The top drivers of wasted IT spend in a hybrid-first environment [Q&A]

burn_money

From rising collaboration expenses to a need for more devices per employee, hybrid work models have driven a need for new investments in workplace technology.

However, a significant portion of IT spend is wasted in a hybrid-first environment, often due to a reliance on manual processes that don't provide much-needed visibility into organizational endpoints.

Continue reading

Canonical brings OpenStack to small-scale clouds

Cloud-PC

Canonical has announced the extension of its commercial OpenStack offering to small-scale cloud environments with a new project, Sunbeam.

The project is 100 percent open source and is available free-of-charge, but enterprise customers can also opt-in for comprehensive security coverage and full commercial support under the Ubuntu Pro + Support subscriptions once they’ve completed the deployment.

Continue reading

Around a third of enterprise software spend is wasted

Money drain plughole

Despite significant efforts to become more efficient with IT budgets, respondents to a new survey report underutilization or wasted IT spending of 36 percent for desktop software, 33 percent for data center software, 32 percent for SaaS and 32 percent for IaaS/PaaS.

The study into IT asset management (ITAM) from Flexera shows that software asset management (SAM) programs are saving enterprises tens of millions of dollars. 55 percent of respondents say they saved more than $1 million, and 16 percent claim SAM programs saved more than $10 million in the past year.

Continue reading

Financial services businesses face critical data security gap

Lock and money

New survey findings from Lookout show that 70 percent of IT leaders in the financial services sector report a significant increase in data breaches compared to previous years.

Nearly half of organizations (47 percent) are struggling with the heightened difficulty of detecting and mitigating threats, while about a fifth (18 percent) face a significant lack of control over their applications and data.

Continue reading

Firewalla Gold SE is set to offer protection for faster internet speeds

FW Gold SE_side

Towards the end of last year we reviewed the Firewalla Gold Plus, a more powerful version of the plug-in network protection device aimed at professional and business users.

Of course the world of the internet doesn't stand still for long and with gigabit speeds becoming more widely available as full fiber services are rolled out, Firewalla is set to up its game again with the launch of the Gold SE.

Continue reading

The devices that pose a threat to critical infrastructure

Industrial IoT

Operational technology and industrial control system devices represent an attractive target for cybercriminals attempting to access networks, and for nation state actors looking to disrupt infrastructure.

Asset visibility and security company Armis is releasing new research identifying the riskiest devices that pose threats to critical infrastructure industries: manufacturing, utilities and transportation.

Continue reading

The importance of blockchain security in an interconnected world [Q&A]

Blockchain

Blockchain is best known for its application in securing cryptocurrency. But in recent years it's expanded to drive emerging business in other sectors such as healthcare, real estate, smart contracts, and more.

Because blockchain ensures a tamper-proof ledger of the distributed transactions, it's sometimes used for high-risk transactions and exchanges. But this presents high stakes opportunities for adversaries to steal money and sensitive information.

Continue reading

Data quality incidents take two days or more to resolve

Deep Data Search digital forensics

The latest State of Data Quality survey from Bigeye finds that more than half of respondents have experienced five or more data issues over the last three months.

Another 40 percent say they have experienced moderate to severe data incidents within the last six months, and that it took a major effort to avoid damage to the business. These incidents range from severe enough to impact the company's bottom line, to reducing engineer productivity.

Continue reading

Why organizations shouldn't pay ransomware demands [Q&A]

Refusal to pay

Many organizations around the world are opting to pay ransoms to cybercriminals in order to buy back ownership of their data. But this can leave them open to further risk of attack.

Gerasim Hovhannisyan, CEO and co-founder of EasyDMARC, believes it's wrong to pay up and that it's better to establish good defenses. We spoke to him to find out why.

Continue reading

The technologies driving developer productivity

man in headset with computer over virtual screens

Hot on the heels of this morning's story about wasted developer time comes a new survey from GitLab looking at the technologies being used to help DevSecOps teams be more productive.

The company surveyed more than 5,000 development, security, and operations professionals about everything from deployment frequency to the practices teams have adopted to learn what the most agile and efficient organizations have in common.

Continue reading

Wasted developer time costs businesses billions

Office productivity time

UK businesses are inadvertently wasting over £10.4 billion ($12.97 billion) each year as developers manually carry out routine operations tasks that could be automated.

Software delivery platform Harness calculates the figure based on the fact that developers spend only around 52 minutes a day on actual coding.

Continue reading

New tools suite aims to open up generative AI for the enterprise

Artificial intelligence

It seems that generative AI is everywhere at the moment, but for businesses understanding how best to make use of the technology can be a bit of a puzzle.

Instabase is aiming to help with the launch of a new AI Hub, this is a repository of AI apps focused on content understanding and a set of generative AI-based tools.

Continue reading

Cyber extortion activity reaches new highs

Business man with suitcase full of money

After a decrease of eight percent in cyber extortion (Cy-X) victims in 2022, the data for the first quarter of this year shows the largest volumes to date.

The latest Cy-Xplorer 2023 report from Orange Cyberdefense shows businesses in 96 different countries were impacted by Cy-X in 2022. Since 2020 Orange Cyberdefense has recorded victims in over 70 percent of all countries worldwide.

Continue reading

Three quarters of organizations risk their data with poor backup and protection policies

Backup key

Just 25 percent of IT professionals are following industry best practices for backing up data, according to a new study from hardware-encrypted storage maker Apricorn.

The survey details data backup, encryption and resiliency protocols for over 250 IT professionals in the United States and Canada over the last 12 months. It finds that while 93 percent of respondents say that they factor in data backups as part of their cyber security strategy, only one in four follow the 3-2-1 rule, in which they keep three copies of data, on two different formats, one of which is stored off-site and encrypted.

Continue reading

Law firms are struggling with their cybersecurity practices

lawyer with laptop

Law firms store some of the most sensitive information available regarding material business transactions, intellectual property and personal data.

But a new study from the International Legal Technology Association (ILTA) and Conversant Group, reveals a disconnect between legal firms' IT and best practice cybersecurity.

Continue reading

Load More Articles