Search Results

It takes less than 3 minutes to hack an IoT device. Yet it can take hours, days or weeks to recover. Samy Kamkar, the nation’s leading white hat security hacker, researched the top enterprise Internet of Things (IoT) devices that make organizations vulnerable to cyberattacks. His findings show that ...


In this IDC Perspective report, research director Abhi Dugar looks at IoT security in the context of widespread cloud adoption, paying special attention to enterprises that maintain hybrid deployments. Dugar surmises that, while these multicloud environments help organizations avoid vendor lock-in a...


Oracle and KPMGs annual report highlights how the rapid pace and agility of the cloud has created a strategic imperative for security to keep pace at scale. The adoption of cloud is undeniably accelerating with 87% of organisations reporting a cloud-first orientation. As organisations expand their c...