Articles about Enterprise

How CISOs can communicate cyber risk to the board [Q&A]

risk jigsaw piece

The current economic downturn has meant significant budget cuts for many enterprises. But cyberthreats continue to escalate and businesses need to take them seriously.

This means that more than ever CISOs must prove the value of their cybersecurity programs to senior management. But how can they do this effectively? We spoke with Tim Erlin, VP of product innovation at SecurityScorecard to find out.

Continue reading

IBM streamlines its partner program

Man and woman shaking hands

Over the past couple of years IBM has been undergoing something of a transformation. While its mainframe and mid-range hardware offerings remain at its core, Big Blue has been looking to capture a slice of the $1 trillion hybrid cloud and AI market and help clients automate, secure and modernize their businesses.

Partnerships have been an important element of this and today the company is changing how it supports partners with the launch of a single, integrated experience that offers access to IBM resources, incentives and tailored support to deepen their technical expertise and help speed time to market.

Continue reading

Why enterprises need to tame IT complexity [Q&A]

Cloud maze complexity

It often seems to be the case that progress in the technology world is offset by an increase complexity. This can be seen in increased IT infrastructure costs, multi-cloud frameworks that need bigger teams of software engineers, increased data capture needing additional analytics, and more.

All of which lead in turn to spiraling budgets. We spoke to Andy Nallappan, chief security officer and head of software engineering and operations at Broadcom, about how organizations can partner with their strategic vendors to reduce IT complexity, drive more innovation and ultimately boost their bottom line.

Continue reading

Rebuilding trust between developers and security [Q&A]

The demands of modern business IT environments can often lead to friction between developers and security teams which can hamper the successful rollout of cloud security.

Developers want to deliver features as fast as possible and security teams want things to be as secure as possible, so there is constant conflict of interest. We spoke to David Hendri, CTO and co-founder of cloud security startup Solvo, to discover how to rebuild the trust between developers and security by creating a common language.

Continue reading

Service mesh and the CISO [Q&A]

CISO

The number of use cases for Kubernetes is expanding as an increasing number of enterprises across a wide array of industries are adopting it as their platform of choice. However, this also expands the enterprise attack surface and business risk as a result.

We spoke to William, Morgan CEO of Buoyant, about how CISOs are coming face-to-face with the insecurity that can arise from managing Kubernetes platforms. They are beginning to see the risks that can unfold as well as how a service mesh can support a security stack.

Continue reading

More automation, zero trust and complex attacks -- enterprise security predictions for 2023

Crystal ball with key

Over the past couple of years enterprise security teams have faced a number of challenges, not least the shift to more remote and hybrid working.

This has driven forward plans to adopt automation and technologies like zero trust. So, what changes can we expect to see as we move forward into 2023?

Continue reading

Why proactive protection is key to effective cybersecurity

Data cloud lock

Compared to many industries, cybersecurity operates in a highly adversarial environment, with organizations investing huge levels of time, money and resources into defeating a range of determined threat actors. If that weren't enough, security teams are pitted against highly motivated, well-organized criminal and nation-state groups who constantly shift tactics to gain the upper hand.

The result is that security teams are frequently inundated with alerts, false positives and negatives, which nevertheless, they are compelled to address rather than being allowed to concentrate on proactively securing their networks.

Continue reading

Keeping attackers out of the 'atomized network' [Q&A]

Network security

As the network as we know it has changed and adversaries are finding success with new attack routes that exploit gaps in defenses.

As enterprise security undergoes a major shift we need to change the way we think about this complex 'atomized network'. We spoke to Martin Roesch, CEO of Netography, to find out about the challenges this presents and how to address them.

Continue reading

Third-party behaviors increase risk to organizations

Risk dial

A new Third-Party Risk Report from secure enterprise browser tech company Talon Cyber Security focuses on the ways in which third-party workers increase security risks and organizations vulnerable to data breaches.

Talon surveyed 258 third-party workers, including contractors and freelancers, and finds 89 percent work from personal, un-managed devices, which organizations lack visibility into and therefore cannot enforce the enterprise’s security posture on.

Continue reading

Enterprise management undervalues the power of search in digital transformation efforts

A new study from Coveo shows 81 percent of IT and business stakeholders agree that it's hard to engage management when talking about search.

The study of 600 people carried out by Dimensional Research shows 83 percent of respondents say that enterprise search is crucial to digital transformation efforts, but that company leadership rarely talks about it.

Continue reading

Meeting the challenge of securing cloud-native apps [Q&A]

Cloud data security

As more and more of our computing moves to the cloud, protecting information and apps throws up a new set of challenges for enterprises.

We spoke to Ratan Tiperneni, president and CEO of cloud-native app protection specialist Tigera, to find out more about the security implications of going cloud native and how to deal with them.

Continue reading

Enterprises wasting investment on identity management solutions

According to a new study 70 percent of companies report they're paying for identity tools they're not actively using.

The research from OneIdentity, which surveyed over 1,000 IT security professionals, shows 96 percent of companies are using multiple identity management tools, with 41 percent deploying at least 25 different systems to manage access rights.

Continue reading

Would you bet your chocolate on preventing a breach?

While 97 percent of business leaders and security professionals say their organization is as prepared or more prepared to defend against cybersecurity attacks than they were a year ago, one in five wouldn't bet a chocolate bar that they could prevent a damaging breach.

Ivanti surveyed 6,500 executive leaders, cybersecurity professionals, and office workers to understand their perception of today's cybersecurity threats and find out how companies are preparing for future threats.

Continue reading

If the office is for off-sites, how does onboarding work?

Onboarding

The way we live and work has changed forever -- and our workspaces are changing alongside. According to the Office of National Statistics, 84 percent of workers who worked from home planned to carry out a mix of working at home and in offices in the future, while research from Poly shows 77 percent of businesses are redesigning their office spaces to better suit new ways of working.

What constitutes an "office" is a very broad definition -- it could be a home, a local café or pub, or an actual physical office. And the role of the company office has changed. More than everyday tasks, it’s now a space for special events and meetings that would once have happened at an off-site.

Continue reading

How to pay off your technical debt -- and why you should

Financial management is crucial as personal and business expenditures grow. Understanding where efficiency can be boosted and where costs can be cut is vital for a positive business cash flow. Something which may be overlooked is your technical debt. 

Here we explore how to know whether you are facing technical debt, how it might be harming your business, and how to get out of it.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.