Optimizing tech spend to drive value through economic turbulence [Q&A]


Sustained economic volatility has forced organizations of all sizes to make difficult decisions. Whether it's reducing headcount, lowering operational overhead, or cutting costs in other areas, business leaders are looking to increase agility, efficiency, and flexibility ahead of a looming recession.
Global business leaders are facing a unique set of challenges, and many are looking at their tech spend as an area for cost savings. We spoke to Ryan Newsome, chief technology officer at Motus, about how enterprise decision makers can evaluate tech spend through the lens of value creation rather than simply reducing costs.
Google Workspace gains passkey support


Following on from its adding passkey support to Chrome and Android at the end of last year, Google is continuing to rollout the technology across all its platforms.
The company is now bringing passkeys to Google Workspace. Passkeys offer a convenient and secure passwordless authentication experience across websites and apps, allowing users to sign in with a fingerprint, face recognition, or other screen-lock mechanism across phones, laptops, or desktops.
The challenge of protecting data in the cloud [Q&A]


Modern enterprises hold huge volumes of data and increasingly it's stored in the cloud. This means that protecting the information is a significant challenge and it can even be easy to lose track of where data is.
We spoke to Dan Benjamin, co-founder and CEO of Dig Security, to discuss the risks around cloud data storage and how to address them.
The evolution of AI in the enterprise [Q&A]


In the last year or so, AI has suddenly been the thing that everyone's talking about, thanks largely to ChatGPT. There's a good deal of discussion around where AI is headed in the future and the opportunities and threats it presents.
We spoke to Josh Tobin, CEO of Gantry, an AI observability tool for platform models, about the evolution of AI in the enterprise and how businesses can make sure they don't get left behind.
How are enterprise customers using your software?


Getting a clear understanding of how customers use your products is vitally important for software suppliers. Product managers are best equipped to deliver valuable products if they have clear knowledge about this. Data-driven insights, available from entitlement management (EM) systems, are essential for optimizing product road mapping, packaging, provisioning, and pricing decisions, all with the aim of delivering the best customer experience possible. All of these contribute to achieving strategic goals, such as facilitating shifts in monetization and deployment models, streamlining the quote-to-cash (Q2C or QTC) process, and ultimately accelerating growth and increasing recurring revenue.
Key to these efforts: aligning price (the expense for the customer) and value (the perceived utility) of your product. But this proves to be tricky without understanding of who your users are. "Lack of insights into user personas and their priorities" and "disparate systems that make it difficult to achieve single customer view" are among the top hurdles, as reported in the Revenera Monetization Monitor: Software Monetization Models and Strategies 2022. A comprehensive approach to entitlement management can help provide the insights that contribute to improved operational efficiencies.
Beating the headache of SaaS sprawl [Q&A]


Moving to the cloud has always presented something of a challenge, but the pandemic made things even more difficult because of the need to manage more applications across a distributed workforce.
Add in the issue of shadow IT, and enterprises are increasingly struggling with SaaS sprawl. We spoke to BetterCloud CTO, Jamie Tischart to learn more about the problem and how to deal with it.
ESG risk management: More than just a 'nice to have'


Today it seems that the issue of Environmental, Social and Governance (ESG) is being talked about everywhere and has become a key focus for enterprise management teams, especially those responsible for risk management. But is this something new, or should it be viewed as part and parcel of a mature enterprise risk management infrastructure?
One thing is for sure. ESG has important implications for a wide range of stakeholders that includes directors, investors, employees, suppliers, and employees for whom performance against ESG objectives counts.
80 percent of businesses are not ready for Windows 11


Support for Windows 10 ends on October 14 2025, just over two years away. But new research from Lansweeper shows that eight out of 10 businesses are still running it.
Windows 11 is gradually creeping into the enterprise but the process is slow. October 2022, data from Lansweeper shows just 2.61 percent of Windows 11 compatible devices were running Windows 11. Recently updated Windows 11 adoption rate figures show that this has now increased to 5.47 percent.
The biggest impediments to user adoption of enterprise technology


An investment in enterprise technology can’t truly be deemed a success unless the organization achieves successful user adoption. While there are key best practices that can steer organizations towards successful adoption, there are also several impediments along the way. Here we’ll explore the impediments and how to overcome them.
The #1 impediment to successful user adoption is having a tech-focused mindset. Oftentimes, a customer will think to themselves: "OK, all the various bits of the tech are working. The project is on time and on budget. Let's roll this stuff out organization-wide, offer a bit of training, and people should love it and adopt it to solve their problems."
Email is seen as the enterprise channel most vulnerable to attacks


The majority of organizations use six or more communication tools, across channels, with email being the single channel seen as the most vulnerable to attacks.
Of those responding to a new survey by Enterprise Strategy Group (ESG) and Armorblox of almost 500 IT and security professionals, 38 percent see email as the most vulnerable channel.
Why automation can help continuously validate security policies [Q&A]


Security professionals all know that they should test their security hardware and software periodically to make sure it's working as intended. Many normal IT activities have unintended consequences that cause security configurations to 'drift' over time and make the organization more vulnerable.
But testing is frequently postponed or ignored because it never becomes a high enough priority. We spoke to Song Pang, SVP of engineering at NetBrain, to find out how automation can be used to detect when security products or network traffic are no longer behaving as intended.
Enterprises have a worrying lack of visibility into APIs


Analysis of around a trillion API transactions spanning a range industries over the second half of 2022 by Cequence Security seeks to highlight the latest API threat trends plaguing organizations.
In the second half of 2022, approximately 45 billion search attempts were made for shadow APIs, marking a 900 percent increase from the five billion attempts made in the first half of the year.
Is this the year we take quantum threats seriously? [Q&A]


Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.
More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.
Network edge technologies fail to cut it for modern businesses


New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.
Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.
Business leaders don't understand cybersecurity


A new survey from Delinea of over 2,000 IT security decision makers (ITSDMs) reveals that only 39 percent of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler.
In addition, over a third (36 percent) believe that it is considered important only in terms of compliance and regulatory demands, while 17 percent say it isn't seen as a business priority.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.