Enterprises need to step up metadata management now
It’s no exaggeration to say that data drives business today. Organizations are literally flooded with data on all fronts, particularly as they accelerate their digital transformation and cloud migration. As data proliferates, it’s increasingly difficult to manage. That’s where metadata comes in. Though metadata is often described as "data about data," it’s actually much more than that.
Metadata is generated whenever data is ingested, accessed by users, moved around an organization, integrated or augmented with data from other sources, profiled or cleaned and analyzed. All this information creates the context for other data elements, providing a complete picture of the data. This holistic view makes it possible to organize and locate data, to understand what it means and to maximize its value.
New security tools aim to protect enterprises from phishing attacks
A new set of zero trust email security solutions from Cloudflare are aimed at protecting employees from multichannel phishing attacks, preventing sensitive data from being exfiltrated via email, and helping businesses speed up and simplify deployments,
Compatible with any email provider, the protection is integrated into Cloudflare's platform, helping to secure all of an organization's applications and data.
Nine out of 10 companies plan to grow their investment in automation
More than nine in 10 IT leaders have invested in process automation over the past year, and 91 percent say their organization plans to increase investment in process automation over the next 24 months, compared with 88 percent when asked the same question a year ago.
These findings come from a new report published today by Camunda, based on research carried out by Regina Corso Consulting, but the study also finds there are concerns, as 69 percent say that as more tasks become automated, it's harder to visualize end-to-end processes.
How CISOs can communicate cyber risk to the board [Q&A]
The current economic downturn has meant significant budget cuts for many enterprises. But cyberthreats continue to escalate and businesses need to take them seriously.
This means that more than ever CISOs must prove the value of their cybersecurity programs to senior management. But how can they do this effectively? We spoke with Tim Erlin, VP of product innovation at SecurityScorecard to find out.
IBM streamlines its partner program
Over the past couple of years IBM has been undergoing something of a transformation. While its mainframe and mid-range hardware offerings remain at its core, Big Blue has been looking to capture a slice of the $1 trillion hybrid cloud and AI market and help clients automate, secure and modernize their businesses.
Partnerships have been an important element of this and today the company is changing how it supports partners with the launch of a single, integrated experience that offers access to IBM resources, incentives and tailored support to deepen their technical expertise and help speed time to market.
Why enterprises need to tame IT complexity [Q&A]
It often seems to be the case that progress in the technology world is offset by an increase complexity. This can be seen in increased IT infrastructure costs, multi-cloud frameworks that need bigger teams of software engineers, increased data capture needing additional analytics, and more.
All of which lead in turn to spiraling budgets. We spoke to Andy Nallappan, chief security officer and head of software engineering and operations at Broadcom, about how organizations can partner with their strategic vendors to reduce IT complexity, drive more innovation and ultimately boost their bottom line.
Rebuilding trust between developers and security [Q&A]
The demands of modern business IT environments can often lead to friction between developers and security teams which can hamper the successful rollout of cloud security.
Developers want to deliver features as fast as possible and security teams want things to be as secure as possible, so there is constant conflict of interest. We spoke to David Hendri, CTO and co-founder of cloud security startup Solvo, to discover how to rebuild the trust between developers and security by creating a common language.
Service mesh and the CISO [Q&A]
The number of use cases for Kubernetes is expanding as an increasing number of enterprises across a wide array of industries are adopting it as their platform of choice. However, this also expands the enterprise attack surface and business risk as a result.
We spoke to William, Morgan CEO of Buoyant, about how CISOs are coming face-to-face with the insecurity that can arise from managing Kubernetes platforms. They are beginning to see the risks that can unfold as well as how a service mesh can support a security stack.
More automation, zero trust and complex attacks -- enterprise security predictions for 2023
Why proactive protection is key to effective cybersecurity
Compared to many industries, cybersecurity operates in a highly adversarial environment, with organizations investing huge levels of time, money and resources into defeating a range of determined threat actors. If that weren't enough, security teams are pitted against highly motivated, well-organized criminal and nation-state groups who constantly shift tactics to gain the upper hand.
The result is that security teams are frequently inundated with alerts, false positives and negatives, which nevertheless, they are compelled to address rather than being allowed to concentrate on proactively securing their networks.
Keeping attackers out of the 'atomized network' [Q&A]
As the network as we know it has changed and adversaries are finding success with new attack routes that exploit gaps in defenses.
As enterprise security undergoes a major shift we need to change the way we think about this complex 'atomized network'. We spoke to Martin Roesch, CEO of Netography, to find out about the challenges this presents and how to address them.
Third-party behaviors increase risk to organizations
A new Third-Party Risk Report from secure enterprise browser tech company Talon Cyber Security focuses on the ways in which third-party workers increase security risks and organizations vulnerable to data breaches.
Talon surveyed 258 third-party workers, including contractors and freelancers, and finds 89 percent work from personal, un-managed devices, which organizations lack visibility into and therefore cannot enforce the enterprise’s security posture on.
Enterprise management undervalues the power of search in digital transformation efforts
A new study from Coveo shows 81 percent of IT and business stakeholders agree that it's hard to engage management when talking about search.
The study of 600 people carried out by Dimensional Research shows 83 percent of respondents say that enterprise search is crucial to digital transformation efforts, but that company leadership rarely talks about it.
Meeting the challenge of securing cloud-native apps [Q&A]
As more and more of our computing moves to the cloud, protecting information and apps throws up a new set of challenges for enterprises.
We spoke to Ratan Tiperneni, president and CEO of cloud-native app protection specialist Tigera, to find out more about the security implications of going cloud native and how to deal with them.
Enterprises wasting investment on identity management solutions
According to a new study 70 percent of companies report they're paying for identity tools they're not actively using.
The research from OneIdentity, which surveyed over 1,000 IT security professionals, shows 96 percent of companies are using multiple identity management tools, with 41 percent deploying at least 25 different systems to manage access rights.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.
