Three trends in tracking software delivery
Over the past decade, software has made giant leaps in allowing us to track, analyze and visualize the incredible amounts of data flowing across our organizations. Storage is rarely a bottleneck, advances in non-relational databases have helped capture growing volumes of data, and machine learning approaches promise to assist with deriving meaning and insight. Yet for the vast majority of large organizations, one kind of data seems immune to providing any kind of business intelligence -- the data for tracking software delivery itself.
Even organizations building the data analysis tools are struggling to find meaningful insights from the many tools and repositories that capture their own largest investment: building software. It would appear that the cobbler’s children have no shoes. Given all the advancements, how is this possible? And how can the situation change? If you have been tasked with providing insight or visibility into the data locked up in tools used to plan, code, deliver and support your organization’s software, here are three trends you should be aware of:
Isolating privileged access is critical to security
A new study reveals that 87 percent of cybersecurity professionals believe separating privileged environments from corporate, internet-exposed environments is highly critical for protecting sensitive information.
But the Privileged Access Workstations (PAW) survey carried out by Cybersecurity Insiders for endpoint security company Hysolate also finds that time-consuming access processes and the inability to install apps, browse the web or plug in external devices, are key implementation roadblocks.
97 percent of companies struggle to deploy and manage public clouds
Public cloud adoption is growing fast, but it's not without problems. A new report from network verification company Veriflow uncovers a disconnect between network and other teams involved in the management and oversight of the public-cloud portion of their networks.
IT teams are struggling with network infrastructure challenges caused by the cloud, such as impaired visibility and more frequent security threats.
Optimizing cost is key priority for cloud users
Optimizing existing cloud use for cost savings is the top initiative for users in 2019 for the third year in a row, increasing to 64 percent from 58 percent in 2018.
This is one of the findings of the RightScale 2019 State of the Cloud Report from Flexera. Among other highlights are that enterprises plan to spend 24 percent more on public cloud in 2019 compared to 2018.
How next generation technology is transforming the data center [Q&A]
The demands of digital transformation inevitably lead to additional stresses on the data center. It's no surprise then that enterprises are increasingly turning to technology solutions to improve their data center management and workload monitoring.
But what can these solutions deliver and how effective are they? We spoke to Jeff Klaus, GM of data center management solutions at Intel, to find out.
The cloud moves too fast for security say 60 percent of security pros
Cloud-based business initiatives are accelerating faster than security organizations' ability to secure them according to 60 percent of respondents to a new survey.
The study by network security company FireMon also finds that in many cases security personnel are not even included in cloud business initiatives.
5 tips to help CIOs overcome patching problems
With endpoint attacks on the rise, and the risk and cost of a data breach steadily increasing, protecting enterprise networks has become an urgent priority. And, it seems that no one is immune: in a recent survey of global companies, 93 percent experienced a cyberattack in the last year. For one-third of those companies, attacks were a weekly occurrence.
While cybercriminals are certainly working overtime to find new opportunities to wreak havoc, the truth is that CIOs and those in charge of enterprise security bear some of the responsibility for the increasing prevalence of attacks. Last year, nearly 60 percent of successful breaches exploited known vulnerabilities, and of those organizations that were victims of attack, nearly 40 percent admit they were aware of that vulnerability prior to the event.
New platform helps enterprise networks get closer to the edge
Driven by the growth of mobile computing, IoT devices and the upcoming 5G rollout, edge networking is on the rise and leading businesses to take a fresh look at their networking strategies.
But going from a traditional approach to a virtualized, cloud-native, and software-driven network that connects headquarters to multiple branches and deploys new services like SD-WAN, Virtualized Customer Premises Equipment (vCPE), and IoT devices isn’t easy.
The changing enterprise mobile threat landscape
As enterprises continue the shift towards mobile devices there's concern that the risks could begin to outweigh the benefits.
Mobile security specialist Wandera has released a new report on the mobile threat landscape which looks at the risks faced by enterprise mobile users.
83 percent of US organizations have accidentally exposed sensitive data
According to a new survey 83 percent of security professionals believe that employees have accidentally exposed sensitive customer or business data at their organization.
The study from data protection specialist Egress also finds that accidental data breaches are often compounded by a failure to encrypt data prior to it being shared -- both internally and externally.
Employees and contractors expose information online in 98 percent of organizations
Employees and contractors are exposing confidential and sensitive information online and in the cloud in some 98 percent of organizations. This is found primarily in Dropbox, Google, and Microsoft SharePoint.
This is among the findings of a new report from insider threat specialist Dtex Systems which has analyzed information from work-issued endpoints and more than 300,000 employee and contractor accounts.
Cloud data warehouses are key to digital transformation
Cloud data warehouses (CDW) offer broader data capabilities, stronger performance, and greater flexibility than traditional on-premise databases according to a new survey.
But the study by TDWI on behalf of Talend also shows enterprises need to follow some best practices to overcome implementation challenges and increase investment return.
New solution protects converged IT and OT environments
The line between information technology and operational technology is an increasingly blurred one. As companies drive towards digital transformation so OT environments increasingly interconnect with IT, resulting in a complex, sensitive and vastly expanded attack surface.
This means OT security responsibility is often moving to to the CISO. Yet traditional IT security solutions lack the ability to continuously discover and assess sensitive OT assets.
New access suite delivers a software defined perimeter for hybrid environments
The move to accessing applications from the cloud and provisioning resources dynamically has led to organizations moving to a zero trust strategy to guard against attacks and data leaks. However, this can be hard to achieve with hybrid environments.
Secure access specialist Pulse Secure is adding Software Defined Perimeter (SDP) architecture to its platform to extends its foundation of Zero Trust access for hybrid IT.
How enterprises can cut the risk of cloud vendor lock in [Q&A]
While most CIOs have now identified the benefits cloud can have for their business, concerns over becoming locked in with a single vendor can still be a major barrier to rolling out projects.
We spoke to Richard Best, general manager at COMPAREX UK, to find out why this is the case and what companies can do to avoid vendor lock in.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.