More than half of enterprises worried about supply chain risks

break_chain

Software supply chain risk has become mainstream, with 52 percent of respondents to a new survey being concerned about it.

The study from cybersecurity company Coalfire also finds 50 percent of boards of directors with software-buying companies are raising concerns, which means that responsibility for software supply chain risk is no longer confined to technical teams.

Continue reading

Research reveals weaknesses in five popular web services

server vulnerability unlock

New research from Specops Software finds major cybersecurity weaknesses in popular web services including Shopify, Zendesk, Trello, and Stack Overflow.

The study shows several popular business web applications have failed to implement critical password and authentication requirements to protect customers from cybercrime.

Continue reading

Average cost of a data breach increases by 16 percent

Thief stealing money with laptop and credit card

A new report released today by ForgeRock shows the average cost of a breach in the US has increased by 16 percent to $9.5m, making the US the costliest place in the world to recover from a breach.

It also reveals a massive 297 percent surge in breaches caused primarily by security issues associated with supply chain and third-party suppliers and representing almost 25 percent of all breaches.

Continue reading

Overview of network operations is crucial for IT teams

binoculars lomg term view

A unified view of network operations is essential for IT teams that want to improve the digital customer experience while boosting their overall productivity, according to a new study.

A new survey for Riverbed, conducted by IDC, reveals that 90 percent of respondents currently use observability tools, yet 60 percent of them believe those tools are too narrowly focused and fail to provide a complete and unified view of their organization's operating conditions.

Continue reading

Now that 5G is becoming widespread what can we expect from 6G? [Q&A]

Mobile tracking

The 5G rollout is continuing, but technology companies, academics, service providers, and even governments are already starting to look ahead to the next generation of mobile technology.

So, what is 6G and what benefits will it offer over earlier standards? We spoke to Roger Nichols, 6G program manager at Keysight Technologies, to find out.

Continue reading

Lack of automation costs enterprises millions

Automation

A lack of automation capabilities for managing IT performance costs an average of $46 million a year according to a new study. While 57 percent of organizations see automation as the key enabler for closing the modernization skills gap in managing IT Operations.

The report from research firm Digital Enterprise Journal also reveals a 54 percent increase in cost of one hour of IT service down time since 2019. In addition 68 percent of IT teams' time is spent on tasks that do not contribute to key business outcomes.

Continue reading

The artificial intelligence tug-of-war in the world of cybersecurity [Q&A]

pixel padlock

It's a rare cybersecurity product these days that doesn't claim to have some form of AI capability. But exactly what benefits does AI deliver? And is there a risk of an arms race as threat actors also turn to the technology?

We spoke to Corey Nachreiner, CSO at WatchGuard Technologies, to find out more about the role of AI in cybersecurity.

Continue reading

Security and automation are top priorities for IT pros

Priorities

The top three priorities for IT professionals are improving IT security overall (52 percent), increasing IT productivity through automation (33 percent), and migrating to the cloud (32 percent), according to a new report.

A survey of almost 2,000 IT pros from Kaseya also reveals the main three challenges are cybersecurity and data protection (49 percent), insufficient IT budgets and resources to meet demands (29 percent), and legacy systems that hamper growth and innovation (21 percent).

Continue reading

Identifying key risks is top cybersecurity challenge

Risk dial

Risk-based strategies are most successful in preventing security breaches, according to a new study from Skybox Security.

Of companies taking a risk-based approach 48 percent suffered no breaches, 50 percent were top performers in time to mitigate issues, and 46 percent top performers in response time.

Continue reading

Update seems to be the hardest word as enterprises struggle to maintain endpoints

update button

The average enterprise now manages approximately 135,000 endpoint devices. But in spite of large budgets spent on endpoint protection, an average of 48 percent of devices -- or 64,800 per enterprise -- are at risk because they are no longer detected by the organization's IT department or because operating systems have become outdated.

A new study conducted by the Ponemon Institute for Adaptiva also finds 63 percent of respondents find that the lack of visibility into endpoints is the most significant barrier to achieving a strong security posture.

Continue reading

Size matters -- small cybersecurity teams face greater risk of attack

Operations center

Companies with small security teams continue to face a number of unique challenges that place these organizations at greater risk than larger enterprises, according to a new study.

Research from Cynet, based on responses from 200 CISOs at small and medium businesses, finds 58 percent feel their risk of attack is higher compared to enterprises, despite the fact that enterprises are a bigger target.

Continue reading

Ten years of IPv6 and how it's changed the internet [Q&A]

IPv6 city

The IPv6 protocol reached its 10th birthday in June this year. By using more address bits than the earlier IPv4 it opened up the way for more connected devices.

But IPv6 has other benefits too. We spoke to Akamai fellow and chief architect Erik Nygren to find out more about them and how they've changed the internet.

Continue reading

Businesses struggle with high levels of 'dark data'

Dark data

In a new survey 42 percent of respondents say at least half of their data is 'dark data' -- retained by the organization, but never used.

The study from Quest Software, in collaboration with the Enterprise Strategy Group (ESG), highlights the top challenges and innovations in data governance, data management and DataOps.

Continue reading

Majority of industrial IoT security projects end in failure

Industrial fail

According to new research, 93 percent of organizations have had failed industrial Internet of Things or operational technology (IIoT/OT) security projects.

The study from Barracuda Networks surveyed 800 seniors staff responsible for IIoT/OT security and finds that 94 percent admit experiencing a security incident in the last 12 months, while 87 percent of organizations that experienced an incident were impacted for more than one day.

Continue reading

Asset visibility is a major challenge for security professionals

Binoculars laptop

A new study of over 100 security professionals, carried out by unified asset intelligence platform Armis, shows almost 40 percent say asset visibility is the biggest challenge facing their organizations.

A quarter say poor asset visibility is the biggest risk and over half (54 percent) of respondents say employee behavior is a top risk.

Continue reading

Load More Articles