Articles about Enterprise

Employees put sensitive data at risk in workplace chat sessions

Chat network

Around a quarter of employees share confidential information via chat sessions, and a similar number talk badly about their boss, while 78 percent wouldn’t care if some of this information was exposed publicly.

These are among the findings of a new study by secure collaboration platform Symphony which surveyed over 1,500 employees in the US and UK about their workplace communication habits.

Continue reading

Over half of data-driven initiatives are failing

success v failure

More than half of data-driven initiatives are failing in business, with 27 percent of failures due to a skills shortage according to new research from analytic database company Exasol.

In the public sector, financial services and energy and utilities companies the failure rate rises to more than 60 percent. And in retail and financial services 40 percent blame skills shortages for failures.

Continue reading

All endpoint security tools eventually fail

Endpoint protection

The endpoint is on the front line of the network security battle, but a new study from Absolute reveals that endpoint security tools and agents fail, reliably and predictably.

The study analyzed data from six million devices and one billion change events over the course of a year. It finds the complexity of endpoint device controls creates a false sense of security among organizations while, in reality, causing security gaps and significant risks due to regular and reliable tool failure.

Continue reading

New platform helps search and analysis of cloud-stored data

Cloud

As companies store ever larger amounts of data, the current solutions and services available to handle it become more and more costly and difficult to manage.

To address these challenges, Boston-based CHAOSSEARCH is launching a new platform that delivers rapid search and analytics through a managed service, based on simple, elastic storage.

Continue reading

Energy industry vulnerable to attacks on outdated systems

Cooling towers

Critical infrastructure sites and energy distribution facilities are increasingly being targeted by cybercriminals. But many of the systems in use today were installed and built before 24/7 internet connections.

A new report from Finnish cybersecurity company F-Secure highlights the fact that cybersecurity was not a realistic threat when these systems were manufactured, and legacy protocols and systems never had the built-in security controls that we take for granted today. Connecting these systems to the internet has opened them up to attacks from myriad angles.

Continue reading

Data center and server room considerations: What you need to know

Warehouse huge room server

In the rapidly-evolving data-hungry IT environment, data center management is becoming increasingly intensive and complex. Team that with the constant pressure to control costs while increasing efficiency and capacity, data center traffic is projected to more than triple by 2020, driven primarily by our dependence to do business, communicate, and entertain over the Internet.

The immense amount of data needed to support these activities requires not only a growing number of data centers, but new kinds of data center builds, which also necessitates new ways to manage them. In addition, green initiatives driven by power concerns and the implications of size and scale, coupled with the adoption of new technologies, are creating a confluence of often conflicting forces that require new and innovative data center management solutions.

Continue reading

The biggest data security risk? Downloading data to a spreadsheet

Excel

These days, it seems like every time you turn around another company announces a data breach. At the same time, organizations spend millions on their data warehouses, security solutions, and compliance initiatives. But all of that spend can instantly be rendered useless by the everyday business workflow of downloading data to a Microsoft Excel spreadsheet.

Of course, business experts aren’t looking to circumvent enterprise governance practices. They’re just trying to get the answers they need to make better business decisions. And because they lack the SQL programming expertise or extensive training required to work with data directly in most business intelligence (BI) tools, they are often powerless to answer the questions raised in the last meeting or email. So they turn to what they know best: the spreadsheet.

Continue reading

The evolution of data and disparate systems

Evolution

The weird thing about evolution is that it affects us even though we are deeply aware of its mechanisms and processes. There's something unavoidable and inexorable about it. While that's true of physical processes governed by natural selection, perhaps it's less true of human culture and technology. Or is it?

Over the long history of IT and its use in and by big business, we've seen constant innovation, sometimes incremental in progress but sometimes radically discontinuous. Consider the steady march of microprocessor performance in the former case and the sudden AI deep learning revolution for the latter. But in both cases what's happened before and what's happening now affect and influence what directions tech goes into tomorrow.

Continue reading

How to secure Windows 10 -- Microsoft reveals SECCON framework to protect systems

Microsoft SECCON framework

Based on the DEFCON levels, Microsoft has unveiled the SECCON framework -- a series of guides for securing a range of Windows 10 configurations in different environments.

Starting with an "Administrator workstation" at level 1 and building up to "Enterprise security" at level 5, the framework is Microsoft's attempt to simplify and standardize security. While it is not a one-size-fits-all solution, the company says it is "defining discrete prescriptive Windows 10 security configurations to meet many of the common device scenarios we see today in the enterprise".

Continue reading

European financial services industry struggling with lack of data skills

Money

Nearly 40 percent of financial services businesses are failing to implement data initiatives due to a lack of skills, with almost a third saying that their GDPR initiatives are failing, according to a new study.

The report produced by Vanson Bourne for analytics database company Exasol is based on responses from 500 IT and business decision makers, from enterprises in Germany and the UK.

Continue reading

PC-as-a-Service or managed device services? The difference matters

confused-confusion

If you are among the many who are confused about PC-as-a-Service (PCaaS) or Device-as-a-Service (DaaS), you are not alone. A frequently asked question on the subject is, "Isn’t this just a lease?" The simple answer is, "No, it is not."

Financially, this model has more in common with a rental agreement with services attached, because you never actually hold the title to the hardware. Rather, at the end of the agreement, you discontinue the service or renew, generating an automatic refresh. Simply put, PCaaS is one more financial "vehicle" at your disposal, in addition to leasing and buying.

Continue reading

Businesses complacent about mainframe security

mainframe

Although 85 percent of companies say mainframe security is a top priority, just 33 percent always or often make mainframe decisions based on security finds a new report.

The study from mainframe vulnerability specialist Key Resources Inc, based on research by Forrester Consulting also finds 67 percent of respondents admit that only sometimes or rarely are they factoring security into mainframe decisions.

Continue reading

Securing serverless computing, the latest cloud paradigm [Q&A]

cloud padlock

The cloud-skills shortage has made security a major challenge for enterprises. In fact, virtually every data breach in the cloud today is due to human error, rather than brilliant hacking. Hackers don't even bother launching attacks in the public cloud; they simply look for misconfigured systems that leave data exposed.

Against this backdrop, a whole new cloud model is taking hold -- serverless computing. In a world where cloud certifications and security skills are already in short supply and causing chaos in the cloud, what will serverless computing do to compound that problem for enterprises? Is it possible for organizations to avoid making the same mistakes with this new paradigm that they are making in traditional cloud environments?

Continue reading

Cohesity launches as-a-service backup for Google Cloud

Backup key

As companies move more of their workloads to the cloud they want to ensure that their data is properly protected.

Storage specialist Cohesity is launching a new software as a service (SaaS) solution that delivers enterprise-grade backup and recovery for applications running on the Google Cloud platform.

Continue reading

Zoho launches new commerce and marketing platforms

Zoho logo

Cloud business system company Zoho is launching two new platforms. Commerce Plus uses Zoho's customer experience, finance, analytics, and intelligence software to provide businesses an interconnected, first-of-its-kind commerce experience platform.

The Zoho Marketing Platform can support over 20 different marketing channels, including websites, social, events, text, email, ads, offline, and more.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.