Articles about Enterprise

Cyberrisk quantification and how to measure it [Q&A]

Enterprises face an increasing range of cybersecurity risk, but quantifying and managing those risks can be a difficult task.

Recent Gartner research shows that more companies are trying to roll out cyber risk quantification (CRQ) in order to get a greater understanding of their risk profile.

Continue reading

Business overconfident and underprepared for cyber threats

A new report from digital transformation consultancy Gemserv, based on a survey of CISOs at 200 large UK and EU enterprises, finds most believe boards are overconfident of their understanding of cybersecurity issues, and are failing to provide CISOs with the support they need to properly protect the organization.

According to the findings, 88 percent of CISOs think the threat landscape is becoming more complex, with 37 percent not confident they have the resources they need. 44 percent struggle to recruit and retain the skilled people they need, amid a 3.2m 'workforce gap' for IT talent.

Continue reading

CISOs concerned about attackers using AI

Data from a recent survey conducted by RSA Conference shows that 72 percent of Fortune 1000 CISOs say they have already seen threat actors using generative AI against their organization.

AI-generated phishing emails are the top threat, with 70 percent of CISOs reporting that they've observed highly tailored phishing emails targeting their business Other top GenAI threats include vishing (37 percent), automated hacking (22 percent), deepfakes (21 percent) and misinformation (17 percent).

Continue reading

A quarter of cybersecurity leaders are ready to quit

A new survey finds that 24 percent of CISOs or IT security decision makers (ITS DMs) are actively looking to leave their position.

The research, commissioned by BlackFog, finds that a further 54 percent, while not actively looking to quit, are open to new opportunities.

Continue reading

New expert community seeks to address identity vulnerabilities

Most cybersecurity incidents start with some sort of identity compromise, whether that identity is human or machine.

In order to help organizations gain visibility into their identity security posture Anetac is setting up a community to serve as a collaborative space where cybersecurity leaders, practitioners, and researchers can learn and engage with experts on identity vulnerabilities related to human and non-human identities.

Continue reading

Qualys launches cloud-based risk operations center

Organizations are facing an ever-growing volume of risk alerts spread across multiple, disconnected top-10 dashboards. This fragmented view can result in conflicting analyses, duplicate work, missed threats, and strategies that fail to fully protect the organization.

Cloud-based security firm Qualys is addressing this with the launch of a new Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM) that enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data into actionable insights that align cyber risk operations with business priorities.

Continue reading

Is the IT enterprise helpdesk an endangered species?

The IT helpdesk could be extinct by 2027 according to a new survey of 1,000 global IT workers which finds that 79 percent believe the current service desk model will be unrecognizable within three years, with 77 percent saying new technologies will render it 'redundant' by 2027.

The study by digital employee experience company Nexthink shows 87 percent of IT workers also report that, with digital transformation having greatly expanded the size and complexity of enterprise IT environments, incident response is 'economically unsustainable' unless helpdesks have significant proactive capabilities.

Continue reading

Enterprise CISOs worry about losing their job after a breach

A new survey, which polled 200 CISOs from companies with annual revenues exceeding $500 million, highlights growing concerns across a number of areas.

The study from Portnox finds worries around the effectiveness of zero trust, the limitations of multi-factor authentication (MFA), and a looming threat to job security amidst an increasingly complex cybersecurity landscape.

Continue reading

New tool helps enterprises identify credential risk

Though organizations and their users have greatly benefited from hybrid environments and SaaS applications, dispersed workforces have also created unforeseen risks that are increasingly difficult to secure.

The average enterprise user has more than 50 passwords not protected by single sign-on (SSO), each representing a point of risk if not properly monitored and secured.

Continue reading

How to unlock the power of real-time analytics [Q&A]

The increased need for real-time analytics is driven by the rise of the on-demand economy, where consumer expectations for immediate access to products, services, and information are transforming how businesses operate and compete.

We spoke to Kishore Gopalakrishna, co-founder and CEO of StarTree, to discuss the need for real-time data capabilities, the strategic utilization of real-time data to enhance operational efficiency and competitiveness, and the essential technology and operational considerations for building a robust analytics infrastructure.

Continue reading

Security pros worried about widening attack surface

Hacker

A new report from Red Canary finds 87 percent of respondents have been impacted by a security incident they were unable to detect and neutralize in the past year, resulting in data compromise, outages, fines, audit failures and reputational damage.

Based on a study of 700 cybersecurity leaders it finds 73 percent say their attack surface has widened in the past two years, by an average of 77 percent, with 64 percent admitting to having knowledge deficits around securing new technologies.

Continue reading

Poor password habits still an issue worldwide

Password on a sticky note

To mark the start of this year's Cybersecurity Awareness Month, Dashlane has published its latest report into global password health which shows that although the share of reused passwords has dropped it remains worryingly high.

The share of password reuse remains between 40 and 50 percent across regions worldwide, putting individuals and companies at greater risk of account takeover.

Continue reading

How businesses need to address the security risks of LLMs [Q&A]

Businesses are increasingly adopting AI and large language models in search of greater efficiency and savings. But these tools also present risks when it comes to cybersecurity.

We spoke to Aqsa Taylor, director of product management at Gutsy, to learn more about these risks and what organizations can do to address them.

Continue reading

The top enterprise cloud threats of 2024

A new report from IBM X-Force looks at the biggest risks enterprises are facing and highlights how attackers know that credentials are the keys to cloud environments, making them highly sought-after on dark web marketplaces.

Attackers are using phishing, keylogging, watering hole and brute force attacks to harvest credentials. Also dark web research highlights the popularity of infostealers, used to steal cloud platform and service-specific credentials.

Continue reading

Non-human identities present a major security risk

Compromised non-human identities have led to successful cyberattacks at that 66 percent of enterprises.

A new report from AppViewX, based on a survey of almost 370 IT, cybersecurity, and DevOps professionals by Enterprise Strategy Group (ESG), also shows 57 percent of the episodes where organizations suffered a successful attack tied to NHI compromises got the board of directors attention.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.