Do you need cyber asset attack surface management (CAASM)?

In this video for Help Net Security, James Mignacca, CEO at Cavelo, talks about cyber asset attack surface management (CAASM), which Gartner recently identified as an emerging technology. As companies moved to a hybrid workforce model, their assets wer… Continue reading Do you need cyber asset attack surface management (CAASM)?

How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments. Findings from the report incorporate insights from nearly two million endpo… Continue reading How many steps does it take for attackers to compromise critical assets?

The security gaps that can be exposed by cybersecurity asset management

Cybersecurity asset management does not come with the excitement following the metaverse, blockchain, or smokescreen detection technologies, but it is essential for the protection of corporate infrastructure. It is no secret that just one vulnerable, u… Continue reading The security gaps that can be exposed by cybersecurity asset management

Healthcare IT market to reach $484 billion by 2026

Amid the COVID-19 crisis, the global market for healthcare IT estimated at $276.8 billion in the year 2022, is projected to reach a revised size of $484 billion by 2026, growing at a CAGR of 15.1% over the analysis period, according to Global Industry … Continue reading Healthcare IT market to reach $484 billion by 2026

Digital asset management market to reach $10.018 billion in 2026

The global digital asset management market is expected to grow at a compound annual growth rate of 18.36% over the forecast period to reach a market size of $10.018 billion in 2026, from $3.078 billion in 2019, according to ResearchAndMarkets. The grow… Continue reading Digital asset management market to reach $10.018 billion in 2026

How are organizations protecting their critical IT assets?

Telos unveiled findings from a research conducted by Vanson Bourne that explores how organizations approach network and critical IT asset protection. The study, which polled 250 information technology, IT security, legal and risk/fraud/compliance profe… Continue reading How are organizations protecting their critical IT assets?

Reality check: Your security hygiene is worse than you think it is

Sevco Security published a report which explores the gap between perceptions and realities of security hygiene and asset management. Leveraging findings from ESG’s “Security Hygiene and Posture Management Survey,” Sevco’s report addresses five unfounde… Continue reading Reality check: Your security hygiene is worse than you think it is

List of IT assets an attacker is most likely to target for exploitation

Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. Leading up to the anniversary of the Solarwinds hack, and after a very tumultuous year in cybersecurity—especially with ransomware a… Continue reading List of IT assets an attacker is most likely to target for exploitation

Most Fortune 500 companies’ external IT infrastructure considered at risk

Nearly three quarters of Fortune 500 companies’ IT infrastructure exists outside their organization, a quarter of which was found to have a known vulnerability that threat actors could infiltrate to access sensitive employee or customer data, a Cyberpi… Continue reading Most Fortune 500 companies’ external IT infrastructure considered at risk

Asset management investment to focus on technology and data infrastructure

Investment in technology and data infrastructure sit at the top of asset managers’ priorities as they position themselves to deliver business growth in the recovery from the COVID-19 pandemic. 56% say their investment will focus on these areas over the… Continue reading Asset management investment to focus on technology and data infrastructure