There was a time when companies were hesitant about their IT and security teams using automation to discharge some of their duties. “I think much of that was due to the feeling that if a task was automated and something went wrong, IT was not in control and did not have as much visibility,” Candace…

When it comes to protecting the growing infrastructure at Polaris Alpha, CISO Eric Schlesinger believes in a people-and-processes approach over a tools-based approach. But five years from now, those priorities will likely shift. “I believe that machine learning and AI are the future to security operations. An ‘artificial analyst’ can replace one or two full-time…

What are the challenges of securing small and medium-sized enterprises vs. larger ones? And how can automated, continuous security testing help shrink the gap? When studying the differences between cyber security for small and medium sized enterprises (SMEs) and larger enterprises, several components factor into how securing SMEs is different. Here’s a breakdown. Business hour…

There’s a global concern about the business impact and risk from rampant and unrestricted data growth, StorageCraft research reveals. It also shows that the IT infrastructures of many organizations are struggling, often failing, to deliver business continuity in the event of severe data outages. A total of 709 qualified individuals completed the research study. All…

80% of IT security professionals agree that more security and privacy legislation is needed, especially for social media organizations that store personal data. However, nearly the same number of respondents (82%) don’t believe their elected officials understand cyber risks well enough to develop and enact effective security regulation, a Venafi survey reveals. 384 IT security…

A white paper produced by Rysavy Research and 5G Americas technical experts explores the intensifying role of wireless communications, the evolution of its technology, emerging services and use cases, and a timeline of future developments through 2030. “The transition to 5G has been happening simultaneously with continued advances in 4G LTE,” stated Peter Rysavy, President…

With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside entities. In fact, many business processes depend on this connectivity, even when doing so broadens the threat landscape and puts the organization at greater risk. This interconnectedness means that vendor vulnerabilities…

Cybersecurity performance is critical to achieving commercial success, according to a BitSight study. Among the study’s most interesting findings is that nearly two in five (38 percent) of enterprises admit that they have lost business due to either a real or perceived lack of security performance within their organization. Based on a survey of 207…