Do third-party users follow security best practices and policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security risks, One Identity reveals. Most organizations grant third-party users acces… Continue reading Do third-party users follow security best practices and policies?

ICS cybersecurity investment should be a priority in protecting operations from disruption

93% of ICS security professionals are concerned about cyberattacks causing operational shutdown or customer-impacting downtime, according to a Tripwire survey. In an effort to prepare against such threats, 77% have made ICS cybersecurity investments ov… Continue reading ICS cybersecurity investment should be a priority in protecting operations from disruption

Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within businesses today, according to a survey from One Identity. Among the survey’s mo… Continue reading Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in

99% of IT execs report challenges with architecture modernization and 98% report challenges with their corporate data architectures (data silos), a DataStax survey reveals. Vendor lock-in (95%) was of particular concern among respondents. The survey, c… Continue reading 100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in

Volume and quality of training data is the largest barrier to applying machine learning

IDC predicts worldwide spending on artificial intelligence (AI) systems will reach $35.8 billion in 2019, and 84% of enterprises believe investing in AI will lead to greater competitive advantages (Statista). However, nearly eight out of 10 enterprise … Continue reading Volume and quality of training data is the largest barrier to applying machine learning

Less than 20% of IT pros have complete access to critical data in public clouds

Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient. Lack of visibility can result in a variety of problems including the inability to track or diagnose application per… Continue reading Less than 20% of IT pros have complete access to critical data in public clouds

Unsurprisingly, only 14% of companies are compliant with CCPA

With less than 10 months before the California Consumer Privacy Act (CCPA) goes into effect, only 14% of companies are compliant with CCPA and 44% have not yet started the implementation process. Of companies that have worked on GDPR compliance, 21% ar… Continue reading Unsurprisingly, only 14% of companies are compliant with CCPA

IT teams are struggling with network infrastructure challenges caused by the cloud

Public cloud adoption is growing by double-digit percentages year over year, and the public cloud market is expected to exceed $220 billion by the end of 2019, according to Gartner. However, the survey findings from Dimensional Research reveal that IT … Continue reading IT teams are struggling with network infrastructure challenges caused by the cloud