The rise of the IoT and artificial intelligence in industry [Q&A]
While the consumer IoT has captured the imagination with smart appliances and devices, the industrial Internet of Things (IIoT) is a rapidly growing market. According to Accenture, the IIoT market could add $14.2 trillion to the global economy by 2030.
IIoT is also breathing new life into industries that are in great need of digital transformation, such as manufacturing, oil and gas, and more. As a result, artificial intelligence and machine learning are quickly becoming one of the biggest priorities for companies that want to make the most of their operational data to increase outputs using less energy and costs.
Most businesses struggle to get value from operational data
Organizations increasingly depend on data to drive improvements in all areas of the enterprise. But a new survey shows that data volumes are affecting productivity, with 68 percent of respondents saying their organization has so much data they struggle to make use of it all.
The study of 400 US and European business and IT professionals for Devo Technology, carried out by Vanson Bourne, shows that getting a unified view of information is challenging. 74 percent report their business is currently using different systems for real-time and historical data storage and analysis, and 95 percent say they face obstacles when trying to get a single view of data.
Manufacturing industry at greater risk of cyberattacks
Manufacturing businesses are seeing higher-than-normal rates of cyberattack-related reconnaissance and lateral movement activity.
This is due to the convergence of IT with IoT devices and Industry 4.0 initiatives, according to a new report from AI-powered attack detection specialists Vectra.
92 percent of enterprises struggle to integrate security into DevOps
A large majority of organizations are struggling to implement security into their DevOps processes, despite saying they want to do so, according to a new report.
The study commissioned by application security specialist Checkmarx looks at the biggest barriers to securing software today depending on where organizations sit on the DevOps maturity curve.
Carbon Black launches real-time security ops solution
Edge Computing 101
Enterprises today have adopted a cloud-first mentality, and the numbers show it. According to a 2018 Gartner survey, investment is public cloud services will reach $186.4 billion this year, representing 21.4 percent growth from 2017. But there’s growth that is just as exciting and strategic taking place far from the cloud, down at the network edge in the world of end user devices, Internet of Things (IoT) devices, and other network-connected systems.
Without strategic management of the network edge, investments in the cloud are going to run into trouble. To be a successful cloud-first enterprise, you need manage both the cloud and the edge equally well. Why is edge computing so important? Let’s take a look.
HP launches flexible systems to enhance in-store retail
Retailing presents some unique challenges for IT. Endpoints tend to be in fixed positions which has an effect on how staff interact with customers.
HP is unveiling a new portfolio of devices and service offerings designed to enhance the retail experience by freeing the technology to move around. The HP Engage portfolio provides sleek, versatile, and secure systems to meet the evolving needs of retail and hospitality customers.
Virtualization tool helps protect critical IP and high value assets
While breaches often focus on consumer or payment information, they also put at risk key intellectual property and business assets.
Virualization-based security specialist Bromium is announcing a new product called Protected App, which allows organizations to establish robust, end-to-end protection around their critical intellectual property (IP) and high value assets (HVAs).
Managed detection and response supports internal security teams
Companies are facing a constant battle against cyber threats, add to this a growing skills gap and security teams don't always have the staff or knowledge to effectively monitor and respond to threats.
Automated detection and response company Fidelis Cybersecurity is launching a new managed detection and response (MDR) service to supplement in-house security resources.
How automation can address the challenge of an aging workforce [Q&A]
A trend that's already started and will continue for at least the next decade is the loss of skilled workers as older employees start to retire.
The effects are being felt across industries, with Gartner reporting the aging workforce as one of the biggest challenges to the utilities industry. What's more, the skills gap resulting from retiring employees leaving and entry-level employees entering the workforce is causing all industries to look at new solutions to solve the need for experienced and highly skilled workers.
AlgoSec launches updated security management for cloud and hybrid
As businesses shift their systems to the cloud there is inevitably an increase in complexity that makes maintaining security more of a challenge.
Security policy management specialist AlgoSec is launching a new version of its Security Management Solution to enable policy management across clouds and software-define networks.
Free template helps businesses deal with data breaches
Thanks to legislation like GDPR businesses need to report data breaches promptly or face large fines. However, in the heat of a security incident it can be easy to overlook vital procedures.
Privileged account management specialist Thycotic is aiming to help with the launch of a free Incident Response Policy Template to help businesses take the right steps at the right time.
Security remains top IT concern for SMBs
Data breaches have serious consequences for SMBs and if not handled correctly can cause serious damage to the business.
It's perhaps no surprise then that according to a survey from IT infrastructure company Kaseya security remains the top IT priority for SMBs with 54 percent citing it as their main concern in 2018, up 14 percent from 2017.
Syncsort helps compliance for IBM i users
IBM's i operating system -- originally known as OS/400 -- is still popular in many larger and mid-sized organizations, and it is of course subject to the same security and compliance challenges as other systems.
Big data specialist Syncsort is launching additions to its Syncsort Assure family of products to help i users achieve compliance with GDPR and other legislation, and strengthen security with multi-factor authentication.
Endpoints leave industrial IoT vulnerable... Err, what's an endpoint?
Of over 200 respondents to a new survey, more than half report the most vulnerable aspects of their IIoT infrastructure as data, firmware, embedded systems, or general endpoints.
But at the same time the survey by information security training organization SANS Institute reveals an ongoing debate over what actually constitutes an endpoint.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.
