How IBM is supporting developers with AI education [Q&A]


In May of last year, IBM launched watsonx, its enterprise-ready AI and data platform, and made it generally available in July.
Alongside this it has launched some new free generative AI educational courses and content to help developers and IT practitioners build their AI and open source skills. We spoke with Savio Rodrigues, vice president, ecosystem engineering and developer advocacy at IBM to learn more.
Enterprises face problems integrating AI


New research from Tray.io shows that over 90 percent of enterprises are currently experiencing limitations integrating AI into their tech stack.
Almost three-quarters of companies (73 percent) report that more than half of the apps in their tech stack have AI capabilities or AI-augmented features, and 96 say they percent plan to use these features to improve process efficiency and employee productivity, increase customer satisfaction rates and reduce costs.
Why use of Apple devices is growing in the enterprise [Q&A]


The use of Apple devices in the enterprise has increased in recent years. But what's behind this trend and how much impact is it having?
We spoke to Weldon Dodd, SVP of community at Apple device management and security specialist Kandji, to discover how Apple has become a strategic choice for businesses, leading to increased employee productivity and even additional revenue opportunities.
Cybercriminals use identities to target enterprises


A new report from IBM X-Force Threat Intelligence highlights an emerging global identity crisis as cybercriminals double down on exploiting user identities to compromise enterprises worldwide.
The 2024 X-Force Threat Intelligence Index report records a 71 percent spike in cyberattacks caused by exploiting identity as using valid accounts has become the path of least resistance for cybercriminals, with billions of compromised credentials accessible on the Dark Web.
The evolving roles of the CIO and CISO [Q&A]


The relationship between an organization's chief information officer (CIO) and chief information security officer (CISO) has traditionally been somewhat at odds, since CIO's job is built around sharing information and the CISO's job is to secure it. Plus, the CIO was normally higher in the organizational hierarchy, which could also cause some tension.
But the relationship has evolved in recent years, to the point where the two positions are often more on par with each other. And with security's growing importance to the business (and the boardroom), the two jobs often share the same goals and responsibilities.
Sophisticated phishing campaigns bypass enterprise secure email gateways


A new report from Cofense based on data from its Phishing Detection Center identifies over 1.5 million malicious emails bypassing customers' secure email gateways (SEGs), a 37 percent increase in threats compared to 2022.
The report shows that SEGs struggle to keep pace with sophisticated phishing campaigns and that relying on 'good enough' email security is no longer an option for most enterprises.
New solution secures any browser for the enterprise


With more and more businesses relying on SaaS solutions, securing the endpoint browser is vital. Often this involves enterprises imposing a particular browser on their users rather than allowing a choice.
In a new approach, Menlo Security is launching a complete enterprise browser solution that can turn any browser into a secure enterprise browser.
People cannot be patched


When an organization is aware software is vulnerable, it focuses on patching systems to mitigate the risk. Likewise, when security technology becomes outdated, newer versions plug the gaps. However, with people there’s no patch or update readily available.
Instead, a workforce needs to stay abreast of the current threat landscape to ensure the company remains in a good position to combat cyber risks. However, almost 80 percent of leaders lack confidence in their team's ability to tackle cyber threats effectively. This highlights a substantial weakness in current cybersecurity strategies.
Managing multi-cloud complexity: Frameworks to adopt, pitfalls to avoid, and strategies to bring it all together


As many companies are discovering, a multi-cloud environment can offer improved workload portability, purchasing power and increased innovation velocity, as well as other significant benefits. However, managing a multi-cloud environment can be challenging. From complex integrations to fragmented cost visibility to security and compliance concerns, today’s tech leaders can become overwhelmed.
Competing organizational interests, lack of expertise, and unexpected or hidden costs can detract from the great promise of a multi-cloud environment. Organizations need the right people, processes, and tools to overcome the challenges and realize the rewards.
Unlocking business potential through outcome-based security [Q&A]


Traditionally, organizations have focused on measuring the results of their cyber security strategies in terms of threat events or security incidents to determine how effective their security controls are.
However, in today's fast-paced world, the real game-changer is aligning security outcomes with business objectives and this is where 'outcome-based security' plays a huge role. It's a shift in focus for organizations, but one which can empower security teams to add even greater value to the strategic goals of the business.
Forest outages risk axing enterprise AD systems


A 'forest' -- in case you didn't know -- is the top-level logical container in an Active Directory configuration that holds domains, users, computers, and group policies.
This level presents a security challenge and a new survey of 1,000 IT professionals from Cayosoft reveals a 172 percent increase in forest-wide Active Directory outages since 2021.
Get 'Enterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ChatGPT Solutions' (worth $48.99) for FREE


Enterprise AI in the Cloud is an indispensable resource for professionals and companies who want to bring new AI technologies like generative AI, ChatGPT, and machine learning (ML) into their suite of cloud-based solutions.
If you want to set up AI platforms in the cloud quickly and confidently and drive your business forward with the power of AI, this book is the ultimate go-to guide.
What enterprises need to know about cybersecurity compliance [Q&A]


Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.
Cam Roberson, VP at Beachhead Solutions, a provider of cloud-managed PC and mobile device encryption, security, and data access control, sat down with us to discuss what enterprises need to know about the current state of cybersecurity compliance.
Enterprises need to adapt security measures to cope with changing threats


With cyber threats becoming increasingly sophisticated, organizations face new challenges in safeguarding their digital assets. A new report from Info-Tech Research Group looks at the issues IT and security leaders must prioritize over the coming year.
It highlights the need to take account of the cybersecurity talent shortage, the rise of AI-driven threats, the integration of security risks with business risks, the adoption of zero-trust frameworks, and the increasing significance of automating security operations.
Blancco partners with Lenovo to offer secure data erasure for enterprises


Enterprises are dealing with ever greater volumes of data and that brings with it added risk as well as compliance issues and management costs.
In particular, it's important for security and compliance to be able to securely dispose of data that's no longer required. This is why data erasure specialist Blancco Technology Group is announcing a global collaboration with Lenovo to provide secure data erasure as part of the Lenovo ThinkShield security solution.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.