Enterprises struggle to detect hybrid cloud breaches
A new survey of over 1,000 Security and IT leaders across Australia, France, Germany, Singapore, UK, and the USA, shows a decline in detection and response capabilities year-on-year.
The Hybrid Cloud Security Report from Gigamon shows that as hybrid cloud environments grow in complexity and threat actors launch a barrage of concealed attacks, 65 percent of respondents believe their existing security tooling cannot effectively detect breaches.
SIEMs cover less than 20 percent of attack techniques
Security information and event management (SIEM) systems used by enterprises only have detections for 38 (19 percent) of the 201 techniques covered in the MITRE ATT&CK v14 framework according to a new report.
CardinalOps analyzed more than 3,000 detection rules, 1.2 million log sources and hundreds of unique log source types from real-world SIEM instances across Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic.
Almost a third of IT assets lack some security controls
New research shows that nearly 30 percent of enterprise IT assets are missing at least one critical security control, such as endpoint security or patch management.
The study from Sevco Security also shows more than six percent of all IT assets have reached the end-of-life stage, creating instances of known-but-unpatched vulnerabilities.
Lack of tech understanding at executive level hinders enterprise transformation
Aging, monolithic systems, and a lack of technological understanding at the executive level are limiting organizational agility and responsiveness to disruptions according to a new report.
The IDC InfoBrief, sponsored by IFS and Boomi polled over 1,000 C-level respondents across 12 countries and finds that legacy technology platforms and unfamiliarity with the essential role APIs and composability play in unlocking business data are combining to hamper insights and transformation.
IT teams struggle to get visibility into tech assets
A new report into IT asset management (ITAM) shows that 53 percent of IT teams report challenges gaining or maintaining complete visibility of their technology investments.
The study from Flexera also finds nearly a quarter (22 percent) of the global IT leaders surveyed say they have paid more than $5 million in audit costs over the past three years, up from 15 percent in 2023.
Addressing open source security gaps [Q&A]
Organizations face significant challenges with open source security, primarily due to the rapid pace at which open source vulnerabilities are identified compared to the slower pace of remediation efforts.
This discrepancy creates a scenario where security teams are constantly trying to catch up, struggling against an ever-growing list of vulnerabilities that pose serious threats to their systems.
Enterprises become less confident in their network investments
A new report shows that 87 percent of enterprise decision-makers are a little or a lot less confident in the network investment decisions that they make.
The study from Arelion reveals that confidence levels have been significantly impacted for 40 percent of US decision-makers. 44 percent of enterprise network decision-makers cite technological change as the most disruptive force on networking decisions, followed closely by rising costs (41 percent) and climate change (37 percent).
The risks and rewards of Active Directory modernization [Q&A]
Active Directory (AD) was introduced in the late 90's when corporate networking barely had virtualization and remote work, not to mention cloud services.
AD controls authentication and authorization to most of an organization's on-premises applications and data, and through synchronization and federation with Entra ID, Okta or other cloud identity provider (IDP) provides these same controls to cloud applications and resources.
How the rise of large graphical models can give enterprises a crystal ball [Q&A]
A new AI technology is emerging alongside LLMs -- Large graphical models (LGMs). An LGM is a probabilistic model that uses a graph to represent the conditional dependence structure between a set of random variables.
Organizations can use LGMs to model the likelihood of different outcomes based on many internal and external variables.
70 percent of enterprises have dedicated SaaS security teams
Organizations have prioritized investment in SaaS security, with 70 percent establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions.
A new report from the Cloud Security Alliance (CSA), commissioned by cloud security specialist Adaptive Shield, also finds 39 percent of organizations are increasing their SaaS cybersecurity budgets compared to last year.
How cloud optimization can fight rising costs [Q&A]
Cloud costs have been rising of late, making it vital that enterprises get a grip on their cloud networks and ensure they’re optimizing them to get the best value.
We spoke to Atif Khan, CTO of infrastructure on demand company Alkira, to discuss how businesses can manage their cloud assets and keep spending under control.
Enterprises struggle to make informed decisions on IT sourcing
Businesses are keen to adopt new technologies in their quest for digital transformation but often face a maze of biased information and incomplete data that hampers the decision making process.
A new report from request for proposal (RFP) specialist Olive Technologies looks at trends and requirements from real-world RFPs, managed through the Olive platform, to help organizations make data-driven, unbiased decisions when selecting IT solutions.
Redefining security in mobile networks with clientless SASE
As organizations adapt their IT ecosystems to incorporate IoT devices and expand remote working opportunities allowing employees to use personal mobile devices, enterprise mobility has become indispensable in modern business operations. Nonetheless, this shift presents numerous security challenges and lifecycle management considerations, especially given that mobile devices connecting to networks frequently lack compatibility with traditional security solutions such as Virtual Private Networks (VPNs) or endpoint tools.
Mobile Network Operators (MNOs) and Mobile Virtual Network Operators (MVNOs) are at the forefront of this challenge. These service providers are tasked with the dual responsibility of ensuring optimal connectivity while safeguarding data privacy and user experience. As the market for basic connectivity services becomes increasingly commoditized, these operators are compelled to explore new avenues for revenue through value-added services. Among these, security services stand out as a promising opportunity.
It's not all artificial: The 4 types of intelligence CTOs need to get the most out of AI
Enterprises plan to spend roughly $35.5 million on IT modernization in 2024, with over a third going to AI to boost productivity. But it’s not all sunshine and rainbows. At the same time, 64 percent of IT leaders worry about rushing to adopt generative AI without understanding what's needed to use it effectively and safely. And while 75 percent of organizations have experimented with generative AI, only 9 percent have adopted the technology widely. There’s so much more potential to tap into.
To get the best out of AI to supercharge operations it all comes down to intelligence. Afterall, AI is only as intelligent as those using it. There are the four types of intelligence that CTOs need to build, and it’s nothing to do with coding or super complicated technology. It’s about cultivating soft skills and human talent to control AI in a responsible way.
90 percent of enterprises experience identity-related incidents
A new study from the Identity Defined Security Alliance (IDSA) finds that 90 percent of organizations experienced an identity-related incident in the past year and 84 percent suffered a direct business impact as a result.
The survey of over 520 identity and security professionals from organizations with over 1,000 employees finds the most significant impact, seeing a measurable rise this year, is distracting from core business (52 percent).
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.