Lack of tech understanding at executive level hinders enterprise transformation


Aging, monolithic systems, and a lack of technological understanding at the executive level are limiting organizational agility and responsiveness to disruptions according to a new report.
The IDC InfoBrief, sponsored by IFS and Boomi polled over 1,000 C-level respondents across 12 countries and finds that legacy technology platforms and unfamiliarity with the essential role APIs and composability play in unlocking business data are combining to hamper insights and transformation.
IT teams struggle to get visibility into tech assets


A new report into IT asset management (ITAM) shows that 53 percent of IT teams report challenges gaining or maintaining complete visibility of their technology investments.
The study from Flexera also finds nearly a quarter (22 percent) of the global IT leaders surveyed say they have paid more than $5 million in audit costs over the past three years, up from 15 percent in 2023.
Addressing open source security gaps [Q&A]


Organizations face significant challenges with open source security, primarily due to the rapid pace at which open source vulnerabilities are identified compared to the slower pace of remediation efforts.
This discrepancy creates a scenario where security teams are constantly trying to catch up, struggling against an ever-growing list of vulnerabilities that pose serious threats to their systems.
Enterprises become less confident in their network investments


A new report shows that 87 percent of enterprise decision-makers are a little or a lot less confident in the network investment decisions that they make.
The study from Arelion reveals that confidence levels have been significantly impacted for 40 percent of US decision-makers. 44 percent of enterprise network decision-makers cite technological change as the most disruptive force on networking decisions, followed closely by rising costs (41 percent) and climate change (37 percent).
The risks and rewards of Active Directory modernization [Q&A]


Active Directory (AD) was introduced in the late 90's when corporate networking barely had virtualization and remote work, not to mention cloud services.
AD controls authentication and authorization to most of an organization's on-premises applications and data, and through synchronization and federation with Entra ID, Okta or other cloud identity provider (IDP) provides these same controls to cloud applications and resources.
How the rise of large graphical models can give enterprises a crystal ball [Q&A]


A new AI technology is emerging alongside LLMs -- Large graphical models (LGMs). An LGM is a probabilistic model that uses a graph to represent the conditional dependence structure between a set of random variables.
Organizations can use LGMs to model the likelihood of different outcomes based on many internal and external variables.
70 percent of enterprises have dedicated SaaS security teams


Organizations have prioritized investment in SaaS security, with 70 percent establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions.
A new report from the Cloud Security Alliance (CSA), commissioned by cloud security specialist Adaptive Shield, also finds 39 percent of organizations are increasing their SaaS cybersecurity budgets compared to last year.
How cloud optimization can fight rising costs [Q&A]


Cloud costs have been rising of late, making it vital that enterprises get a grip on their cloud networks and ensure they’re optimizing them to get the best value.
We spoke to Atif Khan, CTO of infrastructure on demand company Alkira, to discuss how businesses can manage their cloud assets and keep spending under control.
Enterprises struggle to make informed decisions on IT sourcing


Businesses are keen to adopt new technologies in their quest for digital transformation but often face a maze of biased information and incomplete data that hampers the decision making process.
A new report from request for proposal (RFP) specialist Olive Technologies looks at trends and requirements from real-world RFPs, managed through the Olive platform, to help organizations make data-driven, unbiased decisions when selecting IT solutions.
Redefining security in mobile networks with clientless SASE


As organizations adapt their IT ecosystems to incorporate IoT devices and expand remote working opportunities allowing employees to use personal mobile devices, enterprise mobility has become indispensable in modern business operations. Nonetheless, this shift presents numerous security challenges and lifecycle management considerations, especially given that mobile devices connecting to networks frequently lack compatibility with traditional security solutions such as Virtual Private Networks (VPNs) or endpoint tools.
Mobile Network Operators (MNOs) and Mobile Virtual Network Operators (MVNOs) are at the forefront of this challenge. These service providers are tasked with the dual responsibility of ensuring optimal connectivity while safeguarding data privacy and user experience. As the market for basic connectivity services becomes increasingly commoditized, these operators are compelled to explore new avenues for revenue through value-added services. Among these, security services stand out as a promising opportunity.
It's not all artificial: The 4 types of intelligence CTOs need to get the most out of AI


Enterprises plan to spend roughly $35.5 million on IT modernization in 2024, with over a third going to AI to boost productivity. But it’s not all sunshine and rainbows. At the same time, 64 percent of IT leaders worry about rushing to adopt generative AI without understanding what's needed to use it effectively and safely. And while 75 percent of organizations have experimented with generative AI, only 9 percent have adopted the technology widely. There’s so much more potential to tap into.
To get the best out of AI to supercharge operations it all comes down to intelligence. Afterall, AI is only as intelligent as those using it. There are the four types of intelligence that CTOs need to build, and it’s nothing to do with coding or super complicated technology. It’s about cultivating soft skills and human talent to control AI in a responsible way.
90 percent of enterprises experience identity-related incidents


A new study from the Identity Defined Security Alliance (IDSA) finds that 90 percent of organizations experienced an identity-related incident in the past year and 84 percent suffered a direct business impact as a result.
The survey of over 520 identity and security professionals from organizations with over 1,000 employees finds the most significant impact, seeing a measurable rise this year, is distracting from core business (52 percent).
Why software support AI chatbots should supplement, not supplant, human experts [Q&A]


Many enterprises have begun to rely more heavily on chatbots to provide software support, and this often means customers find it hard to get in contact with an experienced, human engineer when they encounter an issue that they need help resolving.
While this might save costs in the short term, it can seriously damage the company’s brand in the long term. We talked to Craig Mackereth, EVP, global service delivery at Rimini Street to find out about the overuse of AI chatbots for enterprise software support and ways that vendors could use generative AI to actually improve the customer experience.
Updated Edge for Business adds new security, productivity and AI features


Microsoft has announced a series of updates to Edge for Business aimed at making the browser a more attractive proposition for enterprises.
Launched at Build yesterday, new features include screenshot prevention in order to block data exfiltration, this also applies to Copilot prompts and responses. There's also improved leak protection for sensitive documents.
How 'internet fracturing' is challenging enterprise growth [Q&A]


We tend to think of the internet as being something that's the same all over the world, but with nations like China, India and Russia increasingly closing off the wider web to their citizens, is the global nature of the internet under threat?
We spoke to Ruoting Sun, VP of Product at Secureframe about the phenomenon of 'internet fracturing' and what it means for businesses.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.