Chief Compliance Officers must embrace new leadership responsibilities

As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and reposition how their function is thought of among stakeholders, according to Gartner. … Continue reading Chief Compliance Officers must embrace new leadership responsibilities

An organization’s security posture will benefit from increased coordination

NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. Respondents state that IT and cybersecurity risks were broadly considered part of th… Continue reading An organization’s security posture will benefit from increased coordination

Digital transformation needs data integrity to be successful

The exponential growth of business data, coupled with advancements in cloud computing, AI, and the IoT has unleashed an era of digital transformation across the globe. This is why data integrity is an urgent business imperative, because digital transfo… Continue reading Digital transformation needs data integrity to be successful

It takes less than one hour to exploit vulnerable container infrastructure

Aqua Security published a research revealing a continued rise in cyberattacks targeting container infrastructure and supply chains, and showing that it can now take less than one hour to exploit vulnerable container infrastructure. The report provides … Continue reading It takes less than one hour to exploit vulnerable container infrastructure

What is the impact of remote work on security best practices?

Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of COVID-19, IT’s chief concerns about new spending decisions, the impact remote work h… Continue reading What is the impact of remote work on security best practices?

Digital identity verification spend to reach $16.7 billion in 2026

Spending on digital identity verification by businesses will reach $16.7 billion in 2026, from $9.4 billion in 2021, Juniper Research finds. Digital identity verification is where identity is checked using digitally verifiable elements, such as selfie … Continue reading Digital identity verification spend to reach $16.7 billion in 2026

Ransomware decreases as cybercriminals hit more lucrative targets

McAfee released a report examining cybercriminal activity related to malware and the evolution of cyber threats in the first quarter of 2021. The quarter saw cyber adversaries shift from low-return, mass-spread ransomware campaigns toward fewer, custom… Continue reading Ransomware decreases as cybercriminals hit more lucrative targets

76% of IT decision makers more vulnerable to mobile attacks than just a year ago

53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by Sapio Research reveals. Going one step further, 38 percent claimed that it’s impo… Continue reading 76% of IT decision makers more vulnerable to mobile attacks than just a year ago

5G mobile subscriptions to exceed 580 million by the end of 2021

Ericsson projects that 5G mobile subscriptions will exceed 580 million by the end of 2021, driven by an estimated one million new 5G mobile subscriptions every day. 5G mobile subscriptions The forecast enhances the expectation that 5G will become the f… Continue reading 5G mobile subscriptions to exceed 580 million by the end of 2021

Multi-cloud transit enhances app experience but brings complexity and security challenges

Sapio Research conducted a survey of more than 400 IT leaders at U.S.-based organizations with more than 1000 employees which offers a picture for enterprises transitioning to the cloud and multi-cloud so that they understand the challenges and are emp… Continue reading Multi-cloud transit enhances app experience but brings complexity and security challenges