Articles about Enterprise

Cryptomining malware targets unpatched servers

server vulnerability

Cybercriminals are increasingly targeting unpatched server vulnerabilities to infect machines with cryptomining malware, according to a new report.

The study from Check Point Software Technologies sees cryptomining malware dominate Check Point’s Top Ten Most Wanted Malware Index, the Coinhive variant retains the top spot with a global reach of 16 percent. Cryptoloot -- another crypto-mining malware -- is close behind with a global reach of 14 percent, while the Roughted malvertising malware came in third (11 percent).

Continue reading

Shadow devices put enterprise networks at risk

Shadow IT

A new study finds that enterprise networks have thousands of shadow personal devices including laptops, tablets and mobile phones, as well as Internet of Things devices -- such as digital assistants and smart kitchen appliances -- connecting to them.

The report from network control company Infoblox shows 35 percent of companies in the US, UK and Germany reported more than 5,000 personal devices connecting to the network each day.

Continue reading

CRM technology isn't keeping pace with business needs

CRM

CRM systems should make communication with customers easier, but a new report from ProsperWorks, the CRM tool for Google's G Suite, suggests CRM technology isn't keeping pace with the needs of the digital workforce.

ProsperWorks commissioned research firm Lab42 to conduct a survey on sales relationships and CRM pain points from those that frequently use CRM systems. The findings show that the way companies interact with customers is changing but CRM technology is too manual, hasn't evolved and is not focused enough on fostering relationships.

Continue reading

Companies can turn GDPR compliance into competitive advantage

GDPR touchscreen

GDPR comes into force on May 25th and will have an effect on all companies that collect user data even if they are outside the EU.

Independent identity research and strategy company One World Identity has produced a report that aims to serve as a definitive primer on what companies need to do to comply, and help them turn that compliance into a competitive edge.

Continue reading

Most companies not putting adequate investment into application security

open digital lock

According to a new survey from Arxan, only 25 percent of respondents say their organization is making a significant investment in solutions to prevent application attacks.

This is despite awareness of the negative impact of malicious activity. A worrying 65 percent of companies say they would be spurred to increase application protection measures only after an end user or customer was negatively affected.

Continue reading

How managed services can help businesses with GDPR [Q&A]

GDPR graphic

With GDPR implementation now only weeks away many businesses are still not fully prepared for the impact of the new legislation.

We spoke to Matt Klassen VP of cloud marketing at IT service management specialist Cherwell Software to find out how managed services can help companies to comply with GDPR by the may 25th deadline and to manage the additional workload it's likely to create.

Continue reading

The rise of the experimentation team

Workplace

2017 was the year of DevOps with companies focusing on delivering better customer experience and improving operational efficiency. According to a recent Forrester report, over 60 percent of organizations surveyed said they have either already implemented or are expanding their DevOps efforts in the future. With the rise of DevOps, greater investments in software development and a faster release cadence comes a need to measure the impact of these efforts and ensure they are delivering valuable software faster. To do this, organizations are taking a more modern approach to code deployment, release management, and measurement of outcomes.

This approach known as experimentation is a new product development workflow, combining DevOps and Product Analytics, helping organizations both speed up product delivery while simultaneously providing critical insights on the performance of their features and products. Every feature release is measured against business and technical KPIs defined by the organization. Experimentation teams, historically only formed at leading technology companies, are now emerging in most enterprises who are starting to look for and build out engineering and product experimentation roles.

Continue reading

The challenges of adopting the Industrial Internet of Things [Q&A]

Industrial internet of things

A future enabled by the Industrial Internet of Things (IIoT) is not so far off, with the integration of IoT devices rising across industrial settings from oil and gas to building security.

The potential to leverage big data and analytics to optimize operations and efficiencies is driving industrial companies to move to IIoT-enabled devices, but these companies are now faced with the challenge of modernizing their legacy production systems.

Continue reading

73 percent of industrial networks are vulnerable to hackers

refinery industry

The industrial control systems (ICS) used to run equipment in manufacturing, energy, and other sectors are secured differently from office networks. Vulnerabilities often go unpatched, because organizations are afraid to make changes that might cause downtime.

To minimize the chances of exploitation of vulnerabilities, measures put in place include placing ICS components on a separate network, isolating them, or air-gapping them entirely from Internet-connected corporate systems. However, penetration testing performed by Positive Technologies has shown that such measures often fall short in practice, leaving attackers plenty of opportunity to access critical equipment.

Continue reading

Turbonomic delivers AI-powered workload automation for the cloud

process automation

Workload automation specialist Turbonomic has released a major update to its software, delivering application-aware infrastructure and making any type of workload -- virtual, cloud and container -- self-managing.

Turbonomic's AI-powered decision engine analyzes performance, cost and compliance data across the entire IT stack and generates trustworthy decisions at scale faster than before.

Continue reading

Critical vulnerability found in infrastructure and manufacturing applications

industrial skyline

A critical remote code execution vulnerability has been discovered in two Schneider Electric applications heavily used in manufacturing, oil and gas, water, automation and wind and solar power facilities.

The vulnerability, discovered by cyber exposure company Tenable, could, if exploited, give cyber criminals complete control of the underlying system.

Continue reading

The CIO and robotics: Two peas in an IT pod?

Artificial intelligence

Best friends are hard to come by. Once the right one is found, we tend to make conscious choices to invest in those relationships in order to build the right foundation for the future. Unfortunately for many CIOs, it’s a pretty short list of applicants. As organizations change and grow, CIOs will be the resident experts on things like big data, the Internet of Things (IoT) and automation. Not only is this a weighty charge, CIOs are at the forefront of change management, which can feel isolating as they forge new paths.

Now, as automation becomes mainstream, many CIOs are finding an unlikely ally: the robots themselves. But, just like our real-life best friends, it’s important that CIOs choose wisely. By taking the right path to deployment and unleashing the true benefits, CIOs can ensure that their new best friends will be around for the long haul. Here are three ways CIOs can partner with robots to make the most of the relationship.

Continue reading

Windows 10 April 2018 -- what's new for IT pros?

Windows 10 superhero

As the keenly awaited Windows 10 April 2018 update (Windows 10 1803) begins its roll out, IT professionals will be interested to see what features it offers them.

Among the developments of interest to professionals is the Windows Autopilot feature which offers cloud powered device management. Using Intune, Autopilot now allows the device to be locked during provisioning until policies and settings for the device get provisioned, ensuring that by the time the user gets to the desktop, the device is secured and configured correctly.

Continue reading

The impact of AI in the data center [Q&A]

data center

The rise of artificial intelligence (AI), automation and machine learning is changing the way IT professionals approach data center operations and management. And the possibilities are endless -- from lowering operational costs and reducing time to deploy new applications -- there’s no doubt that AI is transforming the data center.

We spoke with Hal Woods, chief technology officer of storage and data management specialist Datera, to learn more.

Continue reading

81 percent of organizations see an increase in cyber security challenges

security threats

A new study from IT solutions provider US Signal reveals that businesses are seeing a greater number of security challenges.

The survey of security experts from a cross-section of organizations also shows 40 percent of respondents experienced at least one security incident in the last year, and 13 percent didn't know if they had.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.