Cohesity launches gen AI search solution for business data

Future artificial intelligence robot and cyborg.

Businesses are dependent on data but extracting useful information in order to aid decision making, while ensuring it stays secure, can prove surprisingly difficult.

Cohesity Gaia, is the industry's first generative AI-powered conversational search assistant. Designed to help access organizations’ most important data to make smarter decisions faster, all while keeping data secure and compliant.

Continue reading

Enterprise workers want more transparency around cybersecurity

Businessman using cyber security text hologram 3D rendering

The nature of cybersecurity is such that much of the work goes on in the background. People notice when there's a problem but not when there isn't.

A new report from CybSafe shows that 31 percent of enterprise workers in the US and UK would like to see more transparency around what the cybersecurity team does.

Continue reading

How IBM is supporting developers with AI education [Q&A]

Happy developer

In May of last year, IBM launched watsonx, its enterprise-ready AI and data platform, and made it generally available in July.

Alongside this it has launched some new free generative AI educational courses and content to help developers and IT practitioners build their AI and open source skills. We spoke with Savio Rodrigues, vice president, ecosystem engineering and developer advocacy at IBM to learn more.

Continue reading

Enterprises face problems integrating AI

Enterprise AI

New research from Tray.io shows that over 90 percent of enterprises are currently experiencing limitations integrating AI into their tech stack.

Almost three-quarters of companies (73 percent) report that more than half of the apps in their tech stack have AI capabilities or AI-augmented features, and 96 say they percent plan to use these features to improve process efficiency and employee productivity, increase customer satisfaction rates and reduce costs.

Continue reading

Why use of Apple devices is growing in the enterprise [Q&A]

Apple MacBook Air laptop hands keyboard office desk

The use of Apple devices in the enterprise has increased in recent years. But what's behind this trend and how much impact is it having?

We spoke to Weldon Dodd, SVP of community at Apple device management and security specialist Kandji, to discover how Apple has become a strategic choice for businesses, leading to increased employee productivity and even additional revenue opportunities.

Continue reading

Cybercriminals use identities to target enterprises

identity individual crowd

A new report from IBM X-Force Threat Intelligence highlights an emerging global identity crisis as cybercriminals double down on exploiting user identities to compromise enterprises worldwide.

The 2024 X-Force Threat Intelligence Index report records a 71 percent spike in cyberattacks caused by exploiting identity as using valid accounts has become the path of least resistance for cybercriminals, with billions of compromised credentials accessible on the Dark Web.

Continue reading

The evolving roles of the CIO and CISO [Q&A]

Business partners back-to-back in thoughts

The relationship between an organization's chief information officer (CIO) and chief information security officer (CISO) has traditionally been somewhat at odds, since CIO's job is built around sharing information and the CISO's job is to secure it. Plus, the CIO was normally higher in the organizational hierarchy, which could also cause some tension.

But the relationship has evolved in recent years, to the point where the two positions are often more on par with each other. And with security's growing importance to the business (and the boardroom), the two jobs often share the same goals and responsibilities.

Continue reading

Sophisticated phishing campaigns bypass enterprise secure email gateways

Attack route

A new report from Cofense based on data from its Phishing Detection Center identifies over 1.5 million malicious emails bypassing customers' secure email gateways (SEGs), a 37 percent increase in threats compared to 2022.

The report shows that SEGs struggle to keep pace with sophisticated phishing campaigns and that relying on 'good enough' email security is no longer an option for most enterprises.

Continue reading

New solution secures any browser for the enterprise

Computer security

With more and more businesses relying on SaaS solutions, securing the endpoint browser is vital. Often this involves enterprises imposing a particular browser on their users rather than allowing a choice.

In a new approach, Menlo Security is launching a complete enterprise browser solution that can turn any browser into a secure enterprise browser.

Continue reading

People cannot be patched

Training course

When an organization is aware software is vulnerable, it focuses on patching systems to mitigate the risk. Likewise, when security technology becomes outdated, newer versions plug the gaps. However, with people there’s no patch or update readily available.

Instead, a workforce needs to stay abreast of the current threat landscape to ensure the company remains in a good position to combat cyber risks. However, almost 80 percent of leaders lack confidence in their team's ability to tackle cyber threats effectively. This highlights a substantial weakness in current cybersecurity strategies.

Continue reading

Managing multi-cloud complexity: Frameworks to adopt, pitfalls to avoid, and strategies to bring it all together

Cloud-enterprise

As many companies are discovering, a multi-cloud environment can offer improved workload portability, purchasing power and increased innovation velocity, as well as other significant benefits. However, managing a multi-cloud environment can be challenging. From complex integrations to fragmented cost visibility to security and compliance concerns, today’s tech leaders can become overwhelmed.

Competing organizational interests, lack of expertise, and unexpected or hidden costs can detract from the great promise of a multi-cloud environment. Organizations need the right people, processes, and tools to overcome the challenges and realize the rewards.

Continue reading

Unlocking business potential through outcome-based security [Q&A]

Laptop protect security

Traditionally, organizations have focused on measuring the results of their cyber security strategies in terms of threat events or security incidents to determine how effective their security controls are.

However, in today's fast-paced world, the real game-changer is aligning security outcomes with business objectives and this is where 'outcome-based security' plays a huge role. It's a shift in focus for organizations, but one which can empower security teams to add even greater value to the strategic goals of the business.

Continue reading

Forest outages risk axing enterprise AD systems

deforestation

A 'forest' -- in case you didn't know -- is the top-level logical container in an Active Directory configuration that holds domains, users, computers, and group policies.

This level presents a security challenge and a new survey of 1,000 IT professionals from Cayosoft reveals a 172 percent increase in forest-wide Active Directory outages since 2021.

Continue reading

Get 'Enterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ChatGPT Solutions' (worth $48.99) for FREE

Enterprise-AI-in-the-Cloud

Enterprise AI in the Cloud is an indispensable resource for professionals and companies who want to bring new AI technologies like generative AI, ChatGPT, and machine learning (ML) into their suite of cloud-based solutions.

If you want to set up AI platforms in the cloud quickly and confidently and drive your business forward with the power of AI, this book is the ultimate go-to guide.

Continue reading

What enterprises need to know about cybersecurity compliance [Q&A]

Compliance rule law and regulation graphic interface for business quality policy

Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.

Cam Roberson, VP at Beachhead Solutions, a provider of cloud-managed PC and mobile device encryption, security, and data access control, sat down with us to discuss what enterprises need to know about the current state of cybersecurity compliance.

Continue reading

Load More Articles