Futurum principal analyst Shelly Kramer dives into IBM’s annual Cost of a Data Breach Report, done in partnership with Ponemon, exploring the far-reaching impact of data breaches, what the data shows in terms of the rise in instances of security breaches, and the ultimate impact of breaches on consumers.
Qualcomm’s New Snapdragon 7c Gen 2 Compute Platform Brings Major Upgrade to Budget Laptops
Qualcomm’s new Snapdragon 7c Gen 2 compute platform brings a major upgrade to budget laptops. The platform’s specs on the whole look to be raising the bar for entry-level mobile compute platform performance and features.
AWS Nitro Enclaves: The AWS Answer for Trusted Execution Environments
We believe that with AWS entering the Confidential Computing space, the bigger message here is that Big Tech is increasingly addressing data security in novel and important ways by addressing the entire data chain to ensure that organizations are able to pass on that security to their customers. We expect big things ahead in the Confidential Computing space and AWS, as always, is on the forefront.
4 Unique Ways to Secure Your Enterprise Access Control Systems
Enterprise access control systems have become a target for hackers who look for the easy way in. Here are 4 ways to ensure your system is secure.
Broadcom Growth by Acquisition Strategy Continues with $10.7B Symantec Acquisition
Broadcom’s $10.7B acquisition of Symantec’s enterprise security business moves forward, as Avago’s ‘growth by acquisition’ strategy continues to play out. Semiconductors is one business, enterprise security software, an entirely different one. It will be interesting to watch how Avago’s Hock Tan and his penchant for streamlining operations impacts the company post-acquisition.
Top 8 Trends to Watch in Security Integration
As technology continues to evolve, people and businesses are focusing more of their attention on security. Whether they are looking to protect themselves, their data, or their company and employees, the top security integration trends showcase the latest technology available to meet their needs. Cloud Storage for Video Surveillance The cloud has been around for some time, and it’s now …
Why Enterprises Must Be More Proactive With Security Strategy
Sure, we hear about hacks when they happen to Sony, Target, or the federal government, but those are just a small percentage of the total that actually occur annually. Enterprises are hacked all the time and those numbers continue to grow; in 2015, the number of cyber attacks each month was higher than the months of the previous year (other …