Third-party behaviors increase risk to organizations


A new Third-Party Risk Report from secure enterprise browser tech company Talon Cyber Security focuses on the ways in which third-party workers increase security risks and organizations vulnerable to data breaches.
Talon surveyed 258 third-party workers, including contractors and freelancers, and finds 89 percent work from personal, un-managed devices, which organizations lack visibility into and therefore cannot enforce the enterprise’s security posture on.
Enterprise management undervalues the power of search in digital transformation efforts


A new study from Coveo shows 81 percent of IT and business stakeholders agree that it's hard to engage management when talking about search.
The study of 600 people carried out by Dimensional Research shows 83 percent of respondents say that enterprise search is crucial to digital transformation efforts, but that company leadership rarely talks about it.
Meeting the challenge of securing cloud-native apps [Q&A]


As more and more of our computing moves to the cloud, protecting information and apps throws up a new set of challenges for enterprises.
We spoke to Ratan Tiperneni, president and CEO of cloud-native app protection specialist Tigera, to find out more about the security implications of going cloud native and how to deal with them.
Enterprises wasting investment on identity management solutions


According to a new study 70 percent of companies report they're paying for identity tools they're not actively using.
The research from OneIdentity, which surveyed over 1,000 IT security professionals, shows 96 percent of companies are using multiple identity management tools, with 41 percent deploying at least 25 different systems to manage access rights.
Would you bet your chocolate on preventing a breach?


While 97 percent of business leaders and security professionals say their organization is as prepared or more prepared to defend against cybersecurity attacks than they were a year ago, one in five wouldn't bet a chocolate bar that they could prevent a damaging breach.
Ivanti surveyed 6,500 executive leaders, cybersecurity professionals, and office workers to understand their perception of today's cybersecurity threats and find out how companies are preparing for future threats.
If the office is for off-sites, how does onboarding work?


The way we live and work has changed forever -- and our workspaces are changing alongside. According to the Office of National Statistics, 84 percent of workers who worked from home planned to carry out a mix of working at home and in offices in the future, while research from Poly shows 77 percent of businesses are redesigning their office spaces to better suit new ways of working.
What constitutes an "office" is a very broad definition -- it could be a home, a local café or pub, or an actual physical office. And the role of the company office has changed. More than everyday tasks, it’s now a space for special events and meetings that would once have happened at an off-site.
How to pay off your technical debt -- and why you should


Financial management is crucial as personal and business expenditures grow. Understanding where efficiency can be boosted and where costs can be cut is vital for a positive business cash flow. Something which may be overlooked is your technical debt.
Here we explore how to know whether you are facing technical debt, how it might be harming your business, and how to get out of it.
62 percent of companies say cybersecurity incidents have impacted their operations


Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to the latest annual Security Outcomes Report from Cisco.
The report reveals that 62 percent of organizations surveyed say they have experienced a security event that impacted business in the past two years. The leading types of incidents are network or data breaches (51.5 percent), network or system outages (51.1 percent), ransomware events (46.7 percent) and distributed denial of service attacks (46.4 percent).
Why SaaS needs a holistic approach to security [Q&A]


As organizations move more of their systems to the cloud they face a new range of threats. This combined with a shortage of cybersecurity skills makes securing SaaS systems a challenge.
Galit Lubetzky Sharon, co-founder and CTO of Wing Security, believes that a new more holistic approach, involving employees across the organization, is needed. We spoke to her to learn more.
Value stream management is key to digital transformation (even if you don't know what it is)


Businesses are increasingly turning to digital transformation in order to remain competitive and relevant in their respective industries. But how do you ensure you're getting value from your efforts?
A new survey of 600 senior executives in large companies from CloudBees shows that value stream management (VSM) is seen as key, as well as removing barriers and making transformation easier to achieve.
Balancing the risks and benefits of an online presence [Q&A]


The widespread use of digital platforms allows businesses to expand, but at the same time a growing internet presence can put organizations at risk in ways they cannot plan for.
We talked to Censys' data scientist, Emily Austin about the company's recent State of the Internet report and about how businesses can proactively fight against unknown domains and risks.
IBM and AWS extend their collaboration to drive innovation


IBM and AWS are launching a new set of capabilities, including access to new SaaS offerings and consulting capabilities for clients modernizing on AWS as part of their hybrid cloud approach, and expanded mainframe application modernization.
Earlier this year, the two companies announced the availability of IBM Software products as Software-as-a-Service (SaaS) on the AWS Marketplace, making IBM solutions more accessible.
Fueling the Apple BYOD revolution [Q&A]


It's no secret that BYOD provides incredible benefits on paper -- from increased productivity to more flexibility and streamlined output. But unfortunately, many initiatives fail to take off due to security and privacy concerns.
Mosyle CEO Alcyr Araujo believes this doesn't always have to be the case, and that Apple devices are primed to offer the best balance for BYOD. We spoke to him to find out more.
Cybersecurity budgets are up but aren't being well spent


New research from cloud platform Fastly shows that while enterprises are increasing their cybersecurity spending they're not making the most of their investments.
While 73 percent of organizations worldwide are increasing their cybersecurity spending to protect themselves against future risks, IT leaders are investing poorly with only 61 percent of their cybersecurity tools fully active or deployed.
CISOs look to balance transformation and cybersecurity


A new survey reveals that while CISOs are still experiencing challenges around visibility, intelligence and control, nearly half (47 percent) are proactively focused on digital transformation and cloud migration.
The study of 600 UK CISOs from BlueFort Security finds most have moved beyond the challenges of a widespread shift to remote working and are now focused on digital transformation and migration to the cloud, despite an uncertain world picture and bleak economic environment.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.