The technology turning point: Five key tech trends that will define the next decade
The central theme of this year’s World Economic Forum is how history is at a 'turning point', based on the era-defining impact of the COVID-19 pandemic. This moment is not just a turning point in history, but also for technology: businesses and society are in the midst of a digital revolution.
To underline just how much change is afoot, Gartner says worldwide IT spending will increase 5 percent this year, hitting $4.5 trillion. With so much going on, it can be hard to focus on what the key technology developments are, meaning there is a risk of spreading yourself too thinly. To help cut through the noise and prioritize the biggest technology trends, here are five key technology trends that look set to define the next decade, and beyond.
Five steps to a secure cloud architecture
Policy as code is central to establishing and maintaining secure cloud architecture by enabling security teams to impart their knowledge across the organization in a common, machine-readable language.
Cloud computing cyberattacks don’t play out like the scenes from Hollywood thrillers. No one is slowly lowering Tom Cruise into a preselected target’s secure data center equipped with ultrasensitive noise, temperature and motion detectors so he can steal a specific file.
Enterprises overspend by millions on cloud services
New research reveals enterprises are over-spending on cloud services by up to $8.5 million, as IT leaders grow frustrated with poor management tools, vendor-lock in and issues with accessing data.
A study from Couchbase of IT decision makers at enterprises with more than 1,000 staff finds a typical annual spend on cloud services to now stand at $33 million. However, functions that are not currently meeting businesses expectations account for over 35 percent of the total cost.
APIs and cloud apps are greatest threats to enterprise security readiness
A survey of over 400 CISOs finds they are are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs).
The study from CISOs Connect, an invitation-only community of cyber experts and part of Security Current, finds the IT components rated as most needing improvement are: APIs (42 percent), cloud applications (SaaS) (41 percent), and cloud infrastructure (IaaS) (38 percent).
Microsoft Entra is a new identity and access-focused family of products
Microsoft has launched a new family of products called Entra. Microsoft Entra encompasses a number of identity and access management solutions including the existing Azure AD. The launch comes after the acquisition of CloudKnox Security last year, and is Microsoft's attempt to help boost security across multicloud environments -- or "secure access for a connected world".
Bolstering the product family, the company has also launched cloud permission management tool Microsoft Entra Permissions Management, and Microsoft Entra Verified ID -- a system that allows for more secure interactions, based on decentralized identity standards. Microsoft has also announced public previews of Workload Identities and Lifecycle Workflows.
Broadcom to acquire VMware for $61 billion
Broadcom has struck a deal with VMware that will see the chipmaker buying the cloud and virtualization software firm for around $61 billion in cash and stock. As part of the acquisition, Broadcom will also take on $8 billion of VMware's net debt.
When the deal is complete, Broadcom Software Group will rebrand and operate as VMware. As part of Broadcom, the new VMware will, the company says, "offer enterprise customers greater choice and flexibility to address the most complex IT infrastructure challenges".
Business-critical systems going unsecured and unmonitored
According to a new poll 40 percent of enterprises don't include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent are unsure if systems are included in their cybersecurity monitoring at all.
The survey from Logpoint also shows only 23 percent say the process of reviewing SAP logs for cybersecurity events or cyberthreat activity is automated through SIEM, with almost 19 percent still doing so manually.
Growing complexity leads enterprises to look for new service providers
A new study from CloudBolt Software reveals that 80 percent of enterprises are so frustrated with their existing cloud-oriented provider they are actively looking for a replacement within the next twelve months.
At the core of this dissatisfaction with CSPs and MSPs is the growing complexity of multi-cloud environments, and a widening skills gap among both enterprises and service providers.
What is unified observability and why is it important? [Q&A]
There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.
Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.
Why moving to the cloud is right for government agencies
Over the last few years in enterprise IT, the fight between on-premise software and cloud services has been dominating tech conversations. Today, many businesses realize we will never return to the in-office routine we experienced before the pandemic. As remote and hybrid work becomes the norm, constituents now expect to be communicated through various channels, including mobile.
The introduction of mobile-focused operations showcases the need for technology system improvements within the public sector.
Enterprises struggle to discover cloud access policies
Cloud use is commonplace among large enterprises, with 82 percent of organizations with $1B or more in revenue using three or more clouds, up from 66 percent last year.
However, with the majority of companies (70 percent) using two or more identity systems, 75 percent of respondents say they lack the ability to easily discover all existing access policies, according to a new study conducted by Osterman Research for Strata Identity.
Enterprise cloud costs up over 90 percent in the past year
Cloud costs are a measure of the services businesses are using, but they also reflect the wider market and the pricing strategies of providers.
Cloud native service provider Civo has carried out a survey into what businesses are spending on cloud and finds that enterprise cloud costs have risen by 93 percent on average in the past year.
Three-quarters of companies focus development on cloud-native applications
More and more workloads are being shifted to the cloud and a new report from Tigera shows that 75 percent of companies are focusing development on cloud-native applications.
But this increased development and deployment of cloud-native applications also creates the need for more advanced observability and security capabilities.
IT leaders say Log4Shell was a wake-up call for cloud security
The Log4Shell vulnerability proved to be one of the major cybersecurity events of last year and its repercussions continue to rumble on.
Research from network security platform Valtix shows 95 percent of IT leaders say Log4Shell was a wake up call for cloud security, changing it permanently, and 87 percent feel less confident about their cloud security now than they did before the incident.
New free tool aims to tackle post-pandemic cloud bloat
As enterprises have moved to make their systems more accessible to hybrid working during the pandemic, they have increasingly been turning to cloud-based solutions.
But this rapid growth of cloud infrastructure leads to problems managing and optimizing cloud resources. Which is why cloud networking company Alkira is launching a free tool to expose shadow IT and recommend ways to secure, optimize, and boost cloud deployments.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.