Articles about Enterprise

Enterprises struggle to detect hybrid cloud breaches

Cloud crime lock

A new survey of over 1,000 Security and IT leaders across Australia, France, Germany, Singapore, UK, and the USA, shows a decline in detection and response capabilities year-on-year.

The Hybrid Cloud Security Report from Gigamon shows that as hybrid cloud environments grow in complexity and threat actors launch a barrage of concealed attacks, 65 percent of respondents believe their existing security tooling cannot effectively detect breaches.

Continue reading

SIEMs cover less than 20 percent of attack techniques

Security breach incident

Security information and event management (SIEM) systems used by enterprises only have detections for 38 (19 percent) of the 201 techniques covered in the MITRE ATT&CK v14 framework according to a new report.

CardinalOps analyzed more than 3,000 detection rules, 1.2 million log sources and hundreds of unique log source types from real-world SIEM instances across Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic.

Continue reading

Almost a third of IT assets lack some security controls

Computer security

New research shows that nearly 30 percent of enterprise IT assets are missing at least one critical security control, such as endpoint security or patch management.

The study from Sevco Security also shows more than six percent of all IT assets have reached the end-of-life stage, creating instances of known-but-unpatched vulnerabilities.

Continue reading

Lack of tech understanding at executive level hinders enterprise transformation

businessman confused

Aging, monolithic systems, and a lack of technological understanding at the executive level are limiting organizational agility and responsiveness to disruptions according to a new report.

The IDC InfoBrief, sponsored by IFS and Boomi polled over 1,000 C-level respondents across 12 countries and finds that legacy technology platforms and unfamiliarity with the essential role APIs and composability play in unlocking business data are combining to hamper insights and transformation.

Continue reading

IT teams struggle to get visibility into tech assets

Asset management

A new report into IT asset management (ITAM) shows that 53 percent of IT teams report challenges gaining or maintaining complete visibility of their technology investments.

The study from Flexera also finds nearly a quarter (22 percent) of the global IT leaders surveyed say they have paid more than $5 million in audit costs over the past three years, up from 15 percent in 2023.

Continue reading

Addressing open source security gaps [Q&A]

open-source

Organizations face significant challenges with open source security, primarily due to the rapid pace at which open source vulnerabilities are identified compared to the slower pace of remediation efforts.

This discrepancy creates a scenario where security teams are constantly trying to catch up, struggling against an ever-growing list of vulnerabilities that pose serious threats to their systems.

Continue reading

Enterprises become less confident in their network investments

Technology center with fiber optic equipment

A new report shows that 87 percent of enterprise decision-makers are a little or a lot less confident in the network investment decisions that they make.

The study from Arelion reveals that confidence levels have been significantly impacted for 40 percent of US decision-makers. 44 percent of enterprise network decision-makers cite technological change as the most disruptive force on networking decisions, followed closely by rising costs (41 percent) and climate change (37 percent).

Continue reading

The risks and rewards of Active Directory modernization [Q&A]

AD Active Directory - Inscription on Green Keyboard Key.

Active Directory (AD) was introduced in the late 90's when corporate networking barely had virtualization and remote work, not to mention cloud services.

AD controls authentication and authorization to most of an organization's on-premises applications and data, and through synchronization and federation with Entra ID, Okta or other cloud identity provider (IDP) provides these same controls to cloud applications and resources.

Continue reading

How the rise of large graphical models can give enterprises a crystal ball [Q&A]

Data analytics

A new AI technology is emerging alongside LLMs -- Large graphical models (LGMs). An LGM is a probabilistic model that uses a graph to represent the conditional dependence structure between a set of random variables.

Organizations can use LGMs to model the likelihood of different outcomes based on many internal and external variables.

Continue reading

70 percent of enterprises have dedicated SaaS security teams

SaaS

Organizations have prioritized investment in SaaS security, with 70 percent establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions.

A new report from the Cloud Security Alliance (CSA), commissioned by cloud security specialist Adaptive Shield, also finds 39 percent of organizations are increasing their SaaS cybersecurity budgets compared to last year.

Continue reading

How cloud optimization can fight rising costs [Q&A]

cloud

Cloud costs have been rising of late, making it vital that enterprises get a grip on their cloud networks and ensure they’re optimizing them to get the best value.

We spoke to Atif Khan, CTO of infrastructure on demand company Alkira, to discuss how businesses can manage their cloud assets and keep spending under control.

Continue reading

Enterprises struggle to make informed decisions on IT sourcing

business decision

Businesses are keen to adopt new technologies in their quest for digital transformation but often face a maze of biased information and incomplete data that hampers the decision making process.

A new report from request for proposal (RFP) specialist Olive Technologies looks at trends and requirements from real-world RFPs, managed through the Olive platform, to help organizations make data-driven, unbiased decisions when selecting IT solutions.

Continue reading

Redefining security in mobile networks with clientless SASE

SASE, Secure Access Service Edge

As organizations adapt their IT ecosystems to incorporate IoT devices and expand remote working opportunities allowing employees to use personal mobile devices, enterprise mobility has become indispensable in modern business operations. Nonetheless, this shift presents numerous security challenges and lifecycle management considerations, especially given that mobile devices connecting to networks frequently lack compatibility with traditional security solutions such as Virtual Private Networks (VPNs) or endpoint tools.

Mobile Network Operators (MNOs) and Mobile Virtual Network Operators (MVNOs) are at the forefront of this challenge. These service providers are tasked with the dual responsibility of ensuring optimal connectivity while safeguarding data privacy and user experience. As the market for basic connectivity services becomes increasingly commoditized, these operators are compelled to explore new avenues for revenue through value-added services. Among these, security services stand out as a promising opportunity.

Continue reading

It's not all artificial: The 4 types of intelligence CTOs need to get the most out of AI

AI-Brain

Enterprises plan to spend roughly $35.5 million on IT modernization in 2024, with over a third going to AI to boost productivity. But it’s not all sunshine and rainbows. At the same time, 64 percent of IT leaders worry about rushing to adopt generative AI without understanding what's needed to use it effectively and safely. And while 75 percent of organizations have experimented with generative AI, only 9 percent have adopted the technology widely. There’s so much more potential to tap into.

To get the best out of AI to supercharge operations it all comes down to intelligence. Afterall, AI is only as intelligent as those using it. There are the four types of intelligence that CTOs need to build, and it’s nothing to do with coding or super complicated technology. It’s about cultivating soft skills and human talent to control AI in a responsible way.

Continue reading

90 percent of enterprises experience identity-related incidents

identity theft mask

A new study from the Identity Defined Security Alliance (IDSA) finds that 90 percent of organizations experienced an identity-related incident in the past year and 84 percent suffered a direct business impact as a result.

The survey of over 520 identity and security professionals from organizations with over 1,000 employees finds the most significant impact, seeing a measurable rise this year, is distracting from core business (52 percent).

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.