2020 Zero Trust Progress Report lists at-risk devices among top secure access challenges – highlighting BYOD and IoT security trends.
Read MoreInfoblox has published new research that exposes the significant threat posed by shadow IoT devices on enterprise networks. The report, titled “What’s Lurking in the Shadows 2020” surveyed 2,650 IT professionals across the US, UK, Germany, Spain, the Netherlands and UAE to understand the state of shadow IoT in modern enterprises.
Read MoreTraditional network and data security approaches have focused primarily on threat detection and vulnerability management. Demonstrating business value, such as compliance, risk management, or information security, has been challenging. Consequently, data security is more often looked upon as a necessary cost of doing business. However, as CIOs, CISOs and network security teams become more fully vested members of the C-suite, provable security remains an ever-growing and overarching goal when...
Read MoreFunding to develop Autonomous Industrial Cybersecurity Assistance System prototype granted by Innovation Authority in Israel and Federal Ministry of Education and Research in Germany.
Read MoreWith or without realising, we’ve encountered the benefits of digital transformation in various parts of our lives – from everyday tasks such as shopping, working and socialising with friends and family, to how we stream films, and pay for things using our phone or watch. By Hubert Da Costa, VP and GM EMEA, Cybera.
Read MoreProofpoint has released its Cost of Insider Threats 2020 Global Report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organisations spent $11.45 million annually on overall insider threat remediation and took 77 days to contain each incident.
Read More