Enterprises observing uptick in risky behaviors since shift to remote work

Tanium released a report to evaluate the primary IT operations and security challenges organizations have faced amid the large-scale shift to remote work in the COVID-19 era, and how businesses plan to adapt moving forward. The report was conducted by … Continue reading Enterprises observing uptick in risky behaviors since shift to remote work

Gartner and the Top Strategic Technology Trends for 2021

For organizations the world over, COVID-19 led to drastic operational changes overnight. On-premises-only styles of work were quickly supplanted by fully remote workforces. This shift had (and continues to have) massive implications for IT and securit… Continue reading Gartner and the Top Strategic Technology Trends for 2021

Attackers disrupting COVID-19 efforts and critical supply chains

Cyberattacks evolved in 2020 as threat actors sought to profit from the unprecedented socioeconomic, business and political challenges brought on by the COVID-19 pandemic, IBM Security reveals. In 2020 attackers were observed pivoting their attacks to … Continue reading Attackers disrupting COVID-19 efforts and critical supply chains

The state of multicloud adoption, its drivers, and the technologies enabling it

Turbonomic announced findings from the survey of over 800 global IT professionals that examines the current state of multicloud adoption, its drivers, and the technologies enabling it, including containers, public cloud, and edge computing. The analysi… Continue reading The state of multicloud adoption, its drivers, and the technologies enabling it

Healthcare breaches increased over 50% in 2020

In 2020, there were 599 healthcare breaches that collectively affected over 26 million individuals. Bitglass’ report takes an in-depth look at the breaches that healthcare organizations faced, comparing them to previous years and revealing key trends a… Continue reading Healthcare breaches increased over 50% in 2020

COVID-19 has increased urgency for businesses to adopt VSaaS and ACaaS

A research into the impact of COVID-19 on physical security purchasing decisions has revealed a sharp increase in the necessity/urgency for businesses to adopt hosted video surveillance (VSaaS) and access control (ACaaS) solutions. While 70% of 1000 se… Continue reading COVID-19 has increased urgency for businesses to adopt VSaaS and ACaaS

Cloud Native Tools Series Part 1: Go Beyond Traditional Security

Like anyone who works with their hands, cybersecurity experts need the right tools for the job. As we’ll see in this blog and the series to follow, cloud-based threats need cloud native tools to combat them. Traditional security tools don’t provide the same level of functionality in the cloud as they do on premises. According […]

The post Cloud Native Tools Series Part 1: Go Beyond Traditional Security appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 1: Go Beyond Traditional Security

Crawl, Walk, and Run with SASE Adoption

At Bitglass, customers and prospects are constantly asking us questions about secure access service edge and how our SASE platform can address their modern security use cases. In particular, we are commonly asked how organizations should go about depl… Continue reading Crawl, Walk, and Run with SASE Adoption

The complexity of moving legacy apps remains a huge cloud migration challenge

85% of IT decision makers are planning to increase their IT budgets for 2021, with cloud migration as a priority, a Next Pathway survey reveals. 65% of companies indicate the initiative is a top three area of technology emphasis in 2021. Looking at spe… Continue reading The complexity of moving legacy apps remains a huge cloud migration challenge

Companies turning to MSPs as attack vectors get more sophisticated

Research from Infrascale reveals new information security insights important to MSPs in the new year. The research survey highlights business executive input, from a security perspective, on COVID-19, on cloud adoption, and on standards compliance. As … Continue reading Companies turning to MSPs as attack vectors get more sophisticated