If the office is for off-sites, how does onboarding work?

Onboarding

The way we live and work has changed forever -- and our workspaces are changing alongside. According to the Office of National Statistics, 84 percent of workers who worked from home planned to carry out a mix of working at home and in offices in the future, while research from Poly shows 77 percent of businesses are redesigning their office spaces to better suit new ways of working.

What constitutes an "office" is a very broad definition -- it could be a home, a local café or pub, or an actual physical office. And the role of the company office has changed. More than everyday tasks, it’s now a space for special events and meetings that would once have happened at an off-site.

Continue reading

How to pay off your technical debt -- and why you should

money dollars cash burden debt chain

Financial management is crucial as personal and business expenditures grow. Understanding where efficiency can be boosted and where costs can be cut is vital for a positive business cash flow. Something which may be overlooked is your technical debt. 

Here we explore how to know whether you are facing technical debt, how it might be harming your business, and how to get out of it.

Continue reading

62 percent of companies say cybersecurity incidents have impacted their operations

Security breach

Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to the latest annual Security Outcomes Report from Cisco.

The report reveals that 62 percent of organizations surveyed say they have experienced a security event that impacted business in the past two years. The leading types of incidents are network or data breaches (51.5 percent), network or system outages (51.1 percent), ransomware events (46.7 percent) and distributed denial of service attacks (46.4 percent).

Continue reading

Why SaaS needs a holistic approach to security [Q&A]

SaaS

As organizations move more of their systems to the cloud they face a new range of threats. This combined with a shortage of cybersecurity skills makes securing SaaS systems a challenge.

Galit Lubetzky Sharon, co-founder and CTO of Wing Security, believes that a new more holistic approach, involving employees across the organization, is needed. We spoke to her to learn more.

Continue reading

Value stream management is key to digital transformation (even if you don't know what it is)

digital transformation

Businesses are increasingly turning to digital transformation in order to remain competitive and relevant in their respective industries. But how do you ensure you're getting value from your efforts?

A new survey of 600 senior executives in large companies from CloudBees shows that value stream management (VSM) is seen as key, as well as removing barriers and making transformation easier to achieve.

Continue reading

Balancing the risks and benefits of an online presence [Q&A]

Secure encrypted internet - https

The widespread use of digital platforms allows businesses to expand, but at the same time a growing internet presence can put organizations at risk in ways they cannot plan for.

We talked to Censys' data scientist, Emily Austin about the company's recent State of the Internet report and about how businesses can proactively fight against unknown domains and risks.

Continue reading

IBM and AWS extend their collaboration to drive innovation

IBM logo

IBM and AWS are launching a new set of capabilities, including access to new SaaS offerings and consulting capabilities for clients modernizing on AWS as part of their hybrid cloud approach, and expanded mainframe application modernization.

Earlier this year, the two companies announced the availability of IBM Software products as Software-as-a-Service (SaaS) on the AWS Marketplace, making IBM solutions more accessible.

Continue reading

Fueling the Apple BYOD revolution [Q&A]

Apple laptop

It's no secret that BYOD provides incredible benefits on paper -- from increased productivity to more flexibility and streamlined output. But unfortunately, many initiatives fail to take off due to security and privacy concerns.

Mosyle CEO Alcyr Araujo believes this doesn't always have to be the case, and that Apple devices are primed to offer the best balance for BYOD. We spoke to him to find out more.

Continue reading

Cybersecurity budgets are up but aren't being well spent

budget keyboard

New research from cloud platform Fastly shows that while enterprises are increasing their cybersecurity spending they're not making the most of their investments.

While 73 percent of organizations worldwide are increasing their cybersecurity spending to protect themselves against future risks, IT leaders are investing poorly with only 61 percent of their cybersecurity tools fully active or deployed.

Continue reading

CISOs look to balance transformation and cybersecurity

CISO

A new survey reveals that while CISOs are still experiencing challenges around visibility, intelligence and control, nearly half (47 percent) are proactively focused on digital transformation and cloud migration.

The study of 600 UK CISOs from BlueFort Security finds most have moved beyond the challenges of a widespread shift to remote working and are now focused on digital transformation and migration to the cloud, despite an uncertain world picture and bleak economic environment.

Continue reading

Data privacy and the changes enterprises need to be ready for [Q&A]

privacy key

It has been estimated that there are some 43 zetabytes of data stored by enterprises today that are inaccessible and not commercialized due to privacy concerns, operational complexity and regulations.

With the California Consumer Privacy Act (CCPA) becoming fully operational on January 1 2023 and other legislation in place or coming around the world, the need for businesses to find new data accessibility methods that are compliance-friendly is very real.

Continue reading

Digital transformation needs culture change as well as tech

Digital transformation

Prioritizing culture, alongside technology change, can lead to significant increases in revenue according to new research from Telstra.

The study finds that 85 percent of senior technology decision-makers in the UK believe that technology implementation is an empowering force when it comes to employees delivering value for their organizations. But it can be used as a tool to both reinforce (77 percent) and change (82 percent) culture within the organization too.

Continue reading

The challenges of modernizing enterprise API infrastructure [Q&A]

api

APIs allow products and services to communicate with each other and have become essential to digital transformation projects as they make it easy to open up application data and functionality to third-party developers and business partners, or to departments within the enterprise.

Where legacy systems are involved though it's often necessary to modernize the API infrastructure to ensure things work smoothly and this can lead to serious challenges, especially where security is concerned.

Continue reading

Cyberattacks cost enterprises $1,200 per employee per year

Money

Organizations are paying $1,197 per employee each year to address successful cyber incidents across email services, cloud collaboration apps or services, and web browsers.

This means that a 500-employee company spends on average $600,000 an year, according to a new survey for Perception Point, carried out by Osterman Research.

Continue reading

How to choose the safest data center [Q&A]

Data center

Data centers around the world are currently home to an estimated 1,327 exabytes of data. This information has a potentially huge value so it needs protecting.

But as more businesses choose to trust their information to external data centers how can they be sure that it's going to be properly secured? We spoke to Oliver Pinson-Roxburgh, CEO of Defense.com, to find out how organizations can choose the most secure data center possible?

Continue reading

Load More Articles