Articles about Automation

Helpdesks struggle to keep up with cyber threats

Helpdesk staff

Helpdesks are bogged down by repetitive, time-consuming tasks (34 percent), long resolution times (34 percent) and limited resources (31 percent).

This is among the findings of the latest digital employee experience (DEX) report from Ivanti. It shows that while many businesses are automating certain operations, like security patch management (72 percent) and IT ticket routing (67 percent), but nearly 40 percent still haven't automated password resets -- missing an easy win that could eliminate countless routine support tickets.

Continue reading

Automated red-teaming helps protect enterprise AI

IT security team

Artificial intelligence is being used to streamline many business tasks, but at the same time it opens up new attack vectors and risks.

Secure AI specialist WitnessAI is announcing two new products aimed at securing enterprise LLMs and AI applications through automated red-teaming and behavioral runtime protection.

Continue reading

New research shows gap between AI potential and workplace readiness

AI network enterprise

The latest Technology Enablement Survey from Eagle Hill Consulting shows that most US employees use workplace technology and believe it can improve productivity.

But despite this, many organizations are missing opportunities by failing to take a people-focused approach, which can limit the adoption of the automation and AI tools that employees say they need in order to work more effectively.

Continue reading

Meeting the challenges of running a modern service desk [Q&A]

Telephone handset

In today's interconnected world, the IT service desk often serves as the invisible backbone of any successful organization, from troubleshooting minor glitches to resolving critical system outages.

But beneath this seemingly straightforward function lies a complex web of challenges that can significantly impact efficiency, user satisfaction, and ultimately, an organization's bottom line.

Continue reading

New tool helps organizations ignore CVEs

risk management

Ignoring vulnerabilities and exposures may not seem like a good idea, but conventional strategies rely heavily on vulnerability severity (CVSS) and exploitability indicators (EPSS), which ignore whether vulnerabilities are exploitable or already mitigated by existing defenses in a specific organization.

More than 40,000 new CVEs were disclosed in 2024, of which 61 percent were labeled as high or critical, but they won't all be a risk to every business. A new tool from Picus Security allows security teams to verify the exploitability of vulnerabilities and determine which pose real-world risks based on their unique environments.

Continue reading

Cloud waste -- why it's a problem and how to tackle it [Q&A]

Cloud money dollar

In recent years, businesses have stampeded to move systems to the cloud. But in doing so they often unwittingly introduce multiple layers of virtualization which means they can be paying to run the same processes multiple times.

Can optimization techniques help to improve performance and cut cloud costs? We spoke to Dr. Ignacio M Llorente, CEO and founder of OpenNebula Systems to find out more.

Continue reading

New Qualys tool aims to streamline enterprise compliance audits

Compliance rule law and regulation graphic interface for business quality policy

Enterprises are grappling with an increasing compliance burden, subject to multiple frameworks and more regulatory mandates that stretch resources and drive-up costs.

Misconfigurations can further complicate things, often leading to non-compliance and regulatory penalties. Plus time-consuming tasks like auditing, reporting, and system remediation are prone to human error.

Continue reading

Supply chain resilience rated as highly as cybersecurity

Software supply chain blockchain

A new study finds 83 percent of executives now rank supply chain resilience as being as critical as cybersecurity, and many are turning to technology to strengthen their operations.

The research from Cleo shows that to bolster resilience, 47 percent are considering artificial intelligence (AI), recognizing its potential to automate processes, predict disruptions, and enhance decision-making.

Continue reading

Understaffed but still delivering -- the reality of cybersecurity teams

IT security team

A new survey of over 900 security decision makers across the US, Europe and Australia, finds 60 percent of security teams are small, with fewer than 10 members. But despite their size, 72 percent report taking on more work over the past year, and an impressive 88 percent are meeting or exceeding their goals.

The study, carried out by IDC for AI-powered workflow company Tines, also finds security leaders are bullish about AI with 98 percent embracing it and a mere five percent believing AI will replace their job outright.

Continue reading

New solution automates fixing Linux vulnerabilities

Linux automation penguin

More than ever enterprises are turning to Linux solutions. But while the open source OS has a good reputation for security that doesn't mean that it’s invulnerable and it's important to stay on top of updates and patching.

Seal Security is launching Seal OS, a holistic solution designed to automatically fix vulnerabilities in both Linux operating systems and application code.

Continue reading

Microsoft and Apple should take a long hard look at Elon Musk’s ‘Big Balls’

IMG_0753

Elon Musk has a reputation for rewriting the rules, and his latest venture at the helm of the Department of Government Efficiency (DOGE) is no exception. He’s brought on a 19-year-old known as "Big Balls" to help overhaul how the government operates, causing quite the stir, not only because of the nickname, but because of his young age.

"Big Balls" isn't just a provocative moniker regarding large testicles, however. Actually, this name more likely embodies courage, bold decision-making, and a defiance against conventional challenges. These are the traits that fuel breakthroughs, and let's face it -- big tech could benefit from infusing some of that spirit into their operations.

Continue reading

Sophisticated attack strategies target smaller businesses

script-attack

Hackers are taking the methods and strategies tested on larger companies and applying them to organizations of every size.

Advanced evasion techniques -- once exclusive to advanced persistent threats -- have become the new normal, according to the latest threat report from Huntress. Techniques include endpoint detection and response (EDR) tampering, bring your own vulnerable driver (BYOVD) privilege escalations, and User Account Control (UAC) bypasses.

Continue reading

GenAI is changing enterprise priorities with privacy a major concern

Artificial intelligence business

The latest Enterprise Cloud Index (ECI) survey from Nutanix shows that that while 80 percent of organizations have already implemented a GenAI strategy, implementation targets vary significantly.

Organizations are eager to leverage GenAI for productivity, automation, and innovation, but they also face critical hurdles in the form of data security, compliance, and IT infrastructure modernization. 95 percent of respondents agree that GenAI is changing their organization’s priorities

Continue reading

IT industry today faces same issues that aggravated 1990s manufacturing: How can we take a cue from history?

AI-automation

Until the late 1990s, manufacturing reigned as the lifeblood of the global economy -- leading in productivity, employment, growth, and investments across all points of the world. However, once we neared the close of the 20th century, manufacturing found its Achilles heel in the compounded complexity accrued from outdated processes, an over-reliance on human labor that simply couldn’t meet its extreme needs, supply chain disruptions, and rising costs.

I fear that today, the information technology industry finds itself at all-too-familiar cross-roads. Why is this?

Continue reading

Increasing business process complexity could lead to chaos

Office chaos abyss

A new report shows 82 percent of organizations fear 'digital chaos' due to increasingly complex, interconnected, and automated processes. According to the report, a lack of control has increased compliance risks for 82 percent of organizations, while 77 percent report higher risks of core business processes failing.

The study from Camunda highlights that organizations now manage an average of 50 endpoints to execute tasks that are part of a process in their business. This is an increase of 19 percent over the past five years, and is contributing to growing business risk.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.