Poorly planned digitization makes it harder for customers to get support


Most businesses now offer their customers multiple means of getting in touch, with many providing online chatbots as a customer service channel.
But new research released by Twilio shows that without taking advantage of first-party data to understand their customers and personalize their approach, businesses are missing key opportunities to engage.
How IBM and AWS are driving innovation in the cloud [Q&A]


As we reported at the end of last year, IBM and AWS have extended their collaboration, making IBM software products available as Software-as-a-Service (SaaS) on the AWS Marketplace.
We spoke to Judah Bernstein, CTO, AWS strategic partnership at IBM, to find out more about how the collaboration works and what it means for customers and Ecosystem partners.
95 percent of business leaders expect AI/ML investments to boost revenue


A new survey of 100 chief data officers (CDOs) and chief data analytics officers (CDAOs) at companies with $1B+ in revenue shows that 95 percent say their company leadership expects investments in AI and ML applications will result in a revenue increase.
The study for Domino Data Lab, carried out by Wakefield Research, shows 67 percent are adopting a more offensive data policy seeking to drive new business value with analytics, ML and AI applications.
93 percent of organizations suffer business email compromise attacks


The threat of business email compromise (BEC) is growing year on year and is projected to be twice as high as the threat of phishing in general.
According to a new report from cloud email security platform IRONSCALES, over 93 percent of organizations have experienced one or more of the BEC attack variants in the previous 12 months, with 62 percent facing three or more attack variants.
1Password introduces one-click login for enterprise users


Password service 1Password is launching a new service that will allow enterprise customers to unlock their 1Password accounts using third-party identity services.
Unlock with Single Sign-On (SSO) automatically provisions and deprovisions employees, with streamlined deployment through the bridge connection for the 1Password SCIM (System for Cross-domain Identity Management).
Tackling cloud costs and multicloud networking in a bad economy [Q&A]


It's become common for businesses to use more than one cloud, however, service providers have no incentive to offer unified management tools as they want to keep customers for themselves.
This means enterprises end up relying on multiple tools as their cloud footprint expands which is not only inefficient but can be costly. We spoke to Rod Stuhlmuller, VP of solutions marketing at Aviatrix, to find out how organizations can monitor and control their cloud usage and costs at a time when budgets are coming under increased pressure.
A house of divided brands: Uncovering SASE and SSE


The underlying technologies behind SASE and SSE must be made to work together if they are to secure the enterprise.
While alphabet soup is a staple of cybersecurity, if each acronym is tied to a clear use case the resulting thesaurus can actually be helpful. It gets tricky when vendors try to combine technologies that don’t really work together.
Social engineering remains the top threat for enterprises


The latest Annual Trends Report from Jamf, based on a sample of 500,000 devices protected by the company's technology, looks at the threats impacting devices used in the modern workplace and finds social engineering tops the list.
The combination of an increasingly distributed workforce with the relative ease with which bad actors can carry out phishing campaigns, leads to the leakage of user credentials. In 2022, 31 percent of organizations had at least one user fall victim to a phishing attack.
Deploying at scale -- what does it mean and why does it matter? [Q&A]


One of the popular buzzwords in development circles in recent years has been 'deployment at scale'. Now, while it's nice to have a universally recognized term, opinions about what deployment at scale actually means tend to vary.
So what exactly does 'at scale' mean in the development community and how can companies define their own approach? We spoke to Adam Frank, VP, product and marketing at Armory.io, to find out.
New Radiant Logic solution improves identity decision making


Enterprises need real-time access to lots of data, but it's important that access to that data is properly controlled.
Radiant Logic is launching a new data intelligence offering that offers identity observability and visualization capabilities, all built on an extensible API-layer and available as a SaaS offering.
The KM comeback: How IT leaders can optimize a knowledge-driven business future


Knowledge management (KM) -- a concept first established in the 1980s -- is now witnessing both a rapid comeback and a transformation. A perfect storm of factors is contributing to these trends, including the shift to remote and hybrid work; dramatic changes in customer and employee perceptions; "The Great Resignation" that took place in 2021 and the wave of tech company layoffs that followed it; and most notably, the continued explosion in the amount of unstructured content -- scattered across a growing number of siloed applications.
Knowledge Management has made its way back on the CIO agenda as one of the most important initiatives for business resiliency in the years ahead. And, now IT leaders assess how best to implement technologies that discover, cultivate and protect the collective knowledge of an organization and seamlessly disseminate it to employees where and when they need it. This new version of KM promises that the latest technology can help tame content chaos; however, doing that successfully means addressing a number of challenges.
Half of enterprises have publicly exposed SaaS assets


A new report finds that 50 percent of enterprises and 75 percent of mid-sized organizations have exposed public SaaS assets.
The report from security platform DoControl shows that large and medium companies have an average of 5.5 million and 1.5 million assets stored in SaaS applications respectively, illustrating the challenge IT and SecOps teams face daily in securing the intellectual property those assets contain.
Over 30 percent of mobile users encounter phishing attacks


According to data from Lookout, 2022 has seen the highest percentage of mobile phishing encounter rates ever, with an average of more than 30 percent of personal and enterprise users exposed to these attacks every quarter.
Since 2021, mobile phishing encounter rates have increased by around 10 percent for enterprise devices and more than 20 percent for personal devices.
Is it worth paying for an enterprise browser? [Q&A]


Why would you pay for a browser when all of the popular ones are available for free? If you're an enterprise it could be because a paid browser can address some key problems.
We spoke to CEO and co-founder of enterprise browser specialist Island, Mike Fey, to find out more about this category and what benefits it can offer.
88 percent of organizations have suffered cyber breaches in the last two years


A new survey of 300 CIOs, CISOs, and security executives from enterprises across Europe and the USA shows that 88 percent of organizations admit to being compromised by a cyber incident over the past two years.
The study from Pentera reveals that this is despite organizations having an average of almost 44 security solutions in place.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.