How data is changing the face of marketing [Q&A]
Thanks to increased ability to collect data in real time, and the use of AI to process and interpret that data, marketers have more opportunity than ever to personalize their offerings to customers.
But what does this mean for enterprises when it comes to spending their marketing budgets and establishing a digital strategy? We spoke to the CEO of DMA | Digital Marketing Agency, Solomon Thimothy to find out how digital marketing can be used to drive business growth.
Symantec boosts its endpoint security offering
Sophisticated attackers are increasingly taking advantage of the complexity of endpoint environments to exploit gaps and discover new paths to lucrative targets.
Symantec is announcing enhancements to its endpoint security portfolio designed to defend against the most sophisticated cyberattacks as well as improving application discovery and risk assessment.
Rush to digital transformation puts security of data at risk
Digital transformation projects are underway in the vast majority of businesses, according to a new report, but 'aggressive' transformers are most at risk from data breaches.
The latest Data Threat Report from Thales eSecurity shows digital transformation in some form is happening in 97 percent of organizations. 86 percent say they feel vulnerable to threats, yet less than a third of respondents (only 30 percent) are using encryption within these environments.
Feel overlooked and underappreciated? You must work in IT security
Most IT security professionals in the UK feel they’re suffering from an image problem among fellow workers, according to new research commissioned by privileged access management specialist Thycotic.
Almost two thirds of respondents (63 percent) feel that their security teams are either viewed as the company naysayers -- specifically either 'doom mongers' or a 'necessary evil' (36 percent).
New solution protects enterprises against ransomware
Ransomware attacks are increasingly well targeted and complex, and they can prove devastating for businesses.
Storage specialist Cohesity is launching a new set of anti-ransomware capabilities for its DataPlatform that can directly combat attacks.
Poor integration costs businesses $500,000 a year
Businesses across all industries face B2B, application, and cloud integration challenges that jeopardize revenue opportunities and threaten growth, and more than half of organizations report that those challenges take a $500,000 toll on the business every year.
A study by cloud integration specialist Cleo reveals that of IT decision makers surveyed, 57 percent say poor integrations and lack of resources contribute to hundreds of lost orders each year, leading to annual revenue losses in the range of $250,000 to $500,000.
Businesses can safely delay patching most vulnerabilities
Patching vulnerabilities is often seen as a key element of keeping systems secure. But a new report suggests businesses could be 'smarter' in their patching regimes and prioritize the issues that present most risk.
The study from Kenna Security suggests companies are increasingly recognizing that the majority of vulnerabilities are never weaponized or exploited in a cyberattack.
Enterprise IT continues to move to the cloud
Cloud adoption in enterprises is already very high and growth is likely to continue in 2019 according to the latest cloud adoption survey from NetEnrich.
The study of IT decision makers in businesses with 500 or more employees shows 85 percent of respondents report either moderate or extensive production use of cloud infrastructure, while 80 percent say their companies have moved at least a quarter of all their applications and workloads to the public cloud.
Poor information management harms productivity
Poor information management processes are making jobs harder for staff and reducing their productivity and effectiveness in the workplace, according to new research from information management specialist M-Files Corporation.
Navigating different systems and locations to find the correct version of a file they are looking for negatively affects productivity according to 82 percent of respondents.
Compliance fears inhibit cloud adoption
According to a new survey, 88 percent of IT decision makers at mid- to large-sized companies think having to meet compliance standards in the cloud inhibits further cloud adoption within their company.
The study from Wakefield Research and Logicworks, finds that among senior management -- those most close to and responsible for cloud execution and performance -- the figure is even higher, with 97 percent agreeing that compliance inhibits cloud adoption.
SIEM helps enterprises cut number of breaches and detect them sooner
Security Information and Event Management (SIEM) lets security teams collect and analyze log data from across their IT infrastructure to help detect and combat threats and suspicious activity.
A new report for AlienVault produced by Cybersecurity Insiders reveals three-quarters of cybersecurity professionals believe SIEM is very or extremely important to their organization's security postures.
Organizations suffer breaches despite confidence in their security measures
According to a new survey, 85 percent of respondents are either very or somewhat confident in their organization's security program, yet 41 percent say their company has experienced a security breach and 20 percent more are unsure.
The study from big data specialist Syncsort finds the most common type of breaches are virus/malware attacks (76 percent) and phishing (72 percent). Interestingly, virus attacks came from internal sources roughly half the time while phishing usually came from external sources (78 percent).
Is the QA lab dead?
Quality assurance is changing. Internal teams too often don’t have the resources necessary to get releases to market on time, on budget, and without bugs. And offshoring comes with its own share of issues like irrelevant results and inefficient testing. In its current form -- with traditional lab and outsourced testing -- traditional QA is dying.
There are more than 45,000 unique mobile device profiles on the market today. And that’s just the mobile devices. Forget about desktop computers, connected devices, or any of the other places apps can live and be used on a day-to-day basis. Then add in all the different operating system and browser variations and it becomes clear internal teams need help to test on a massive breadth of devices.
Faster innovation, increased competition and repatriation -- cloud predictions for 2019
Use of the cloud is now well established in many businesses. But that's not to say that it isn’t still a fast moving sector of the industry.
With greater competition than ever and the pace of innovation showing little sign of slowing down, we’ve put together some expert views on what might be in store for cloud users in 2019
One in three networks has exposed passwords
Passwords are exposed in Group Policy Preferences in 32.2 percent of networks, according to new research, leaving them open to the risk of hackers traveling laterally through the network.
The study from identity and access specialist Preempt also shows organizations lack visibility and control when it comes to their passwords and privileged users.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.