80 percent of businesses are not ready for Windows 11


Support for Windows 10 ends on October 14 2025, just over two years away. But new research from Lansweeper shows that eight out of 10 businesses are still running it.
Windows 11 is gradually creeping into the enterprise but the process is slow. October 2022, data from Lansweeper shows just 2.61 percent of Windows 11 compatible devices were running Windows 11. Recently updated Windows 11 adoption rate figures show that this has now increased to 5.47 percent.
The biggest impediments to user adoption of enterprise technology


An investment in enterprise technology can’t truly be deemed a success unless the organization achieves successful user adoption. While there are key best practices that can steer organizations towards successful adoption, there are also several impediments along the way. Here we’ll explore the impediments and how to overcome them.
The #1 impediment to successful user adoption is having a tech-focused mindset. Oftentimes, a customer will think to themselves: "OK, all the various bits of the tech are working. The project is on time and on budget. Let's roll this stuff out organization-wide, offer a bit of training, and people should love it and adopt it to solve their problems."
Email is seen as the enterprise channel most vulnerable to attacks


The majority of organizations use six or more communication tools, across channels, with email being the single channel seen as the most vulnerable to attacks.
Of those responding to a new survey by Enterprise Strategy Group (ESG) and Armorblox of almost 500 IT and security professionals, 38 percent see email as the most vulnerable channel.
Why automation can help continuously validate security policies [Q&A]


Security professionals all know that they should test their security hardware and software periodically to make sure it's working as intended. Many normal IT activities have unintended consequences that cause security configurations to 'drift' over time and make the organization more vulnerable.
But testing is frequently postponed or ignored because it never becomes a high enough priority. We spoke to Song Pang, SVP of engineering at NetBrain, to find out how automation can be used to detect when security products or network traffic are no longer behaving as intended.
Enterprises have a worrying lack of visibility into APIs


Analysis of around a trillion API transactions spanning a range industries over the second half of 2022 by Cequence Security seeks to highlight the latest API threat trends plaguing organizations.
In the second half of 2022, approximately 45 billion search attempts were made for shadow APIs, marking a 900 percent increase from the five billion attempts made in the first half of the year.
Is this the year we take quantum threats seriously? [Q&A]


Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.
More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.
Network edge technologies fail to cut it for modern businesses


New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.
Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.
Business leaders don't understand cybersecurity


A new survey from Delinea of over 2,000 IT security decision makers (ITSDMs) reveals that only 39 percent of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler.
In addition, over a third (36 percent) believe that it is considered important only in terms of compliance and regulatory demands, while 17 percent say it isn't seen as a business priority.
Technology sector suffers most from poor cyber hygiene


Analysis of exposed dark web assets from SpyCloud finds that the technology sector has the highest number of malware-infected employees and consumers, the highest number of exposed corporate credentials, and the most exposed malware cookie records.
In the analysis of the darknet exposure of employees of Fortune 1000 enterprises across 21 industry sectors, researchers uncovered 27.48 million pairs of credentials with corporate email addresses and plain text passwords, with over 223,000 exfiltrated by malware.
Kingston launches DC600M Enterprise SSD


Today, we have some exciting news from Kingston Digital, Inc. The company just announced its latest offering in the world of data storage — the DC600M Enterprise SSD.
This new product has been optimized for mixed-use workloads, with excellent Quality of Service (QoS) to ensure latency and IOPS consistency. With 6Gbps SATA 3.0 storage and 3D TLC NAND, the DC600M is perfectly suited for high-volume rack-mount servers. Plus, it includes hardware-based on-board power loss protection via power loss capacitors, reducing the risk of data loss in the event of an unexpected power failure.
Why customers are reluctant to share data online and what you can do about it [Q&A]


Brands are increasingly focussed on providing a good digital experience for their customers, yet many people remain reluctant to share their information with websites.
What are the reasons behind this reluctance? And what can enterprises do to overcome it? We talked to Josh Koenig, co-founder and chief strategy officer at SaaS web platform Pantheon, to find out.
Enterprise IT leaders plan to cut cloud spending


A new study from Vega Cloud on the use of cloud software and services by enterprise IT executives shows 48 percent expect to reduce their IT spending a little or a lot in 2023.
In addition, 65 percent say that reducing their cloud spending will be a goal for this year, while three-quarters of IT execs surveyed say they plan to cut cloud costs by between 10 and 50 percent in 2023.
Achieving SQL server high availability in a multi-platform environment


Today's organizations often manage SQL Server databases across various platforms, including physical, virtual, cloud, on-premises, hybrid cloud, and cloud-to-cloud environments. Managing individual instances of SQL Server in these diverse environments is challenging enough. How can you ensure that your key SQL Server databases are highly available -- meaning, accessible 99.99 percent of the time -- when so many platforms are involved?
High availability (HA) in a multi-platform environment depends on multiple factors. You’re going to need at least two systems running SQL Server, but where your primary and secondary systems reside -- on-prem, in the cloud, in multiple clouds, or some combination of these -- really doesn’t matter. What matters is that the data is reliably replicated among the primary and secondary environments. That requires a robust data replication system, seamless communications between the primary and secondary environments, and systems in place to monitor the health of both environments and to manage failover in the event that your primary SQL Server system becomes unavailable.
Versa delivers zero trust access across the enterprise


Hybrid cloud and hybrid work have changed where and how we access systems, challenging organizations to find ways to secure the enterprise while delivering the best user experience.
While cloud-delivered Zero Trust Network Access (ZTNA) solutions are now widely adopted to secure remote work, they don't deliver the application performance and inline policy enforcement needed for workers at the office.
Behavioral AI platform defends against multi-channel attacks


While email remains the most common path to target an organization, we're increasingly using other tools like Slack, Teams and Zoom too, so cybercriminals are steadily shifting their tactics and targeting these additional entry points across the enterprise.
AI-based email security platform Abnormal Security is launching a range of new additions to its product focused on expanding security detection for these collaboration tools.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.