Articles about Enterprise

SOC stresses mean 71 percent of security professionals consider quitting

Employee leaving

Information and work overload, insufficient downtime, lack of tool integration, and alert fatigue mean that 71 percent of security operations center professionals say they're likely to quit their job.

A new report from logging and security analytics company Devo Technology shows SOC leaders continue to face a tricky balancing act when it comes to retaining SOC analysts amid major talent shortages and turnover.

Continue reading

One in five CISOs works over 25 hours overtime each week

According to new research from Tessian, 18 percent of UK and US security leaders work over 25 hours extra a week, double the amount of overtime they reported in 2021.

On average, they work 16.5 hours over their contracted weekly hours, up from 11 hours in 2021. Also three-quarters of security leaders say they aren't able to always switch off from work, 16 percent of these say they can rarely or never switch off.

Continue reading

How Kubernetes and AI will combine to deliver next-gen services [Q&A]

The popularity of Kubernetes has led to its rapid adoption, but as with any advanced technology, the benefits come alongside challenges.

Being able to take full advantage of the technology means understanding what it can offer and how it fits with other developments like artificial intelligence. We spoke to Tobi Knaup, CEO of independent Kubernetes platform D2iQ, to find out about the current state of Kubernetes and what it promises for the future.

Continue reading

How to tell your customers that you've been hacked [Q&A]

The short-term costs of a cyberattack are significant. Investigating and containing a breach, rebuilding IT systems and implementing new security controls, as well as the loss of productivity, can all cause severe financial strain.

However, the long-term costs of a breach are often even more damaging. Enterprises that do not handle an attack well can suffer a number of further consequences, including reputational damage, a loss of customer loyalty and a drop in share prices.

Continue reading

New exposure management platform helps businesses manage cyber risks

Risk dial

The average enterprise uses more than 130 cybersecurity point solutions, creating siloed data that is hard for security teams to apply in meaningful ways.

To address this problem, Tenable is launching a new exposure management platform, aimed at giving customers a unified view into their organization's assets and vulnerabilities across the whole attack surface.

Continue reading

New tool helps enterprises measure the effectiveness of their security spending

Lock and money

Spending more money on cybersecurity tools doesn't necessarily mean you're less likely to suffer from a cyberattack. Until now though it's been hard to tell whether what you do spend is actually delivering a good return on investment.

Safe Security is today launching a new Return on Security Investment (ROSI) calculator that enables CISOs and CFOs to quantify the reduction in risk for each dollar invested in cybersecurity.

Continue reading

Simplify developers' deployment journey with continuous deployment

Most development teams struggle early in the process of shifting to cloud native application development and deployment. Their existing tool chains that have served them well in the past struggle with them as they attempt to scale their deployment footprint. The last thing they want to do is invest time in becoming experts in deployment. They don’t want to create or troubleshoot a deployment process -- they want to code with a GitOps approach, and know their software has been deployed successfully, is working as expected, and providing value to the customer. How can team leaders satisfy those desires? Automated continuous deployment. Continuous deployment simplifies delivery, ensures the software works at each deployment stage and allows developers to focus on what they do best.

When it comes to the development cycle, faster is better. Companies with higher release rates generate four to five times higher revenue growth than those pushing updates less often. To keep up with the competition, fast and efficient deployment of quality, stable software is the priority.

Continue reading

Less than five percent of Fortune 500 companies are using the latest email standards

Holding email icon

Phishing is one of the most common methods of launching a cyberattack, yet new research from Red Sift shows that only a small percentage of publicly traded companies have fully adopted the latest email standards that could protect them and their customers.

DMARC (Domain-based Message Authentication, Reporting and Conformance) and BIMI (Brand Indicators for Message Identification) help prevent spoofing and allow businesses to display their logo on authenticated emails.

Continue reading

Lenovo ThinkReality VRX is an all-in-one VR headset for the Enterprise Metaverse

lenovo VR

Lenovo today took the wraps off its new all-in-one virtual reality headset which it says has been engineered to be a "high-quality, versatile and secure on-ramp to the Enterprise Metaverse".

The new ThinkReality VRX headset is powered by a Snapdragon XR platform and features a slim form factor, pancake optics, and full color, high-resolution pass-through capabilities for mixed reality applications. It also offers a full suite of end-to-end services for businesses.

Continue reading

How to use data to anticipate consumer behavior [Q&A]

Businesses are starting to recognize the advantages of leveraging data-driven approaches to improve customer experience. These approaches are also hugely valuable when included in strategic roadmaps to increase engagement and return on investment.

Analytical data is ideal for businesses wanting to assess the needs of their target customers to deliver personalized experiences and attain more accurate forecasting and demand planning. Moreover, data from analytics promotes more effective inventory and supply chain management, compounding supply and fulfillment issues businesses are currently experiencing

Continue reading

Digital transformation delays cost businesses millions

Digital transformation

Digital transformation is still seen as a priority by many enterprises, but research for low-code application development platform, Toca, reveals the extent of the challenges faced by IT teams in delivering these projects.

Budget constraints, a lack of collaboration across the wider business, legacy systems, a shortage of developers and integration challenges are seen as the top five barriers to transformation initiatives.

Continue reading

Why enterprises need to treat data as a first class citizen [Q&A]

Data has become increasingly important for modern businesses and they increasingly expect it to help them improve their delivery to customers and ultimately their bottom line.

We spoke to Dom Couldwell, head of field engineering, EMEA at DataStax to discuss how companies can use data and how they need to adapt their approach to do so effectively.

Continue reading

Legacy technology undermines ransomware response

Ransomware

Almost half of respondents to a new survey say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. 46 percent are relying on primary backup and recovery infrastructure that was designed in, or before, 2010.

The study commissioned by Cohesity from Censuswide also finds 62 percent expressed some level of concern over whether their IT and security teams would be able to mobilize efficiently to respond to an attack.

Continue reading

Staying ahead of the hackers with zero trust [Q&A]

With the decline of the traditional enterprise network perimeter, more and more organizations are turning to a zero trust approach to securing their systems.

This not only reduces the attack surface, it ensures that if an attack does succeed it's much less likely to spread laterally within the network. We talked to Tim Silverline, VP of security at network automation specialist Gluware, to find out more about what implementing zero trust means.

Continue reading

Windows 11 could save you millions*

computer piggy bank and cash

As the latest update to Windows 11 rolls out with new features focusing on productivity and collaboration, IT management efficiency and security, Microsoft is understandably keen for businesses to adopt the OS.

To that end it's commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Windows 11 and Microsoft 365.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.