The Holy Trinity: Three trends that will take organizations to the next level in 2023


The organizations of today are facing one crisis after another. Whether it’s geopolitical tension or rising inflation, they are being forced to adapt. Faced with squeezed budgets and dwindling resources, these macroeconomic headwinds are causing business leaders to make smarter investments than ever before.
This is causing many enterprises to reassess their strategies and invest more resources in digital transformation, as they seek the ability to do more with less. As this continues to gather pace, we’ll see three key trends emerging, to form a holy trinity of success that will define digital transformation in 2023.
CISOs are gaining more influence in the boardroom


The role of the CISO has always been a somewhat secondary one in terms of the overall big picture of running a business.
However, a new study from cybersecurity company Coalfire shows that the CISO role is maturing quickly, and gaining more of a voice in the boardroom.
Why focusing on technology spend at the expense of human cyber resources is risky [Q&A]


As we enter 2023, factors such as an uncertain economy, inflation, the fear of a recession, hiring freezes and layoffs, and supply chain issues continue to take their toll on businesses -- impacting not only daily operations, but budgets for the new year.
When it comes to cybersecurity spending, in particular, Curtis Fechner, engineering fellow, threat management at Optiv, says many executives expect their budgets to be unchanged in 2023, which is a best case scenario as the risk of cuts amid an uncertain economy and business landscape looms large.
Why your organization's biggest risk might come from your browsers [Q&A]


Last year saw zero day vulnerabilities being actively exploited in the wild across many of the major web browsers.
For businesses that allow their users to choose which browser they use this is a problem due to the frequency of vulnerabilities. We spoke to Ofer Ben-Noon, co-founder and CEO at Talon Cyber Security and former member of the Israeli intelligence community, to find out more about the current threat landscape and how firms can secure their browsers.
Enterprises need to step up metadata management now


It’s no exaggeration to say that data drives business today. Organizations are literally flooded with data on all fronts, particularly as they accelerate their digital transformation and cloud migration. As data proliferates, it’s increasingly difficult to manage. That’s where metadata comes in. Though metadata is often described as "data about data," it’s actually much more than that.
Metadata is generated whenever data is ingested, accessed by users, moved around an organization, integrated or augmented with data from other sources, profiled or cleaned and analyzed. All this information creates the context for other data elements, providing a complete picture of the data. This holistic view makes it possible to organize and locate data, to understand what it means and to maximize its value.
New security tools aim to protect enterprises from phishing attacks


A new set of zero trust email security solutions from Cloudflare are aimed at protecting employees from multichannel phishing attacks, preventing sensitive data from being exfiltrated via email, and helping businesses speed up and simplify deployments,
Compatible with any email provider, the protection is integrated into Cloudflare's platform, helping to secure all of an organization's applications and data.
Nine out of 10 companies plan to grow their investment in automation


More than nine in 10 IT leaders have invested in process automation over the past year, and 91 percent say their organization plans to increase investment in process automation over the next 24 months, compared with 88 percent when asked the same question a year ago.
These findings come from a new report published today by Camunda, based on research carried out by Regina Corso Consulting, but the study also finds there are concerns, as 69 percent say that as more tasks become automated, it's harder to visualize end-to-end processes.
How CISOs can communicate cyber risk to the board [Q&A]


The current economic downturn has meant significant budget cuts for many enterprises. But cyberthreats continue to escalate and businesses need to take them seriously.
This means that more than ever CISOs must prove the value of their cybersecurity programs to senior management. But how can they do this effectively? We spoke with Tim Erlin, VP of product innovation at SecurityScorecard to find out.
IBM streamlines its partner program


Over the past couple of years IBM has been undergoing something of a transformation. While its mainframe and mid-range hardware offerings remain at its core, Big Blue has been looking to capture a slice of the $1 trillion hybrid cloud and AI market and help clients automate, secure and modernize their businesses.
Partnerships have been an important element of this and today the company is changing how it supports partners with the launch of a single, integrated experience that offers access to IBM resources, incentives and tailored support to deepen their technical expertise and help speed time to market.
Why enterprises need to tame IT complexity [Q&A]


It often seems to be the case that progress in the technology world is offset by an increase complexity. This can be seen in increased IT infrastructure costs, multi-cloud frameworks that need bigger teams of software engineers, increased data capture needing additional analytics, and more.
All of which lead in turn to spiraling budgets. We spoke to Andy Nallappan, chief security officer and head of software engineering and operations at Broadcom, about how organizations can partner with their strategic vendors to reduce IT complexity, drive more innovation and ultimately boost their bottom line.
Rebuilding trust between developers and security [Q&A]


The demands of modern business IT environments can often lead to friction between developers and security teams which can hamper the successful rollout of cloud security.
Developers want to deliver features as fast as possible and security teams want things to be as secure as possible, so there is constant conflict of interest. We spoke to David Hendri, CTO and co-founder of cloud security startup Solvo, to discover how to rebuild the trust between developers and security by creating a common language.
Service mesh and the CISO [Q&A]


The number of use cases for Kubernetes is expanding as an increasing number of enterprises across a wide array of industries are adopting it as their platform of choice. However, this also expands the enterprise attack surface and business risk as a result.
We spoke to William, Morgan CEO of Buoyant, about how CISOs are coming face-to-face with the insecurity that can arise from managing Kubernetes platforms. They are beginning to see the risks that can unfold as well as how a service mesh can support a security stack.
More automation, zero trust and complex attacks -- enterprise security predictions for 2023

Why proactive protection is key to effective cybersecurity


Compared to many industries, cybersecurity operates in a highly adversarial environment, with organizations investing huge levels of time, money and resources into defeating a range of determined threat actors. If that weren't enough, security teams are pitted against highly motivated, well-organized criminal and nation-state groups who constantly shift tactics to gain the upper hand.
The result is that security teams are frequently inundated with alerts, false positives and negatives, which nevertheless, they are compelled to address rather than being allowed to concentrate on proactively securing their networks.
Keeping attackers out of the 'atomized network' [Q&A]


As the network as we know it has changed and adversaries are finding success with new attack routes that exploit gaps in defenses.
As enterprise security undergoes a major shift we need to change the way we think about this complex 'atomized network'. We spoke to Martin Roesch, CEO of Netography, to find out about the challenges this presents and how to address them.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.