75 percent of SaaS applications pose a risk to enterprises

Risk dial

The past few years have seen massive growth in the number of SaaS applications used by enterprises, but new research from Spin AI shows that 75 percent of SaaS applications pose a high or medium risk to data stored in either Google Workspace or Microsoft 365.

On average, 35 percent of apps with OAuth permissions to Google Workspace or Microsoft 365 are classified as high risk. For large organizations (with more than 2,000 employees) 56.91 percent of apps pose a high risk.

Continue reading

Okta launches identity verification for Zoom users

ID verification

Many organizations have come to rely on Zoom as a means of connecting employees and customers in a hybrid environment.

But this comes with challenges when it comes to keeping meetings secure without harming productivity. Identity management platform Okta is launching a new identity verification feature that will authenticate Zoom meeting attendees in End-to-End Encryption (E2EE).

Continue reading

Banks lack transparency over their use of AI

Artificial intelligence banking

Banks across North America and Europe are failing to publicly report on their approaches to responsible AI development, according to new research from Evident.

While AI is already used by banks for many critical processes, from authenticating customers to risk modeling, eight of the 23 largest banks in the US, Canada and Europe currently provide no public responsible AI principles.

Continue reading

Integrating security into the development process [Q&A]

DevSecOps

Historically, security has been treated as something as an afterthought in the IT industry. In more recent years though there has been pressure to introduce 'security by design' to ensure that products are developed with best practices in mind.

We spoke to David Melamed CTO of Jit to find out about integrating security and how security tools can be used by developers not just security professionals.

Continue reading

Data management gets more complex as IT infrastructure diversifies

Cloud maze complexity

IT infrastructure is increasingly diverse, with organizations struggling to integrate data management and control.

The latest Enterprise Cloud Index from Nutanix shows the majority of IT teams (60 percent) use more than one IT infrastructure -- a trend that's expected to intensify in the future -- but struggle with visibility of data across environments.

Continue reading

How artificial intelligence is transforming banking [Q&A]

Robot Bitcoin Pink Piggy Bank

Banking is a key industry, playing a major role in the economy, historically though it's been one that's slow to adapt to technological advances.

That's starting to change though, partly down to the arrival of more agile fintech companies. We spoke to co-founder of Iterate.ai, Brian Sathianathan, to find out more about how AI and machine learning can help transform the banking sector.

Continue reading

20 percent of endpoints have legacy security vulnerabilities

server vulnerability unlock

According to a new report, at least 20 percent of enterprise endpoints remain unpatched after the remediation is completed, meaning that a fifth of machines still have a significant number of legacy vulnerabilities that could be exploited at any time.

The study of over 800 IT professionals from Action1 Corporation finds 10 percent of organizations suffered a breach over the past 12 months, with 47 percent of breaches resulting from known security vulnerabilities.

Continue reading

Are you sure about this? Confidence in modernization projects drops as they progress

Man Scratching Head

When preparing for modernization, 70 percent of companies are confident or very confident in their understanding of their applications.

However, a new report from EvolveWare shows the high confidence level drops as companies plan their modernization project (41 percent) and begin their project (28 percent), suggesting that organizations only start to understand the level of knowledge needed for these efforts after they are further into their planning or execution.

Continue reading

Google Cloud integrates with Shopify to combat search abandonment

google-app-search

As we reported recently, delivering relevant search results on websites can be hard to achieve and for retailers this can lead to searches being abandoned and sales lost.

To address this issue, Google Cloud is announcing a new integration with eCommerce platform Shopify to allow sites to deploy advanced search and browse experiences using Google Cloud.

Continue reading

New solution helps enterprises manage cloud assets

Cloud

As organizations turn increasingly to the cloud they face the challenge of understanding not just the cost but also the value of their operation.

To help organizations maximize business value from their technology investments, Flexera is launching a new solution that strengthens an enterprise's FinOps and cloud central teams, while allowing the convergence of IT asset management (ITAM) and FinOps.

Continue reading

New solution helps to visualize cloud-native app risks

Double exposure of businessman working with digital tablet compu

With more and more organizations turning to the cloud and cloud-native application development, AppSec teams face a mounting challenge to keep pace with their development counterparts.

To address this, Backslash Security is launching a new solution to provide unified code and cloud-native security by correlating cloud context to code risk, backed by automated threat modeling, code risk prioritization, and simplified remediation across applications and teams.

Continue reading

Dark web intelligence is critical to defending the enterprise

hacker laptop

A new survey of over a thousand CISOs from large enterprises in the US and UK, finds that 93 percent are concerned about dark web threats and 72 percent believe that intelligence on cybercriminals is critical to defending their organization.

The report from Searchlight Cyber looks at how CISOs are gathering data from the dark web to improve their security posture.

Continue reading

The role of service mesh in application security [Q&A]

Cyber Security lock icon Information Privacy Data Protection internet and Technology

As organizations embrace cloud-native development, they are building new types of applications and microservices that are easier to scale and add more business value.

But the growing adoption of microservices has introduced new security risks because microservices and modern applications contain more 'pieces' that increase the attack surface.

Continue reading

Canonical and NVIDIA work to make AI more accessible in the enterprise

Artificial intelligence

In 2018, OpenAI reported that the amount of computing power used in large-scale AI training runs had been doubled every 3.4 months since 2012. Around the same time, the volume of data generated also increased dramatically.

This means traditional, general-purpose enterprise infrastructure can't deliver the required computing power, nor can it support the petabytes of data required to train accurate AI models at this scale. Instead, enterprises need dedicated hardware designed for AI workloads.

Continue reading

Delivering good search results is essential but hard to do

Search Seo Online Internet Browsing Web

Whether you're trying to buy something or just looking for information, not being able to find what you want on a website is frustrating.

So it's not surprising that in a new survey of search practitioners from website search platform Lucidworks, 100 percent of respondents rank search relevance as being 'Highly Important'. What's more, 76 percent expect search relevance to become even more important in the future.

Continue reading

Load More Articles