Articles about Enterprise

WatchGuard makes enterprise-grade threat detection available for all organizations

Smaller businesses are often more at risk of cyberattack simply because they lack the resources of their larger counterparts.

WatchGuard Technologies is looking to change that with the launch of an open XDR solution that delivers levels of visibility into east/west and north/south network traffic previously only available to large enterprises with the resources to manage their own security operations center.

Continue reading

Enterprises could get a false sense of security from single sign-on

Enterprises could be exposing themselves to by increasingly relying on single sign-on (SSO) according to a new report from Doyensec, in collaboration with Teleport.

Although sold by identity providers (IdPs) for their convenience and security, SSO solutions can amplify the impact of breaches. The research shows these impacts can be significantly mitigated once additional layers of security are placed between the IdP and the linked applications and services.

Continue reading

Remote workers put corporate data at risk

New global research from secure storage maker Apricorn into the security and storage of data finds corporate information is knowingly put at risk by 55 percent of mobile workers.

The research, carried out by Censuswide among 604 UK and US IT security decision makers, also finds that 63 percent expect their mobile/remote workers to expose their organization to the risk of a data breach. 43 percent in the UK (40 percent in the UK and US combined) say their mobile/remote workers don't care about security.

Continue reading

Enterprises plan to increase AI investment

Enterprise IT and operations leaders are planning to significantly increase their AI investments over the next 18 months, according to an independent global survey announced today by Celigo.

The survey of 1,200 people finds businesses are realizing positive results from early AI deployments, including greater productivity and efficiency, enhanced customer experience and reduced costs. Consequently 97 percent say they will increase their AI expenditure through 2025 to accelerate AI transformations across corporate departments.

Continue reading

Enterprises struggle to detect hybrid cloud breaches

A new survey of over 1,000 Security and IT leaders across Australia, France, Germany, Singapore, UK, and the USA, shows a decline in detection and response capabilities year-on-year.

The Hybrid Cloud Security Report from Gigamon shows that as hybrid cloud environments grow in complexity and threat actors launch a barrage of concealed attacks, 65 percent of respondents believe their existing security tooling cannot effectively detect breaches.

Continue reading

SIEMs cover less than 20 percent of attack techniques

Security information and event management (SIEM) systems used by enterprises only have detections for 38 (19 percent) of the 201 techniques covered in the MITRE ATT&CK v14 framework according to a new report.

CardinalOps analyzed more than 3,000 detection rules, 1.2 million log sources and hundreds of unique log source types from real-world SIEM instances across Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic.

Continue reading

Almost a third of IT assets lack some security controls

Computer security

New research shows that nearly 30 percent of enterprise IT assets are missing at least one critical security control, such as endpoint security or patch management.

The study from Sevco Security also shows more than six percent of all IT assets have reached the end-of-life stage, creating instances of known-but-unpatched vulnerabilities.

Continue reading

Lack of tech understanding at executive level hinders enterprise transformation

Aging, monolithic systems, and a lack of technological understanding at the executive level are limiting organizational agility and responsiveness to disruptions according to a new report.

The IDC InfoBrief, sponsored by IFS and Boomi polled over 1,000 C-level respondents across 12 countries and finds that legacy technology platforms and unfamiliarity with the essential role APIs and composability play in unlocking business data are combining to hamper insights and transformation.

Continue reading

IT teams struggle to get visibility into tech assets

A new report into IT asset management (ITAM) shows that 53 percent of IT teams report challenges gaining or maintaining complete visibility of their technology investments.

The study from Flexera also finds nearly a quarter (22 percent) of the global IT leaders surveyed say they have paid more than $5 million in audit costs over the past three years, up from 15 percent in 2023.

Continue reading

Addressing open source security gaps [Q&A]

Organizations face significant challenges with open source security, primarily due to the rapid pace at which open source vulnerabilities are identified compared to the slower pace of remediation efforts.

This discrepancy creates a scenario where security teams are constantly trying to catch up, struggling against an ever-growing list of vulnerabilities that pose serious threats to their systems.

Continue reading

Enterprises become less confident in their network investments

A new report shows that 87 percent of enterprise decision-makers are a little or a lot less confident in the network investment decisions that they make.

The study from Arelion reveals that confidence levels have been significantly impacted for 40 percent of US decision-makers. 44 percent of enterprise network decision-makers cite technological change as the most disruptive force on networking decisions, followed closely by rising costs (41 percent) and climate change (37 percent).

Continue reading

The risks and rewards of Active Directory modernization [Q&A]

Active Directory (AD) was introduced in the late 90's when corporate networking barely had virtualization and remote work, not to mention cloud services.

AD controls authentication and authorization to most of an organization's on-premises applications and data, and through synchronization and federation with Entra ID, Okta or other cloud identity provider (IDP) provides these same controls to cloud applications and resources.

Continue reading

How the rise of large graphical models can give enterprises a crystal ball [Q&A]

Data analytics

A new AI technology is emerging alongside LLMs -- Large graphical models (LGMs). An LGM is a probabilistic model that uses a graph to represent the conditional dependence structure between a set of random variables.

Organizations can use LGMs to model the likelihood of different outcomes based on many internal and external variables.

Continue reading

70 percent of enterprises have dedicated SaaS security teams

SaaS

Organizations have prioritized investment in SaaS security, with 70 percent establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions.

A new report from the Cloud Security Alliance (CSA), commissioned by cloud security specialist Adaptive Shield, also finds 39 percent of organizations are increasing their SaaS cybersecurity budgets compared to last year.

Continue reading

How cloud optimization can fight rising costs [Q&A]

Cloud costs have been rising of late, making it vital that enterprises get a grip on their cloud networks and ensure they’re optimizing them to get the best value.

We spoke to Atif Khan, CTO of infrastructure on demand company Alkira, to discuss how businesses can manage their cloud assets and keep spending under control.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.