Two-thirds of office workers bypass security protocols
Almost two-thirds of office workers admit they've prioritized productivity over safe cybersecurity practices -- 63 percent also own up to using a corporate device to access social media, messaging or entertainment sites/applications.
Research from identity and access management company CyberArk also shows that 80 percent access work applications from personal devices, with C-suite executives being among the worst offenders.
Over half of businesses have suffered regret over a software purchase
A new study from Capterra shows that 59 percent of global businesses regret at least one software purchase they've made in the last 18 months.
Despite this though, the survey of over 3,500 businesses finds 75 percent of organizations are planning to increase their software spending in 2025, with a significant focus on IT systems and artificial intelligence (AI).
Cyber exposure management in today's enterprise landscape [Q&A]
The cybersecurity landscape is more complex than ever and that means enterprises need to have a real-time picture of their exposure.
We spoke to Nadir Izrael, CTO and co-founder of Armis, to learn what this should look like and how security teams can evaluate and evolve their security programs to achieve more control over their asset landscape.
Addressing AI challenges for the enterprise [Q&A]
With more and more businesses keen to benefit from the possibilities that AI offers it seems like everyone is jumping on the bandwagon. But this raises a number of implementation and management challenges, especially now as enterprise AI workloads begin to scale.
We spoke to Tzvika Zaiffer, solutions director at Spot by NetApp, to discuss how these challenges can be addressed and the best practices that are emerging to ensure that implementations go smoothly.
Supply chain attacks up over 400 percent since 2021
A new report from cyber insurance provider Cowbell shows that supply chain attacks have increased by an astounding 431 percent since 2021.
It also shows that large enterprises (those with greater than $50 million revenue) are 2.5 times more likely to encounter cyber incidents. Manufacturing is the most vulnerable sector, driven by its reliance on automation and exposure to intellectual property threats.
HP offers enhanced protection for enterprise endpoints
The rise of remote and hybrid work has increased the risk of PCs being compromised by attackers with brief physical access, underscoring the need for protection and visibility into the integrity of devices throughout their lifetimes.
To combat this, HP is launching a new HP Enterprise Security Edition, a unique suite of capabilities designed to enhance the physical security of PC endpoints.
Attackers target holidays and weekends to catch enterprises off guard
Cyberattackers are targeting holidays and weekends to cause maximum disruption, yet many businesses remain underprepared outside of standard working hours.
A new report from Semperis, based on a survey of almost 1,000 cybersecurity professionals, shows that 86 percent of surveyed organizations in the US, UK, France and Germany that were attacked were targeted during a holiday or weekend.
Businesses taking longer to recover from cyber incidents
In 2024, businesses have reported taking an average of 7.3 months to recover from cybersecurity breaches -- 25 percent longer than expected and over a month past the anticipated timeline of 5.9 months.
This is among the findings of the latest Global Security Research Report from Fastly which also shows that recovery times are even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each -- 70 percent above the average -- and their recovery times stretched to 10.9 months.
How enterprises can maximize the value of automation [Q&A]
The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.
So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.
Skills gap leads enterprises to outsource cybersecurity
A new survey of over 1,700 senior decision makers and influencers in leadership, technology and security roles across Europe finds that 48 percent manage their security operations in house compared to 52 percent who use a third party.
The study from Logpoint finds more than a quarter (28 percent) of UK businesses intend to outsource security over the course of the next two years.
Mitigating third-party risk in today's cyber ecosystem [Q&A]
As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.
We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.
New platform offers improved observability for enterprises
As the IT landscape becomes more complex it can be difficult for businesses to fully understand their risk profile and to ensure that they're getting the most from their investments.
With the launch of a new AI-powered unified observability platform, Kloudfuse aims to deliver improved anomaly detection and consolidated metrics, logs, traces, real user monitoring, continuous profiling, and more in a unified observability data lake.
Enterprises increase use of Apple products driven by security and user preference
A new report from Apple endpoint management specialist Kandji shows that 73 percent of organizations report that their number of Apple products has increased over the last year, driven primarily by employee preference (76 percent), security (50 percent), and reliability (43 percent).
Commissioned by Kandji and conducted by Dimensional Research, the global survey gathered insights from more than 300 IT professionals with responsibility for the management and delivery of Apple products to employees at a company with more than 1,000 employees and more than 500 end-user devices.
Identity system modernization held back by 'technical debt'
Modernizing identity systems is proving difficult for organizations due to two key challenges, decades of accumulated identity and access management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs).
A new report from Strata Identity and the Cloud Security Alliance (CSA) finds incompatibility with non-standard, legacy applications is a barrier to deploying advanced application authentication for 71 percent of respondents, further highlighting the issue of technical debt with 54 percent of respondents citing it as their top hurdle when modernizing their IAM architecture.
How AI is set to democratize information [Q&A]
One of the features of AI is its ability to process large volumes of data to identify patterns and make information more accessible.
We spoke to Igor Jablokov, CEO and founder of Pryon, about how enterprises can take advantage of this ability and make better use of their data.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.