Magazine Button

Infographics

Businesses to miss out on talent where remote work isn’t offered

New research from Citrix has confirmed that remote work is here to stay, with 82% of all respondents agreeing that it will be more common post-pandemic. The study shows that remote and flexible work options are now key to attracting and retaining talent, with 55% saying that businesses will miss out on top talent if […]


Contino uncovers scarcity of business-wide public cloud use

How are enterprises using the public cloud? How mature are cloud programs and operating models? What are the main technical and business benefits? What is holding businesses back? What are the next steps? At the beginning of 2020, the Contino team set out to answer these questions. Contino, a leading transformation consultancy that works with […]


World’s most dangerous malware disrupted through global action

Law enforcement and judicial authorities worldwide have disrupted one of the most significant botnets of the past decade: EMOTET. Investigators have now taken control of its infrastructure in an international coordinated action.  This operation is the result of a collaborative effort between authorities in the Netherlands, Germany, the US, the UK, France, Lithuania, Canada and […]


77% of IT leaders don’t fully trust the data in their organisation for decision-making

New research published by SnapLogic, provider of a high-ranking Intelligent Integration Platform, reveals that 77% of IT decision-makers (ITDMs) don’t completely trust the data within their organisation for timely and accurate decision-making. With 98% of those surveyed reporting that data is reviewed and analysed on a weekly basis by teams across the enterprise, this data […]


CyberArk launches AI-powered service to remove excessive cloud permissions

CyberArk, a global leader in privileged access management, has announced CyberArk Cloud Entitlements Manager, the industry’s first privilege-based, Artificial Intelligence-powered service designed to strengthen the security of cloud environments. Through continuous monitoring of cloud access, CyberArk enforces least privilege by identifying and removing excessive cloud permissions that can leave organisations vulnerable – significantly reducing risk and improving […]


New report illustrates need for hybrid cloud solution

A new report from Nutanix shows that businesses need the flexibility to use multiple clouds, but the lack of consistent operations hinders them. Nutanix, a leader in enterprise cloud computing, has announced findings of a new report analyzing key challenges and opportunities with hybrid cloud adoption. While most see hybrid cloud as the ideal IT […]


Study reveals 94% of global organisations suffered one or more business-impacting cyberattacks

How secure or at risk are organisations from cyberattacks? Only four out of 10 security leaders can answer this question with a high level of confidence. The Rise of the Business-Aligned Security Executive, a commissioned study conducted by Forrester Consulting on behalf of Tenable, surveyed over 800 security and business leaders. Its findings are sobering, […]


ICS vulnerabilities on rise as reliance on remote access to industrial networks increases during COVID-19

More than 70% of industrial control system (ICS) vulnerabilities disclosed in the first half of 2020 can be exploited remotely, highlighting the importance of protecting Internet-facing ICS devices and remote access connections. This is according to the inaugural Biannual ICS Risk & Vulnerability Report, by Claroty, a global leader in Operational Technology (OT) security. The report […]


The race to customer leadership in retail Digital Transformation

Retailers are racing to adopt Edge computing and customer-facing technologies to enhance the customer experience. Vertiv and global media company, DataCenterDynamics, interviewed 50 managers and executives from the world’s largest retail companies to profile the progress of retail Digital Transformation. Retailers are transforming themselves with new business strategies, processes and technologies to support a more […]


Mobile telecom industry making rapid progress towards 5G

A BPI Network survey found operators are rethinking security in light of 5G network traffic, a dramatic increase in connected devices and new mission-critical use cases. Mobile service providers say they are making substantial progress towards ushering in a new generation of 5G networks that will enable ultra-high-speed mobile connectivity and a wide variety of […]


McAfee uncovers attacks on corporate cloud accounts as companies work remotely

McAfee, a device-to-cloud cybersecurity company, has released a new research study titled Cloud Adoption and Risk Report – Work from Home Edition. McAfee’s new report uncovers a correlation between the increased use of cloud services and collaboration tools, such as Cisco WebEx, Zoom, Microsoft Teams and Slack, during the COVID-19 pandemic, along with an increase in cyberattacks targeting the cloud. Based on anonymised and aggregated data from more than 30 million McAfee MVISION cloud […]


BeyondTrust research finds 77% of critical Microsoft vulnerabilities can be mitigated

BeyondTrust, the worldwide technology leader in Privileged Access Management, has announced the release of its Microsoft Vulnerabilities Report. The research provides the latest annual breakdown into security vulnerabilities facing organisations today, as well as a five-year trends analysis to better equip organisations to increase their IT security posture and keep networks and systems safe. Now […]


Browse our latest issue

Magazine Cover

View Magazine Archive