AI security solutions are popular with executives -- but are they really working?
According to a new study released by ProtectWise, AI has already established a strong foothold in the security space, with 73 percent of respondents reporting that they have implemented security solutions that incorporate at least some aspect of AI.
Most organizations cite AI's ability to improve the efficiency of security staff members and make investigation of alerts faster as top priorities.
Real-time data center monitoring will continue to be the easiest way to cut costs in 2019
Energy costs are one of the fastest-rising expenses for today’s data centers and the global energy ecosystem as a whole. Not only do energy cost make up 70 to 80 percent of ongoing operational expenses, but data centers are projected to soon amount to the largest share of global electricity production, according to Huawei Technologies’ Total Consumer Power Consumption Forecast.
As new technologies enter the data center realm at an increasing rate, expectations for advanced operational environments capable of meeting energy demands are at odds with an ever-present demand to keep costs down. In fact, studies have shown that cost savings continue to be a main motivating factor when selecting data center management tools. While introducing new processes to data center operations -- like real-time data center monitoring -- is key to modernization at a low cost, researchers have found managers need the pressure of an imminent issue or decision to overhaul legacy tech to make the step towards adopting a data center manager tool.
Edge computing changes everything, including your mobile strategy
It’s tempting to think of edge computing or the Internet of Things (IoT) strictly as something new that you’ll be adding to your enterprise architecture in the coming years. Your company has an enterprise architecture, and now thanks to the IoT revolution you’ll be adding lots of new internet-connected devices, which, depending on your line of business, might be actuators on a factory floor, sensors in a power station cooling tower, or GPS units on a fleet of tractor trailers.
But in reality, IoT and edge computing are not capabilities that are added separately to a company’s existing IT architecture and landscape. Rather, they need to be integrated into existing architectures to deliver on the company’s desired business outcomes.
60 percent of organizations have suffered disruptive cyber events in the last two years
A new study reveals that 60 percent of organizations globally have suffered two or more business-disrupting cyber events -- defined as cyberattacks causing data breaches or significant disruption and downtime to business operations, plant and operational equipment -- in the last 24 months.
What's more the research, carried out by the Ponemon Institute for cyber risk specialist Tenable, shows 91 percent have suffered at least one such cyber event in the same time period.
Enterprises turn to software solutions to manage endpoint devices
As businesses embrace digital transformation, things like the growth of distributed workforces and remote work are impacting both the day-to-day responsibilities and long-term plans of IT managers.
Software and cloud managed services company Unify Square has commissioned a survey from Osterman Research to sample the views of IT managers who oversee unified communications (UC) and workstream collaboration (WSC) environments.
The benefits of a cloud-based testing regime [Q&A]
DevOps teams are under constant pressure to release faster, improve quality and keep costs under control. This means testing increasingly becomes a priority to ensure accelerated releases and many companies are turning to cloud-based testing tools.
However, as with any move to the cloud, there are some challenges that need to be overcome. We spoke to Uzi Eilon, chief technology officer at cloud-based testing platform Perfecto to find out more.
How deception can provide an edge in fighting cyberattacks [Q&A]
Businesses are starting to recognize that it may be impossible to keep attackers completely out of their networks, so they are starting to look for ways of fighting them more efficiently.
One of the ways of doing this is to use decoys to lure attackers and allow the threat to be dealt with before it affects live systems. We spoke to Carolyn Crandall, chief deception officer at Attivo Networks to find out more about how this deception technology works and what it can do.
96 percent of employees struggle to locate files
According to a new report, 96 percent of all employees face some sort of difficulty when looking for the most recent version of a document or file.
The study from information management company M-Files also reveals that 83 percent of staff worldwide are forced to recreate documents that already exist but can't be found.
69 percent of employees use work devices for personal tasks
New research released by security awareness and email protection company Mimecast finds that more than two-thirds of employees admit to personal use of work devices during office hours.
Mimecast surveyed more than 1,000 people who use company-issued devices (such as mobile phones, desktop computers or laptops) in the workplace, in order to understand their behavior, but also their awareness of basic threats plaguing organizations.
Symantec launches neural network device to protect critical infrastructure
Operational technology is critical in areas like energy, oil and gas, manufacturing, and transportation, but it's often be based on legacy systems which can be difficult to keep secure, with updates often needing to be carried out using USB devices.
The threat of attacks is very real though and the consequences especially disastrous, yet many control systems are running outdated software, leaving them vulnerable to attack.
The future of project management technology
Emerging technologies are set to revolutionize project management. That won’t come as much of a shock to the average reader -- there’s been plenty of media coverage about the extent to which new technology like artificial intelligence (AI), machine learning, and the Internet of Things (IoT) will transform industries from the bottom up.
However, people often struggle to isolate the challenges that emerging technologies will solve, and the specific practices they will change -- even within their own industries. There’s a tacit assumption that change will come -- but the 'what', 'how' and 'when' of these seismic shifts remains unclear. Project managers want to tackle the challenges and grasp the opportunities of today’s workplace faster and better than their competitors. It’s vital, therefore, that project managers not only understand the potential of emerging technology, but how to use it to best effect.
5 sure-fire ways to kill your company's innovation
Innovation is difficult to come by. It is a fleeting concept that eludes most companies. In fact, the odds of a new product idea reaching full commercialization are less than 4 percent. And that is the best case.
But, there are 5 sure-fire ways you can make certain innovation never sees the light of day at your company:
Enterprises struggle to fill the cloud skills gap
According to a new study 94 percent of respondents find it at least 'somewhat difficult' to recruit candidates with the right technology and business skills for driving digital innovation.
The report from AIOps platform company OpsRamp shows that over 60 percent of IT professionals say that a majority of their applications are either built or run using hybrid cloud architectures.
DDoS attacks on eCommerce reach their highest levels over the Black Friday weekend
Cybercriminals are just as keen to exploit the holiday shopping boom as anyone else, with DDoS attacks on eCommerce providers increasing by over 70 percent on Black Friday compared with other days in November. On Cyber Monday, attacks increased by 109 percent compared with the November average.
Cloud anti-DDoS company Link11 has released data showing several attacks observed during Black Friday and Cyber Monday were of up to 100 Gbps bandwidth, and the average attack volume on both days was just under 6Gbps.
Free tool helps developers spot open source security risks
The use of open source components in development projects is commonplace, but vulnerabilities in these components can be easily overlooked and leave the resulting applications insecure.
Open source security and license compliance management company WhiteSource is aiming to make it easier for developers to spot problems in components with the launch of a free tool.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.