Enterprise automation adoption surging, security and compliance area jump by 171%

Workato unveiled a data report focused on the key trends that shaped automation over the past year. The anonymised data reveals major shifts in automation priorities as organizations responded to the pandemic, seeking to boost efficiency, increase sale… Continue reading Enterprise automation adoption surging, security and compliance area jump by 171%

Fin names former Twilio exec Evan Cummack as CEO, raises $20M

Fin’s software captures employee workflow data from across applications and turns it into productivity insights to improve the way enterprise teams work and remain engaged. Continue reading Fin names former Twilio exec Evan Cummack as CEO, raises $20M

Protecting your company from fourth-party risk

In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors experience but also to the incidents that happen to those vendors’ vendors. Recent eve… Continue reading Protecting your company from fourth-party risk

The role of automation in staying on top of the evolving threat landscape

In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how automation could improve the way organizations detect and respond to attacks… Continue reading The role of automation in staying on top of the evolving threat landscape

Organizations struggling to develop cloud applications that meet security requirements

According to a Security Compass research, in mid-sized to large enterprises, 50% of the software applications being developed are cloud based, and another 30% are expected to migrate to the cloud within the next two years. However, ensuring a secure cl… Continue reading Organizations struggling to develop cloud applications that meet security requirements

Out with the old, in with the new: From VPNs to ZTNA

The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and individuals across the globe, but now the tide is turning. As technology advance… Continue reading Out with the old, in with the new: From VPNs to ZTNA

The cybersecurity metrics required to make Biden’s Executive Order impactful

For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve cybersecurity. Recently, President Biden issued the Executive Order on Improving … Continue reading The cybersecurity metrics required to make Biden’s Executive Order impactful

Why companies should never hack back

After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This prompted a hot debate amongst government and industry leaders on the feasibilit… Continue reading Why companies should never hack back

Consumers value privacy more than potential savings when purchasing insurance

A recent survey by Policygenius explored consumer sentiment toward new tech being deployed by home and auto insurance companies. The survey found that most consumers prefer being able to talk with an actual human and are wary of fully automated insuran… Continue reading Consumers value privacy more than potential savings when purchasing insurance

How do I select an automated red teaming solution for my business?

Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, but can automation simplify or even enhance the process? To select a suitable… Continue reading How do I select an automated red teaming solution for my business?