How data is changing the face of marketing [Q&A]

Marketing compass

Thanks to increased ability to collect data in real time, and the use of AI to process and interpret that data, marketers have more opportunity than ever to personalize their offerings to customers.

But what does this mean for enterprises when it comes to spending their marketing budgets and establishing a digital strategy? We spoke to the CEO of DMA | Digital Marketing Agency, Solomon Thimothy to find out how digital marketing can be used to drive business growth.

Continue reading

Symantec boosts its endpoint security offering

endpoint protection

Sophisticated attackers are increasingly taking advantage of the complexity of endpoint environments to exploit gaps and discover new paths to lucrative targets.

Symantec is announcing enhancements to its endpoint security portfolio designed to defend against the most sophisticated cyberattacks as well as improving application discovery and risk assessment.

Continue reading

Rush to digital transformation puts security of data at risk

Risk dial

Digital transformation projects are underway in the vast majority of businesses, according to a new report, but 'aggressive' transformers are most at risk from data breaches.

The latest Data Threat Report from Thales eSecurity shows digital transformation in some form is happening in 97 percent of organizations. 86 percent say they feel vulnerable to threats, yet less than a third of respondents (only 30 percent) are using encryption within these environments.

Continue reading

Feel overlooked and underappreciated? You must work in IT security

Head in hands

Most IT security professionals in the UK feel they’re suffering from an image problem among fellow workers, according to new research commissioned by privileged access management specialist Thycotic.

Almost two thirds of respondents (63 percent) feel that their security teams are either viewed as the company naysayers -- specifically either 'doom mongers' or a 'necessary evil' (36 percent).

Continue reading

New solution protects enterprises against ransomware

Ransomware skull

Ransomware attacks are increasingly well targeted and complex, and they can prove devastating for businesses.

Storage specialist Cohesity is launching a new set of anti-ransomware capabilities for its DataPlatform that can directly combat attacks.

Continue reading

Poor integration costs businesses $500,000 a year

Burning money

Businesses across all industries face B2B, application, and cloud integration challenges that jeopardize revenue opportunities and threaten growth, and more than half of organizations report that those challenges take a $500,000 toll on the business every year.

A study by cloud integration specialist Cleo reveals that of IT decision makers surveyed, 57 percent say poor integrations and lack of resources contribute to hundreds of lost orders each year, leading to annual revenue losses in the range of $250,000 to $500,000.

Continue reading

Businesses can safely delay patching most vulnerabilities

Eggtimer delay

Patching vulnerabilities is often seen as a key element of keeping systems secure. But a new report suggests businesses could be 'smarter' in their patching regimes and prioritize the issues that present most risk.

The study from Kenna Security suggests companies are increasingly recognizing that the majority of vulnerabilities are never weaponized or exploited in a cyberattack.

Continue reading

Enterprise IT continues to move to the cloud

Cloud growth arrow

Cloud adoption in enterprises is already very high and growth is likely to continue in 2019 according to the latest cloud adoption survey from NetEnrich.

The study of IT decision makers in businesses with 500 or more employees shows 85 percent of respondents report either moderate or extensive production use of cloud infrastructure, while 80 percent say their companies have moved at least a quarter of all their applications and workloads to the public cloud.

Continue reading

Poor information management harms productivity

frustrated

Poor information management processes are making jobs harder for staff and reducing their productivity and effectiveness in the workplace, according to new research from information management specialist M-Files Corporation.

Navigating different systems and locations to find the correct version of a file they are looking for negatively affects productivity according to 82 percent of respondents.

Continue reading

Compliance fears inhibit cloud adoption

cloud worry

According to a new survey, 88 percent of IT decision makers at mid- to large-sized companies think having to meet compliance standards in the cloud inhibits further cloud adoption within their company.

The study from Wakefield Research and Logicworks, finds that among senior management -- those most close to and responsible for cloud execution and performance -- the figure is even higher, with 97 percent agreeing that compliance inhibits cloud adoption.

Continue reading

SIEM helps enterprises cut number of breaches and detect them sooner

Red and blue security padlock

Security Information and Event Management (SIEM) lets security teams collect and analyze log data from across their IT infrastructure to help detect and combat threats and suspicious activity.

A new report for AlienVault produced by Cybersecurity Insiders reveals three-quarters of cybersecurity professionals believe SIEM is very or extremely important to their organization's security postures.

Continue reading

Organizations suffer breaches despite confidence in their security measures

business security

According to a new survey, 85 percent of respondents are either very or somewhat confident in their organization's security program, yet 41 percent say their company has experienced a security breach and 20 percent more are unsure.

The study from big data specialist Syncsort finds the most common type of breaches are virus/malware attacks (76 percent) and phishing (72 percent). Interestingly, virus attacks came from internal sources roughly half the time while phishing usually came from external sources (78 percent).

Continue reading

Is the QA lab dead?

QA Lab

Quality assurance is changing. Internal teams too often don’t have the resources necessary to get releases to market on time, on budget, and without bugs. And offshoring comes with its own share of issues like irrelevant results and inefficient testing. In its current form -- with traditional lab and outsourced testing -- traditional QA is dying.

There are more than 45,000 unique mobile device profiles on the market today. And that’s just the mobile devices. Forget about desktop computers, connected devices, or any of the other places apps can live and be used on a day-to-day basis. Then add in all the different operating system and browser variations and it becomes clear internal teams need help to test on a massive breadth of devices.

Continue reading

Faster innovation, increased competition and repatriation -- cloud predictions for 2019

Cloud growth arrow

Use of the cloud is now well established in many businesses. But that's not to say that it isn’t still a fast moving sector of the industry.

With greater competition than ever and the pace of innovation showing little sign of slowing down, we’ve put together some expert views on what might be in store for cloud users in 2019

Continue reading

One in three networks has exposed passwords

Stealing password from code

Passwords are exposed in Group Policy Preferences in 32.2 percent of networks, according to new research, leaving them open to the risk of hackers traveling laterally through the network.

The study from identity and access specialist Preempt also shows organizations lack visibility and control when it comes to their passwords and privileged users.

Continue reading

Load More Articles