Beating the headache of SaaS sprawl [Q&A]

SaaS

Moving to the cloud has always presented something of a challenge, but the pandemic made things even more difficult because of the need to manage more applications across a distributed workforce.

Add in the issue of shadow IT, and enterprises are increasingly struggling with SaaS sprawl. We spoke to BetterCloud CTO, Jamie Tischart to learn more about the problem and how to deal with it.

Continue reading

ESG risk management: More than just a 'nice to have'

ESG

Today it seems that the issue of Environmental, Social and Governance (ESG) is being talked about everywhere and has become a key focus for enterprise management teams, especially those responsible for risk management. But is this something new, or should it be viewed as part and parcel of a mature enterprise risk management infrastructure?

One thing is for sure. ESG has important implications for a wide range of stakeholders that includes directors, investors, employees, suppliers, and employees for whom performance against ESG objectives counts.

Continue reading

80 percent of businesses are not ready for Windows 11

Laptop running Windows 11

Support for Windows 10 ends on October 14 2025, just over two years away. But new research from Lansweeper shows that eight out of 10 businesses are still running it.

Windows 11 is gradually creeping into the enterprise but the process is slow. October 2022, data from Lansweeper shows just 2.61 percent of Windows 11 compatible devices were running Windows 11. Recently updated Windows 11 adoption rate figures show that this has now increased to 5.47 percent.

Continue reading

The biggest impediments to user adoption of enterprise technology

Workplace

An investment in enterprise technology can’t truly be deemed a success unless the organization achieves successful user adoption. While there are key best practices that can steer organizations towards successful adoption, there are also several impediments along the way. Here we’ll explore the impediments and how to overcome them.

The #1 impediment to successful user adoption is having a tech-focused mindset. Oftentimes, a customer will think to themselves: "OK, all the various bits of the tech are working. The project is on time and on budget. Let's roll this stuff out organization-wide, offer a bit of training, and people should love it and adopt it to solve their problems."

Continue reading

Email is seen as the enterprise channel most vulnerable to attacks

Malicious email

The majority of organizations use six or more communication tools, across channels, with email being the single channel seen as the most vulnerable to attacks.

Of those responding to a new survey by Enterprise Strategy Group (ESG) and Armorblox of almost 500 IT and security professionals, 38 percent see email as the most vulnerable channel.

Continue reading

Why automation can help continuously validate security policies [Q&A]

multiple threats

Security professionals all know that they should test their security hardware and software periodically to make sure it's working as intended. Many normal IT activities have unintended consequences that cause security configurations to 'drift' over time and make the organization more vulnerable.

But testing is frequently postponed or ignored because it never becomes a high enough priority. We spoke to Song Pang, SVP of engineering at NetBrain, to find out how automation can be used to detect when security products or network traffic are no longer behaving as intended.

Continue reading

Enterprises have a worrying lack of visibility into APIs

api

Analysis of around a trillion API transactions spanning a range industries over the second half of 2022 by Cequence Security seeks to highlight the latest API threat trends plaguing organizations.

In the second half of 2022, approximately 45 billion search attempts were made for shadow APIs, marking a 900 percent increase from the five billion attempts made in the first half of the year.

Continue reading

Is this the year we take quantum threats seriously? [Q&A]

quantum computing

Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.

More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.

Continue reading

Network edge technologies fail to cut it for modern businesses

Networked computers

New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.

Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.

Continue reading

Business leaders don't understand cybersecurity

businessman confused

A new survey from Delinea of over 2,000 IT security decision makers (ITSDMs) reveals that only 39 percent of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler.

In addition, over a third (36 percent) believe that it is considered important only in terms of compliance and regulatory demands, while 17 percent say it isn't seen as a business priority.

Continue reading

Technology sector suffers most from poor cyber hygiene

security flaw

Analysis of exposed dark web assets from SpyCloud finds that the technology sector has the highest number of malware-infected employees and consumers, the highest number of exposed corporate credentials, and the most exposed malware cookie records.

In the analysis of the darknet exposure of employees of Fortune 1000 enterprises across 21 industry sectors, researchers uncovered 27.48 million pairs of credentials with corporate email addresses and plain text passwords, with over 223,000 exfiltrated by malware.

Continue reading

Kingston launches DC600M Enterprise SSD

sedc600m-7680gb-s_hr.jpg

Today, we have some exciting news from Kingston Digital, Inc. The company just announced its latest offering in the world of data storage — the DC600M Enterprise SSD.

This new product has been optimized for mixed-use workloads, with excellent Quality of Service (QoS) to ensure latency and IOPS consistency. With 6Gbps SATA 3.0 storage and 3D TLC NAND, the DC600M is perfectly suited for high-volume rack-mount servers. Plus, it includes hardware-based on-board power loss protection via power loss capacitors, reducing the risk of data loss in the event of an unexpected power failure.

Continue reading

Why customers are reluctant to share data online and what you can do about it [Q&A]

Reluctant nervous scared online

Brands are increasingly focussed on providing a good digital experience for their customers, yet many people remain reluctant to share their information with websites.

What are the reasons behind this reluctance? And what can enterprises do to overcome it? We talked to Josh Koenig, co-founder and chief strategy officer at SaaS web platform Pantheon, to find out.

Continue reading

Enterprise IT leaders plan to cut cloud spending

Cloud dollars

A new study from Vega Cloud on the use of cloud software and services by enterprise IT executives shows 48 percent expect to reduce their IT spending a little or a lot in 2023.

In addition, 65 percent say that reducing their cloud spending will be a goal for this year, while three-quarters of IT execs surveyed say they plan to cut cloud costs by between 10 and 50 percent in 2023.

Continue reading

Achieving SQL server high availability in a multi-platform environment

SQL

Today's organizations often manage SQL Server databases across various platforms, including physical, virtual, cloud, on-premises, hybrid cloud, and cloud-to-cloud environments. Managing individual instances of SQL Server in these diverse environments is challenging enough. How can you ensure that your key SQL Server databases are highly available -- meaning, accessible 99.99 percent of the time -- when so many platforms are involved?

High availability (HA) in a multi-platform environment depends on multiple factors. You’re going to need at least two systems running SQL Server, but where your primary and secondary systems reside -- on-prem, in the cloud, in multiple clouds, or some combination of these -- really doesn’t matter. What matters is that the data is reliably replicated among the primary and secondary environments. That requires a robust data replication system, seamless communications between the primary and secondary environments, and systems in place to monitor the health of both environments and to manage failover in the event that your primary SQL Server system becomes unavailable.

Continue reading

Load More Articles