New capabilities help drive application release automation

developer

Digital transformation strategies are often held back by complex IT systems that have been built over the years and represent significant investment. This may lead to departments seeking their own solutions, placing yet more pressure on back office systems.

Business automation specialist Automic is launching new capabilities to its DevOps release automation product, Automic Release Automation, to allow companies to deliver greater agility, scalability, and speed in order to drive competitive advantage.

Continue reading

Work-life balance gains importance as tech worker salary expectations fall

What are the trends driving the careers of tech professionals? A new report based on information gathered from the Woo platform, which allows workers to find jobs with companies that offer the things they really want, reveals what has changed in the first quarter of 2016.

The Woondex (Woo Index) shows there has been a 12.6 percent drop in salary expectations compared to the final quarter of last year. However, there's an 8.2 percent increase in the number of workers looking for a better work-life balance over the same period.

Continue reading

How UK tech companies could comply with Snoopers Charter

PC surveillance camera

It would be hugely ironic if the UK government’s plans to help it seize back control of the digital age actually pushed technology firms even further down the path of encryption.

The second version of the Investigatory Powers Bill -- or Snoopers Charter, as it has been colloquially dubbed -- was published by the Home Office on March 1. This came in light of criticism of the first version -- published in December -- from three parliamentary joint committees: the Science and Technology Committee, the Intelligence and Security Committee, and the Joint Committee for the bill itself -- which made some 86 recommendations alone.

Continue reading

The right PC can improve job satisfaction

Happy user

Do you want satisfied workers? Give them a well-designed PC, a good and secure mobile device, and let them work when they want to, where they want to. Those are, in a nutshell, the results of a new research by Redshift Research, which had polled 1,016 people, across France, Germany, the UK, Italy, Netherlands, Spain and Switzerland.

For 90 percent of IT decision makers, device security is a current concern, because in the last 12 months, a quarter of Europe’s businesses have been breached. That has resulted in less than a third (32 percent) being completely confident in the level of security offered by their current devices.

Continue reading

Enterprises should prioritize availability, not backups

Backup key

With today being World Backup Day 2016, many companies are rightly preaching the importance of regular backups. However, Veeam is bucking the trend by saying that -- in the enterprise space -- just backing up is no longer enough.

The company thinks that the most important question for enterprises now should be "are we always available?" and has thus declared today as "World Availability Day". The argument is that for consumers, just having backups in place is sufficient, but enterprises are expected to be up and running 24/7 and downtime is no longer tolerated in today’s fast-paced world.

Continue reading

LookingGlass releases new threat intelligence platform

AI

Using threat intelligence helps enterprises to improve decision making when it comes to managing security incidents and enforcing policy.

Threat defense specialist LookingGlass Cyber Solutions is looking to improve the way analysts and security operators interpret threats targeting their organizations with the launch of its new ScoutPrime threat intelligence management platform.

Continue reading

New study finds strong demand for service-based messages

Happy mobile user

Over the last few years consumers have increasingly come to expect to receive messages keeping them up to date with appointments and transactions.

Mobile marketing company Vibes has announced the results of a study of over 1,000 people which finds that mobile phones are the number one preferred device for service-based messages with 70 percent preferring to receive service-based messages this way.

Continue reading

Businesses want their infrastructure in the cloud, but it will take time

Cloud storage

IT management software firm SolarWinds recently polled 166 IT practitioners, gaining valuable insights into business cloud adoption, security concerns and new and valuable skill sets. The results are quite interesting -- 92 percent said cloud adoption is important to their business, while 27 percent said it was "extremely important".

However, despite cloud technology growing rapidly, businesses are not eager to place their entire infrastructure in it -- 43 percent believe half or more of their infrastructure will be in the cloud within the next three to five years. Sixty percent believe their organization will never fully migrate.

Continue reading

New program ensures enterprises are prepared for cyber attacks

Attack protection

If a data breach happens customers expect a fast and reassuring reaction from the company affected. It's therefore crucial for businesses to have an incident response plan, but often those plans are only tested when a breach occurs.

According to an upcoming survey from customer security company AllClear ID the two most common challenges during a breach response are people related, with 66 percent citing internal politics and 60 percent "too many cooks in the kitchen".

Continue reading

The changing role of the firewall in network security

firewall

The firewall is still at the center of most network security strategies, but it needs to evolve as cloud technology, software defined networks and next generation firewalls take hold.

This is among the conclusions of the latest State of the Firewall Report from network security specialist FireMon, which finds that 91 percent of IT security professionals believe firewalls are still as critical or more critical than ever to their security architecture.

Continue reading

How enterprises can benefit from archiving in the cloud

cloud-storage

Most businesses have information they need to keep for compliance and other reasons. Traditionally this has been in the form of paper archives, but the availability of low-cost cloud storage offers an attractive alternative.

Data management company Solix Technologies has produced an infographic looking at the advantages of cloud archiving.

Continue reading

Two key challenges of using open source in the enterprise

open source

A myriad point-tools are involved in every organization's software production. Some of our enterprise customers report using over 50 tools along their pipeline, from code development all the way to releasing into production. For the majority of development organizations today, these tools are comprised of a mix of commercial and open source technologies.

Existing open source tools can be found throughout your software development and operations teams -- from programming languages, infrastructure and technology stacks, development and test tools, project management and bug tracking, source control management, CI, configuration management, and more.

Continue reading

How to mitigate ransomware risks

Ransomware

Ransomware has already caused businesses real trouble this year and recently, security firms have warned about a sudden surge in junk mail messages containing this kind of malware. It seems that organized criminals are now increasingly targeting businesses, which can offer them bigger returns than going after individuals.

The first wave of ransomware started in 2005 and was called Trojan.Gpcoder. Now the security industry (and many unfortunate users) are discovering new variants almost every day. For example, a strain called Locky, discovered only two weeks ago is now the second most prevalent form. Currently, it asks for three Bitcoins (about £885) as payment for the decryption key.

Continue reading

7 words to never use in your emails and their replacements

hand stop

It is estimated that in 2014, 191.4 billion emails were sent and received each day with about 108 billion of those being from the business sector. If you are a business owner, there’s a good chance that you’re a part of that ever-growing statistic. Emails are becoming one of the most common forms of communication between businesses and clients, so it makes sense that we brush up on our etiquette every so often.

With the knowledge that a few choice words could make or break your chances at making a potential connection or client, it’s safe to assume that just about everyone wants to avoid these costly word mistakes.

Continue reading

New service addresses security concerns in Microsoft SCCM environments

Enterprise security

Potential security vulnerabilities in Microsoft SCCM (System Center Configuration Manager) environments are a concern for 70 percent of IT professionals, according to a new survey, with 65 percent planning to conduct an SCCM security review in the next year.

The results of the study of more than 150 professionals by security company Adaptiva have been released to coincide with its launch, along with Windows Management Experts, of a new security auditing service for SCCM users.

Continue reading

Load More Articles