Articles about Enterprise

Businesses taking longer to recover from cyber incidents

In 2024, businesses have reported taking an average of 7.3 months to recover from cybersecurity breaches -- 25 percent longer than expected and over a month past the anticipated timeline of 5.9 months.

This is among the findings of the latest Global Security Research Report from Fastly which also shows that recovery times are even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each -- 70 percent above the average -- and their recovery times stretched to 10.9 months.

Continue reading

How enterprises can maximize the value of automation [Q&A]

The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.

So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.

Continue reading

Skills gap leads enterprises to outsource cybersecurity

Outsourcing

A new survey of over 1,700 senior decision makers and influencers in leadership, technology and security roles across Europe finds that 48 percent manage their security operations in house compared to 52 percent who use a third party.

The study from Logpoint finds more than a quarter (28 percent) of UK businesses intend to outsource security over the course of the next two years.

Continue reading

Mitigating third-party risk in today's cyber ecosystem [Q&A]

As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.

We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.

Continue reading

New platform offers improved observability for enterprises

Woman looking through a magnifying glass

As the IT landscape becomes more complex it can be difficult for businesses to fully understand their risk profile and to ensure that they're getting the most from their investments.

With the launch of a new AI-powered unified observability platform, Kloudfuse aims to deliver improved anomaly detection and consolidated metrics, logs, traces, real user monitoring, continuous profiling, and more in a unified observability data lake.

Continue reading

Enterprises increase use of Apple products driven by security and user preference

A new report from Apple endpoint management specialist Kandji shows that 73 percent of organizations report that their number of Apple products has increased over the last year, driven primarily by employee preference (76 percent), security (50 percent), and reliability (43 percent).

Commissioned by Kandji and conducted by Dimensional Research, the global survey gathered insights from more than 300 IT professionals with responsibility for the management and delivery of Apple products to employees at a company with more than 1,000 employees and more than 500 end-user devices.

Continue reading

Identity system modernization held back by 'technical debt'

Modernizing identity systems is proving difficult for organizations due to two key challenges, decades of accumulated identity and access management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs).

A new report from Strata Identity and the Cloud Security Alliance (CSA) finds incompatibility with non-standard, legacy applications is a barrier to deploying advanced application authentication for 71 percent of respondents, further highlighting the issue of technical debt with 54 percent of respondents citing it as their top hurdle when modernizing their IAM architecture.

Continue reading

How AI is set to democratize information [Q&A]

One of the features of AI is its ability to process large volumes of data to identify patterns and make information more accessible.

We spoke to Igor Jablokov, CEO and founder of Pryon, about how enterprises can take advantage of this ability and make better use of their data.

Continue reading

New solution for safe enterprise AI deployment

GenAI is set to drive significant productivity gains, leading to massive economic growth, but enterprises face the challenge of deploying GenAI systems at scale and safely connecting to data systems while ensuring proper controls and governance.

To address this Securiti is releasing Gencore AI, a first of its kind holistic solution to easily and quickly build safe, enterprise-grade GenAI systems, copilots and AI agents.

Continue reading

Data governance needs to be made ready for AI

Improving data quality (42 percent), security (40 percent), and analytics (40 percent) remain top data governance drivers, but in 2024 ensuring data readiness and quality for AI (34 percent) has made the list as the fourth most cited driver of data governance programs.

A report from Quest Software and ESG (Enterprise Strategy Group) also shows organizations report evolving data and governance to an AI-ready state (33 percent) as a top three bottleneck impacting the data value chain, behind understanding the quality of source data (38 percent) and tied with finding, identifying and harvesting data assets (33 percent).

Continue reading

Enterprises vulnerable to look-alike domains

According to a new report, 80 percent of registered web domains that resemble a Global 2000 brand do not actually belong to that brand.

The report from enterprise-class domain registrar CSC shows that of the homoglyph (look-alike fake) domains owned by third parties other than the Global 2000 brand owners, 42 percent have MX records (email exchange records) compared with 40 percent in 2023. These MX records can be used to send phishing emails or to intercept email.

Continue reading

Gen AI adoption increases across key business functions

A new study reveals that 72 percent of business leaders report using Gen AI at least once a week, up from 37 percent in 2023.

The report by The Wharton School of the University of Pennsylvania, in collaboration with GBK Collective, shows a dramatic rise in generative AI adoption across key business functions, as enterprises move from cautious exploration to rapid integration.

Continue reading

Employees lack fundamental security awareness

Many executives are concerned about their employees' level of cyber risk awareness, with a new survey showing that 70 percent believe their employees lack critical cybersecurity knowledge, up from 56 percent in 2023.

The study, of 1,850 executives across 29 countries, from Fortinet also shows that over 60 percent of respondents expect more employees to fall victim to attacks in which cybercriminals use AI.

Continue reading

Majority of SaaS applications and AI tools are unmanaged

A new report reveals that 90 percent of SaaS applications and 91 percent of AI tools within enterprises remain unmanaged, suggesting a widespread vulnerability that continues to grow.

The study from Grip Security highlights the limitations of traditional security strategies in combating 'SaaS risk creep' the number of SaaS applications used in an enterprise increased by 40 percent over the last two years.

Continue reading

Good observability drives productivity for developer and ops teams

A new report from Splunk looks at the role of observability within today's increasingly complex IT environments.

Based on a survey of 1,850 ITOps and developer professionals, it finds enterprises with good observability resolve issues faster, boost developer productivity, control costs and improve customer satisfaction. Due to such benefits, 86 percent of all respondents plan to increase their observability investments.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.