesses and strategic decisions they’ll make in 2021. 2020 was a year of unexpected and rapid digital transformation for IT leaders across industries. 8… Continue reading Most with in-house security teams are considering outsourcing security efforts