Articles about Enterprise

Why now is time to build sustainable accessibility into organizational culture

Accessibility is increasingly recognized as an important part of how organizations deliver value  across a number of industries, and rightly so. It goes beyond meeting legal requirements to improve user experience, promote inclusion, and build better services for all. Yet, despite the growing awareness, some organizations still see integrating accessibility into its processes as an isolated effort or something to be 'checked off' near the end of a project, prompted by upcoming regulation, user complaints, or reputational risk.

This reactive approach may satisfy compliance needs in the short-term, but it does little to build lasting, meaningful inclusion. Meaningful progress happens when accessibility is embedded into an organization’s everyday mindset and operations. In short, accessibility must become a fundamental element, not an afterthought. Adding accessibility to everyday practices instead of reserving it for emergencies allows companies to develop better products, rely on stronger teams, and be more resilient.

Continue reading

The challenges and opportunities of generative AI [Q&A]

The promise of GenAI is undeniable, it offers transformative potential to streamline workflows, boost efficiencies, and deliver competitive advantage. Yet, for many organizations, the journey to implement AI is far from straightforward.

Obstacles typically fall into three categories: strategic, technological, and operational. We spoke with Dorian Selz, CEO and co-founder of Squirro, to explore these obstacles in more detail, as well as looking at some of the biggest misconceptions enterprises have when starting their GenAI journey.

Continue reading

Almost half of enterprise apps don't handle credentials securely

A new report from Orchid Security shows nearly half of enterprise applications violate basic credential-handling guidance, with 44 percent undermining centralized identity provider (IdP) policies and 40 percent falling short of widely accepted identity-control standards.

Orchid analyzed authentication flows and authorization practices embedded deep within enterprise applications and finds clear-text credentials in nearly half. These are normally associated with alternative access flows, often for non-human accounts, but they also present an easy target for threat actors seeking entry or lateral movement.

Continue reading

Why MSPs are the key to a better enterprise cloud experience [Q&A]

In recent years more and more organizations have been turning to the cloud for their IT requirements.

But with public, private and hybrid options to choose from the cloud landscape is complex. It's no surprise then that enterprises are increasingly leveraging MSPs to manage their public cloud deployments for them.

Continue reading

How data sovereignty is becoming mission critical to enterprises

New research shows that 30 percent of large enterprises have already made the strategic commitment to a sovereign AI and data platform, and 95 percent say it will be mission critical for them within the next three years.

The research by EDB interviewed more than 2,000 senior executives across 13 countries about how they are planning for the agentic AI world. The initial findings show that 30 enterprises a day are making strategic commitments to becoming sovereign AI and data platforms.

Continue reading

Yubico helps more enterprises go passwordless

Hardware authentication company Yubico is announcing the expanded availability of YubiKey as a Service to all countries in the European Union (EU). This allows organizations to be more agile and flexible in their adoption of phishing-resistant YubiKeys.

It's also announced the greater availability of YubiEnterprise Delivery across 117 new locations around the world. This makes it available 199 locations (175 countries and 24 territories) and more than doubles existing delivery coverage of YubiKeys to both office and remote users in a fast and turnkey way.

Continue reading

Autonomous AI agents aim to streamline enterprise development

The use of AI in software development can save valuable time completing routine tasks. But what if it could autonomously respond to events, implement changes, and submit code through standard pull requests?

This is what Zencoder is doing with the launch today of Autonomous Zen Agents for CI/CD, bringing groundbreaking AI automation directly into the software development infrastructure.

Continue reading

Docker introduces Hardened Images to boost supply chain security

Security of the enterprise software supply chain isn't solved with buzz or branding. It is solved with trust, scale, and seamless integration into real developer workflows.

To meet everyday software supply chain challenges Docker is launching Docker Hardened Images (DHI), a curated catalog of security-hardened, enterprise-grade container images.

Continue reading

Starburst platform updates boost enterprise AI initiatives

Updates to the Starburst data platform for apps and AI are designed to accelerate enterprise AI initiatives and support the transition to a future-ready data architecture built on a data lakehouse.

At the heart of these changes are Starburst AI Workflows, a purpose-built suite of capabilities that speed AI experimentation to production for enterprises. AI Workflows provides a link between vector-native search, metadata-driven context, and robust governance, all on an open data lakehouse architecture.

Continue reading

How social media is changing workplace communication

Time was when office colleagues would exchange information, ideas and gossip around the water cooler or coffee machine.

That's changing because of technology though, new research reveals that platforms like TikTok and Instagram are directly influencing how 83 percent of people communicate professionally, fueling conflict and misunderstanding among an increasingly intergenerational workforce.

Continue reading

Why subsea cables are essential to business resilience [Q&A]

While businesses focus on cloud services and digital transformation, they often don't realize that their operations depend on the massive cable networks laid underwater.

Recent incidents have highlighted how critical these subsea cables are for business continuity, so do businesses need to rethink their approach to infrastructure as a result? We spoke to Sharat Sinha, director and CEO of Airtel Business to find out.

Continue reading

Chainguard launches malware-resistant dependencies for Python

The Python programming language has become the foundation of modern AI and machine learning applications. Of course that makes it a prime target for supply chain attacks.

Public registries do minimal vetting of hosted artifacts, and they don't provide assurance that the distributed library matches its source code, exposing enterprises to supply chain attacks. Python libraries are also susceptible to supply chain attacks because many projects include more than just pure Python code -- for example project maintainers often rebundle shared system libraries into their Python libraries to ensure stable behavior.

Continue reading

Enterprises rush to adopt AI but struggle to measure its value

New research shows that enterprises are going beyond AI experimentation and into large-scale production but that return on investment is taking a back seat in the process.

The report from Domino Data Lab shows that while 88 percent of organizations report improved ability to move AI from experimentation to production, nearly 60 percent expect less than 50 percent ROI in the rapidly changing areas of machine learning (60 percent) or Gen AI (57 percent).

Continue reading

New edge appliances allow organizations to deploy AI securely

Edge computing

Enterprises and governments share a common interest in safeguarding private information, but often the rollout of AI systems can unwittingly put sensitive data at risk.

Trusted AI specialist Seekr is announcing a new all-in-one AI system -- built for government agencies -- to ensure that AI can be deployed in air-gapped environments, standalone data centers, and contested environments.

Continue reading

Employee browser activity creates a security blindspot

Thanks to a growth in remote working and the use of SaaS applications enterprise reliance on browsers is growing, but this leaves them open to risks stemming from dangerous employee web behavior.

According to a cybersecurity expert at network security platform NordLayer, some employee activity that may go undetected by security teams can result in confidential data and industry secrets leaks or violations of GDPR.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.