BLOGS

INSIGHTS

BLOGS

Filter By:
E.g., 2023-06-04
E.g., 2023-06-04
May 31, 2023
Open banking will change the business model of many organizations by empowering them to seek life-sustaining partnerships, leveling the competitive playing field of consumer acquisition and retention. Small to midsize businesses (SMBs) can partner with myriad financial entities to serve as an on-ramp to sought-after financial products. “Too big to fail” joins “too small to survive” to create a...
Read Full Post
May 24, 2023
There is no argument that the COVID-19 pandemic uprooted the world's economy, but has it equally disrupted venture capital (VC) and private equity (PE) investment in the cybersecurity industry? To answer this question, Aite-Novarica Group analyzed 1,346 startup and scale-up investments from 2019 to April 2023. The results were somewhat unexpected: The gloomy investment picture reported by the...
Read Full Post
May 3, 2023
One of the most exploitable assets of an IT estate is the information and assets of users; however, identities are often omitted from instantiation in an attack surface. Organizations must stop thinking of identities as only something to control access and start thinking of identities as a top domain asset that is the entre to an attack surface. One must remember that an asset is anything of...
Read Full Post
April 25, 2023
Much has been reported on the declining venture capital (VC) deals across the cybersecurity market, but is that true? The answer depends on how you look at the question. If one were to focus on the number of deals, the answer would be no. If one were to look at the size of the individual deals, the answer would be yes. The number of investment deals per month is slightly less than the ensuing...
Read Full Post
April 12, 2023
Business Software Versus Cybersecurity Software Sponsored by Mastercard, Aite-Novarica Group interviewed 1,560 owners and operators of micro, small, and midsize enterprises (MSMEs) across 24 countries from November to December 2022 to understand their buying habits toward cybersecurity products and services. One of the insights we wanted to glean was the level of importance MSMEs placed on...
Read Full Post
March 21, 2023
It is reported that the average number of APIs organizations use can range from 15,564 to 25,592. According to F5, there could be 1.7 billion APIs in use by 2030, making APIs one of the largest known software components of an enterprise attack surface. Hackers increasingly target APIs as the gateway to an organization's sensitive information. A 2022 Salt Security report states that 94% of...
Read Full Post
March 14, 2023
Regulatory intelligence involves monitoring, accumulating, and analyzing secondary research to anticipate developments in global legal and regulatory decisions and direction. Some might say it’s a pretty dry subject. But wait—don’t think of it as a stuffy topic only spoken of in boardrooms. Think of it instead as the superpower of seeing around corners. What if you were the prognosticator of...
Read Full Post
March 8, 2023
There are many key indicators pointing to an economic recession, whether it’s the World Bank cutting its outlook on 2023 global growth to 1.7% or the onslaught of layoffs. Regardless of the indicators, it sure feels like we’re in one. All this talk of recession made me wonder if the underground ransomware economy has been equally affected. Surely hackers must feel the pain of recession, right...
Read Full Post
March 1, 2023
The financial sector is only healthy if it can withstand singular or simultaneous cyberattacks on participating entities. An increasing number of cyberattacks have given cause for concern throughout the EU that financial entities are subject to systemic and concentration risk owing to the interconnectivity of the financial markets and participants. To address these concerns, the European...
Read Full Post
February 24, 2023
The cornerstone of every cybersecurity architecture is the encryption of data and network communications to prevent unauthorized access to sensitive information. If all other cybersecurity controls fail, encryption is always there to prevent unauthorized access to information. Encryption is so critical to the world's digital commerce that all cybersecurity rules, regulations, and standards...
Read Full Post

HOW CAN WE HELP?

If you have a question specific to your industry, speak with our experts.  Call us today to learn about the benefits of becoming a client.

Receive email updates relevant to you. Subscribe to entire practices or to selected topics within practices.