Source: Ralf/Technology via Getty Images. In the fast-paced world of technology, IT decision makers face the challenge of staying ahead while effectively managing the convergence…
The Information Security, Cyber Insurance 2023 study explores the usage of cybersecurity insurance policies as a method of risk transfer for enterprise security programs, including…
Decentralized identity refers to a digital identity framework where an individual or device is responsible for their own identity and credentials. Often termed “self-sovereign identity,”…
Our Information Security, Identity Management 2023 study explores the types of authentication form factors in place at enterprises, notably including the percentage of applications that…
The convergence of factors such as the shift to hybrid work, the widespread use of digital communications and mobile devices, and the proliferation of unsecured…
Our Information Security, Security Analytics & SecOps 2023 study explores the key attributes that enterprise security buyers expect when selecting tools to support their security…
At its re:Inforce security-focused event in June, Amazon Web Services announced several additions for key management, certificate authority, secure computing and payment security. These are…
Security is a crucial aspect of the artificial intelligence (AI) trend, both as an opportunity and a concern. AI-powered cybersecurity products are becoming more common,…
Our Information Security, Endpoint Security 2023 study examines use case effectiveness around endpoint security tools, as well as key issues such as ransomware and where…
Disaster recovery (DR) continues to be a top concern for organizations, and this is forcing them to enhance their capabilities to meet the stringent requirements…