Automation

IT security team

Understaffed but still delivering -- the reality of cybersecurity teams

A new survey of over 900 security decision makers across the US, Europe and Australia, finds 60 percent of security teams are small, with fewer than 10 members. But despite their size, 72 percent report taking on more work over the past year, and an impressive 88 percent are meeting or exceeding their goals.

The study, carried out by IDC for AI-powered workflow company Tines, also finds security leaders are bullish about AI with 98 percent embracing it and a mere five percent believing AI will replace their job outright.

By Ian Barker -
Linux automation penguin

New solution automates fixing Linux vulnerabilities

More than ever enterprises are turning to Linux solutions. But while the open source OS has a good reputation for security that doesn't mean that it’s invulnerable and it's important to stay on top of updates and patching.

Seal Security is launching Seal OS, a holistic solution designed to automatically fix vulnerabilities in both Linux operating systems and application code.

By Ian Barker -
IMG_0753

Microsoft and Apple should take a long hard look at Elon Musk’s ‘Big Balls’

Elon Musk has a reputation for rewriting the rules, and his latest venture at the helm of the Department of Government Efficiency (DOGE) is no exception. He’s brought on a 19-year-old known as "Big Balls" to help overhaul how the government operates, causing quite the stir, not only because of the nickname, but because of his young age.

"Big Balls" isn't just a provocative moniker regarding large testicles, however. Actually, this name more likely embodies courage, bold decision-making, and a defiance against conventional challenges. These are the traits that fuel breakthroughs, and let's face it -- big tech could benefit from infusing some of that spirit into their operations.

By Brian Fagioli -
script-attack

Sophisticated attack strategies target smaller businesses

Hackers are taking the methods and strategies tested on larger companies and applying them to organizations of every size.

Advanced evasion techniques -- once exclusive to advanced persistent threats -- have become the new normal, according to the latest threat report from Huntress. Techniques include endpoint detection and response (EDR) tampering, bring your own vulnerable driver (BYOVD) privilege escalations, and User Account Control (UAC) bypasses.

By Ian Barker -
Artificial intelligence business

GenAI is changing enterprise priorities with privacy a major concern

The latest Enterprise Cloud Index (ECI) survey from Nutanix shows that that while 80 percent of organizations have already implemented a GenAI strategy, implementation targets vary significantly.

Organizations are eager to leverage GenAI for productivity, automation, and innovation, but they also face critical hurdles in the form of data security, compliance, and IT infrastructure modernization. 95 percent of respondents agree that GenAI is changing their organization’s priorities

By Ian Barker -
AI-automation

IT industry today faces same issues that aggravated 1990s manufacturing: How can we take a cue from history?

Until the late 1990s, manufacturing reigned as the lifeblood of the global economy -- leading in productivity, employment, growth, and investments across all points of the world. However, once we neared the close of the 20th century, manufacturing found its Achilles heel in the compounded complexity accrued from outdated processes, an over-reliance on human labor that simply couldn’t meet its extreme needs, supply chain disruptions, and rising costs.

I fear that today, the information technology industry finds itself at all-too-familiar cross-roads. Why is this?

By Bill Lobig -
Office chaos abyss

Increasing business process complexity could lead to chaos

A new report shows 82 percent of organizations fear 'digital chaos' due to increasingly complex, interconnected, and automated processes. According to the report, a lack of control has increased compliance risks for 82 percent of organizations, while 77 percent report higher risks of core business processes failing.

The study from Camunda highlights that organizations now manage an average of 50 endpoints to execute tasks that are part of a process in their business. This is an increase of 19 percent over the past five years, and is contributing to growing business risk.

By Ian Barker -
Man_laptop_pool

AI and automation: The future of pool care

As technology advances, the integration of artificial intelligence and automation is reshaping the landscape of pool maintenance. These innovations promise not only to enhance efficiency but also to align with eco-friendly practices, paving the way for a sustainable future in pool care.

The future of pool maintenance is being defined by the convergence of AI and automation. Homeowners are increasingly adopting these technologies to streamline pool care, reduce manual labor, and minimize environmental impact. A prime example is the use of a solar powered pool skimmer, which combines AI-driven efficiency with renewable energy, setting a new standard for sustainable pool management.

By Wayne Williams -
Apple Macbook

Apple's approach to MDM and what we can learn from it [Q&A]

The rise of hybrid and remote working has put added emphasis on the need for mobile device management (MDM).

We spoke to Weldon Dodd, SVP of global solutions at cloud-based automation and device management specialist Kandji, to find out more about Apple's approach to MDM and the broader lessons businesses can apply from this in order to solve complex IT challenges.

By Ian Barker -
Automation graphic

How enterprises can maximize the value of automation [Q&A]

The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.

So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.

By Ian Barker -
software development coding

Why DevOps teams are shifting to platform engineering [Q&A]

Software development has become increasingly demanding in recent years often driven by underlying infrastructure complexities.

This is leading some organizations to shift towards dedicated platform engineering teams. These can help by automating repetitive tasks, enhancing security protocols, and providing seamless integration across diverse systems. This in turn enables developers to focus on their core role of building applications.

By Ian Barker -
Closed office

Is the IT enterprise helpdesk an endangered species?

The IT helpdesk could be extinct by 2027 according to a new survey of 1,000 global IT workers which finds that 79 percent believe the current service desk model will be unrecognizable within three years, with 77 percent saying new technologies will render it 'redundant' by 2027.

The study by digital employee experience company Nexthink shows 87 percent of IT workers also report that, with digital transformation having greatly expanded the size and complexity of enterprise IT environments, incident response is 'economically unsustainable' unless helpdesks have significant proactive capabilities.

By Ian Barker -
Zero Day

Why automation isn't the answer to zero-day attacks [Q&A]

Last year saw almost 100 zero-day attacks, putting a strain on security teams and becoming known as the 'Hot Zero-Day Summer.'

In response to these attacks, the first instinct of many organizations has been to turn to automation. But Marc Rubbinaccio, manager, compliance at Secureframe, doesn't believe that this is the right approach. We spoke to him to find out more.

By Ian Barker -
DevOps Agile development concept on virtual screen.

How DevOps teams can get ready to explore DORA [Q&A]

It's essential for businesses to get security, privacy and governance right -- not only to prevent breaches, but also comply with increasing numbers of regulations.

DevOps Research and Assessment (DORA) best practices are the gold standard for spotting vulnerabilities across both cloud and mainframe environments and improving development efficiency.

By Ian Barker -
money lock

Cyberecurity budgets increase as complexity grows

An overwhelming 91 percent of respondents to a new survey say their security budget is increasing this year, demonstrating a growing recognition of the importance of cybersecurity within organizations.

However, the report from Seemplicity shows organizations report using an average of 38 different security product vendors, suggesting high levels of complexity and fragmentation within their attack surfaces.

By Ian Barker -

© 1998-2026 BetaNews, Inc. All Rights Reserved.