Cyber exposure management in today's enterprise landscape [Q&A]

Data security business

The cybersecurity landscape is more complex than ever and that means enterprises need to have a real-time picture of their exposure.

We spoke to Nadir Izrael, CTO and co-founder of Armis, to learn what this should look like and how security teams can evaluate and evolve their security programs to achieve more control over their asset landscape.

Continue reading

Addressing AI challenges for the enterprise [Q&A]

Enterprise AI

With more and more businesses keen to benefit from the possibilities that AI offers it seems like everyone is jumping on the bandwagon. But this raises a number of implementation and management challenges, especially now as enterprise AI workloads begin to scale.

We spoke to Tzvika Zaiffer, solutions director at Spot by NetApp, to discuss how these challenges can be addressed and the best practices that are emerging to ensure that implementations go smoothly.

Continue reading

Supply chain attacks up over 400 percent since 2021

Software supply chain blockchain

A new report from cyber insurance provider Cowbell shows that supply chain attacks have increased by an astounding 431 percent since 2021.

It also shows that large enterprises (those with greater than $50 million revenue) are 2.5 times more likely to encounter cyber incidents. Manufacturing is the most vulnerable sector, driven by its reliance on automation and exposure to intellectual property threats.

Continue reading

HP offers enhanced protection for enterprise endpoints

Endpoint security - Inscription on Blue Keyboard Key.

The rise of remote and hybrid work has increased the risk of PCs being compromised by attackers with brief physical access, underscoring the need for protection and visibility into the integrity of devices throughout their lifetimes.

To combat this, HP is launching a new HP Enterprise Security Edition, a unique suite of capabilities designed to enhance the physical security of PC endpoints.

Continue reading

Attackers target holidays and weekends to catch enterprises off guard

shop closed sign

Cyberattackers are targeting holidays and weekends to cause maximum disruption, yet many businesses remain underprepared outside of standard working hours.

A new report from Semperis, based on a survey of almost 1,000 cybersecurity professionals, shows that 86 percent of surveyed organizations in the US, UK, France and Germany that were attacked were targeted during a holiday or weekend.

Continue reading

Businesses taking longer to recover from cyber incidents

Recovery Backup Restoration Data Storage Security Concept

In 2024, businesses have reported taking an average of 7.3 months to recover from cybersecurity breaches -- 25 percent longer than expected and over a month past the anticipated timeline of 5.9 months.

This is among the findings of the latest Global Security Research Report from Fastly which also shows that recovery times are even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each -- 70 percent above the average -- and their recovery times stretched to 10.9 months.

Continue reading

How enterprises can maximize the value of automation [Q&A]

Automation graphic

The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.

So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.

Continue reading

Skills gap leads enterprises to outsource cybersecurity

Outsourcing

A new survey of over 1,700 senior decision makers and influencers in leadership, technology and security roles across Europe finds that 48 percent manage their security operations in house compared to 52 percent who use a third party.

The study from Logpoint finds more than a quarter (28 percent) of UK businesses intend to outsource security over the course of the next two years.

Continue reading

Mitigating third-party risk in today's cyber ecosystem [Q&A]

Third party risk domino effect

As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.

We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.

Continue reading

New platform offers improved observability for enterprises

Woman looking through a magnifying glass

As the IT landscape becomes more complex it can be difficult for businesses to fully understand their risk profile and to ensure that they're getting the most from their investments.

With the launch of a new AI-powered unified observability platform, Kloudfuse aims to deliver improved anomaly detection and consolidated metrics, logs, traces, real user monitoring, continuous profiling, and more in a unified observability data lake.

Continue reading

Enterprises increase use of Apple products driven by security and user preference

iMac computer and glasses on the table

A new report from Apple endpoint management specialist Kandji shows that 73 percent of organizations report that their number of Apple products has increased over the last year, driven primarily by employee preference (76 percent), security (50 percent), and reliability (43 percent).

Commissioned by Kandji and conducted by Dimensional Research, the global survey gathered insights from more than 300 IT professionals with responsibility for the management and delivery of Apple products to employees at a company with more than 1,000 employees and more than 500 end-user devices.

Continue reading

Identity system modernization held back by 'technical debt'

Business login

Modernizing identity systems is proving difficult for organizations due to two key challenges, decades of accumulated identity and access management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs).

A new report from Strata Identity and the Cloud Security Alliance (CSA) finds incompatibility with non-standard, legacy applications is a barrier to deploying advanced application authentication for 71 percent of respondents, further highlighting the issue of technical debt with 54 percent of respondents citing it as their top hurdle when modernizing their IAM architecture.

Continue reading

How AI is set to democratize information [Q&A]

robot hand shake with human

One of the features of AI is its ability to process large volumes of data to identify patterns and make information more accessible.

We spoke to Igor Jablokov, CEO and founder of Pryon, about how enterprises can take advantage of this ability and make better use of their data.

Continue reading

New solution for safe enterprise AI deployment

Enterprise AI

GenAI is set to drive significant productivity gains, leading to massive economic growth, but enterprises face the challenge of deploying GenAI systems at scale and safely connecting to data systems while ensuring proper controls and governance.

To address this Securiti is releasing Gencore AI, a first of its kind holistic solution to easily and quickly build safe, enterprise-grade GenAI systems, copilots and AI agents.

Continue reading

Data governance needs to be made ready for AI

Improving data quality (42 percent), security (40 percent), and analytics (40 percent) remain top data governance drivers, but in 2024 ensuring data readiness and quality for AI (34 percent) has made the list as the fourth most cited driver of data governance programs.

A report from Quest Software and ESG (Enterprise Strategy Group) also shows organizations report evolving data and governance to an AI-ready state (33 percent) as a top three bottleneck impacting the data value chain, behind understanding the quality of source data (38 percent) and tied with finding, identifying and harvesting data assets (33 percent).

Continue reading

Load More Articles