The biggest security threats to today’s businesses

While 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a top-three priority during the next 12 months and barely a third cite risk mitigation as a measure of performance, a… Continue reading The biggest security threats to today’s businesses

Three steps to secure an organization during mergers and acquisitions

Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these expansions and transitions create great business opportunity, they also present a un… Continue reading Three steps to secure an organization during mergers and acquisitions

As breaches soar, companies must turn to cloud-native security solutions for protection

Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, finds a Laminar report. In the survey, 50% of security professionals said the… Continue reading As breaches soar, companies must turn to cloud-native security solutions for protection

Expanding threat landscape: Cybercriminals attacking from all sides

A research from Trend Micro warns of spiraling risk to digital infrastructure and remote workers as threat actors increase their rate of attack on organizations and individuals. “Attackers are always working to increase their victim count and pro… Continue reading Expanding threat landscape: Cybercriminals attacking from all sides

How the increase in ransomware has impacted the cyber insurance market

Panaseer shares data on actions enterprises are willing to take to solve the escalating cyber insurance crisis. In recent years the cyber landscape has been dominated by a sharp increase in ransomware attacks. According to SonicWall, ransomware attacks… Continue reading How the increase in ransomware has impacted the cyber insurance market

What makes a successful development team?

CircleCI unveiled its report on the state of software delivery, examining two years of data from more than a quarter billion workflows and nearly 50,000 organizations around the world. The report shows that the most successful engineering teams routine… Continue reading What makes a successful development team?

How prepared are organizations to face a ransomware attack on Kubernetes?

Veritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. Kubernetes is being rapidly deployed into mission-critical environments in o… Continue reading How prepared are organizations to face a ransomware attack on Kubernetes?

How to plan for increased security risks resulting from the Great Resignation

The Great Resignation is sweeping the world, and the causes and impacts are still being analyzed. Texas A&M University professor Anthony Klotz coined the term, predicting an unusual rise in voluntary resignations as employees anticipated the globa… Continue reading How to plan for increased security risks resulting from the Great Resignation

Four key risks exacerbated by Russia’s invasion of Ukraine

Russia’s invasion of Ukraine has altered the emerging risk landscape, and it requires enterprise risk management (ERM) leaders to reassess previously established organizational risk profiles in at least four key areas, according to Gartner. “Russia’s i… Continue reading Four key risks exacerbated by Russia’s invasion of Ukraine

Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats

We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats lurking on the horizon. In an era when breaches are more expensive than ever before… Continue reading Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats