Four major advantages to using open source software in the enterprise

open source laptop

With WordPress, Firefox and Linux now the virtual infrastructure for many millions of Internet users globally, and the likes of Apache and database management system MySQL widely embraced by corporations, open source (OS) software has long since passed a tipping-point moment. Yet despite growing familiarity with what OS means -- and usage even by the EU and the US government -- doubts among many businesses about the quality and reliability of OS software persist.

Such concerns tend to cluster around three perceptions. The first is that because many OS products were built by the wider developer community -- projects and foundations without the resources of a software giant with a history of producing proprietary programs -- they cannot then be truly enterprise grade; indeed, they must be of inferior quality and reliability.

Continue reading

Majority of enterprises use more than 10 mobile business apps

Mobile apps

Almost 80 percent of companies are using more than 10 mobile apps for business, according to a new report.

The third edition of the Mobile Security and Risk Review by MobileIron also finds that 18 percent of companies use Apple's Volume Purchase Program (VPP) to streamline their app deployment.

Continue reading

IBM brings the power of Watson to cyber security

IBM X-Force Command Centers

The technology industry is having to contend with ever more sophisticated cyber security threats. With a growing shortage of security analysts and masses of data to process this throws more emphasis on the use of AI techniques.

This week at RSA Conference, IBM Security will be demonstrating what the "cognitive security operations center" of the future will look like, including new Watson-powered tools for investigating security events, new services for building these SOCs and breakthrough research that allows customers and analysts to interact with Watson through voice and chat.

Continue reading

Breach analytics platform speeds up incident response

Breach detection

It's increasingly said by experts that data breaches are now a matter of when rather than if. Being able to respond quickly is therefore vital for companies to minimize damage and disruption.

Cybersecurity solutions and breach analytics cloud platform Eastwind Networks is launching an enhanced Breach Analytics Cloud platform to provide complete visibility across the entire attack surface.

Continue reading

Enterprises need to be aware of threats from internal email

Email fraud

Insider attacks are of increasing concern to businesses. New research shows that internal email can be a major source of threats that often gets overlooked.

The study from email security company Mimecast and Forrester Research reveals that more than a third of companies have experienced some information loss, theft, or attack via email within the past two years.

Continue reading

Hiring a hacker: Why and how you should do it

hiring

The global cost of cybercrime could reach £4.9 trillion annually by 2021, according to a recent report from Cybersecurity Ventures. Cyber crime incidents continue to plague organizations globally, even as businesses pour money into boosting their security.

But how do businesses deal with vulnerabilities they cannot identify? It only takes one smart hacker to discover a backdoor and get access to your sensitive data and systems. Organizations must identify the weaknesses in their cyber security, before -- not after -- they’re exploited by hackers. However, to beat a hacker you’ll need to think like one. Here’s how -- and why -- you should hire a hacker.

Continue reading

Microsoft teams up with Skycure to fight mobile threats

mobile key

Cyber threats to enterprises aren't confined to the desktop, mobile systems are at risk too and businesses are looking for solutions that can combine security with ease of management.

Mobile threat defense company Skycure has announced that it's working with Microsoft to integrate its Skycure platform with Microsoft Enterprise Mobility + Security (EMS).

Continue reading

The secrets of top performing information security officers

Security man expert suit

A new study based on two years of work by IANS Research looks at the work of chief information security officers (CISOs) and their role in enterprises.

The report identifies concrete actions CISOs should consider taking to progress their programs from where they are today to the next level.

Continue reading

The smart office revolution

businessman cloud

The recent headlines and buzz around Amazon Alexa is just one indication that smart home technology may have finally broken through to mainstream. Consumers have grown accustomed to interacting with smart technology to make their lives easier at home and soon will expect that experience to continue when they arrive at the office. While smart technology promises greater efficiency and innovation in the workplace, IT teams face a daunting task of determining which technologies are hype and which will actually make work a better place.

As organizations start to adopt technology that will make work-life better, they need to ensure organizations are set up for success from the beginning. The challenge of supporting and deploying new "smart office" technologies, while upholding corporate security policies is not an easy feat. It might be tempting to act prematurely and incorporate all the latest technologies right away but it’s important to take a holistic approach when evaluating IT projects and prioritize what to implement to ensure organizations are set up for success. While there are a myriad of smart office trends invading the workplace today, here are the top trends we think will most significantly alter the way we communicate and collaborate in the future.

Continue reading

Enterprise change management goals are out of sync with strategy

Change cloud clouds

The results of a new study to be released tomorrow, but seen exclusively by BetaNews, reveal a severe misalignment between the way IT leaders talk about change management and the strategies they have in place to execute these initiatives.

The survey of more than 320 IT leaders by document productivity company Nitro shows that change management strategies vary between organizations, but many fall short.

Continue reading

Security consultancy offers $1 million guarantee against breach-related costs

Check Dollars

One of the biggest worries for businesses is the cost of suffering a major cyber attack in terms of both money and business reputation.

San Francisco-based independent security consultancy AsTech is so confident of its track record that it's offering a $1 million warranty against breach-related costs if an organization using its Paragon Security Program suffers unauthorized access to non-public information through a vulnerability that AsTech fails to discover.

Continue reading

The problems facing the app development industry

Developer

The app development business is being plagued by long development times, skills gaps and large backlogs according to a new report.

The study from low-code development platform supplier OutSystems identifies the critical issues that the industry needs to address if it’s to avoid missed opportunities and lost revenue.

Continue reading

Duo Security launches fast, simple alternative to VPN

Access management

Enterprise users increasingly want access to their data while they're out of the office. This generally requires a VPN or Network Access Control (NAC) solution but these can be time consuming and complex to set up and administer.

To make things faster and simpler, trusted access specialist Duo Security is launching a major commercial implementation of Google's BeyondCorp framework that drastically improves and simplifies management of how employees and devices access critical corporate applications.

Continue reading

Threat hunting gains in popularity to combat cyber threats

insider threat

The use of threat hunting techniques to combat cyber attacks is increasing according to a new report.

The study by Crowd Research Partners of cybersecurity professionals in the 350,000 member Information Security Community on LinkedIn reveals that threats are rising dramatically and that deployment of sophisticated threat hunting platforms can significantly accelerate the time needed to detect, investigate and fix threats.

Continue reading

How SD-WAN (Software Defined-Wide Area Network) will make waves in 2017

cloud computer

We get it now. The cloud is a thing. It’s a great thing and it’s revolutionizing everything from how we do business, to how we listen to music, even to how we heat our homes, but there comes a point when the analogies and the ability to extol its benefits dries up.

The beauty of technology though is that it never stands still, and just as the drought sets in, along comes something new and exciting to explore. SD-WAN or Software Defined-Wide Area Network is the latest innovation to disrupt proceedings and help deliver the benefits of cloud.  It’s not just another acronym to add to the collection either. Although deployed by only around 1 percent of businesses worldwide, American marketing research firm Gartner predicted last year that by the end of 2019, an astonishing 30 percent of enterprises will deploy SD-WAN technology in their branches. So, what is it?

Continue reading

Load More Articles