Digital key builds on past practices to create a more secure future

Too often, we assume that new technology replaces the old, but technology often builds off past generations, ideas, and success, rather than abandoning it altogether. Some people may not realize that past technologies are foundational to new technology… Continue reading Digital key builds on past practices to create a more secure future

Large ransom demands and password-guessing attacks escalate

ESET released a report that summarizes key statistics from its detection systems and highlights notable examples of its cybersecurity research. The latest issue of the report highlights several concerning trends that were recorded by ESET telemetry, in… Continue reading Large ransom demands and password-guessing attacks escalate

Security and trust in software remains top priority for buyers

Faster decision making, credit card transactions instead of negotiated contracts, and the near-ubiquitous use of peer review sites are all part of the new normal in enterprise software purchasing, which increasingly resembles B2C buying behavior, a G2 … Continue reading Security and trust in software remains top priority for buyers

Three areas legal leaders should focus their technology efforts in

As legal and compliance teams have faced acute pressures since the global pandemic and are struggling to manage their workload, legal leaders should focus their technology efforts in three areas to derive the maximum benefit, according to Gartner. “Tec… Continue reading Three areas legal leaders should focus their technology efforts in

CDO role not yet recognized, expectations too high and misinformed

Despite high demand for strong data leadership, there is still much confusion and uncertainty about the Chief Data Officer (CDO) role. This is according to a study launched by Exasol, which found 50% of CDOs believe the value of their role is not yet r… Continue reading CDO role not yet recognized, expectations too high and misinformed

The relationship between development and security teams affects speed to market

VMware announced findings from a study on the relationship between IT, security, and development teams as organizations adopt a zero trust security model. The study found that security is still perceived as a barrier in organizations, with 52% of devel… Continue reading The relationship between development and security teams affects speed to market

Enterprise security challenges and increased cloud usage fueled by remote work

81% of U.S.-based IT professionals believe that having remote workers has increased enterprise security challenges, while 74% acknowledge that their company’s use of cloud solutions increased as a direct result of the COVID-19 pandemic, a ManageEngine … Continue reading Enterprise security challenges and increased cloud usage fueled by remote work

APAC 5G revenue to reach $13.9 billion in 2025

Though in early stages, 5G will be adopted considerably faster than 4G based on the current rate experienced in China and South Korea. However, even with faster adoption rates of 5G, 4G will remain the more prevalent cellular technology through 2025. T… Continue reading APAC 5G revenue to reach $13.9 billion in 2025

SaaS subscriptions bouncing back as enterprises seek innovation

Enterprises worldwide continue to migrate from proprietary, licensed software to software-as-a-service (SaaS) subscriptions as they seek innovation, better user experience and lower cost, according to a report published by Information Services Group (I… Continue reading SaaS subscriptions bouncing back as enterprises seek innovation