Protecting data during digital transformation [Q&A]


In recent years, many businesses have embraced digital transformation to boost productivity and streamline operations in an attempt to create competitive advantages. But in the process of migrating critical operations to the cloud, they have exposed themselves to new risks.
With cloud apps accessible from anywhere, it not only helps your users get their work done, it also provides attackers with new vectors to exploit.
Lack of visibility is the biggest challenge for cybersecurity teams


New research from Sevco Security shows that more than 10 percent of enterprise IT assets are missing endpoint protection, and that roughly five percent are not covered by enterprise patch management solutions.
Nearly 20 percent of Windows servers lack endpoint protection, far more than Windows clients and MacOS assets, which are just over 10 percent.
Website performance issues cost eCommerce businesses 10 percent of revenue


A new survey of 200 UK ecommerce leaders at enterprise organizations with more than £10m ($11.5m) revenue reveals that, on average, businesses lost 10 percent in revenue due to downtime and website performance issues in the last two years.
This is despite increased investment, with 48 percent of respondents saying their spending on eCommerce solutions has increased in the last two years, according to the study by enterprise software company Box UK.
Understanding threat detection methods [Q&A]


Detecting threats today isn't just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well.
In order to be effective, security teams need to look at what data to use, what the science says can be done with the data, and what to expect. We spoke to Andrew Hollister, CISO at LogRhythm to find out more.
Security awareness training goes mainstream but still needs more work


Some form of cybersecurity awareness training has been implemented in 97 percent of enterprises this year, according to a new survey of 1,900 security professionals from ThriveDX.
However, only 42 percent report involving their employees in security detection with the use of such measures as a Phishing Incident Button, while 65 percent agree that their training program needs expansion.
Why solving the identity management crisis facilitates the adoption of digital transformation


Identity data is frequently stored by organizations using a variety of sources, formats, and protocols, sometimes making it impossible to access essential identity information needed for security and business decisions. Without precise identity data, systems cannot decide what users should and should not be able to access which resources. Even worse, to make life easier for the admins, sometimes the default is overextending access and over-privileging accounts. This raises the possibility of a successful breach, as well as the possibility that it will go unnoticed for a longer period of time.
The number of identities linked to companies has also been increasing exponentially -- a recent study by Gartner Peer Insights found that 60 percent of organizations have more than 21 identities per user.
How improving the application experience can deliver for business [Q&A]


Spending on cloud services is showing no sign of slowing down, but IT and security leaders are realizing that applications need to have high availability and strong performance in order to be effective.
Application experience management is therefore becoming a key element of enterprise strategy. We spoke to Jason Dover, VP product strategy at Progress, to find out why.
Enterprises increase their SaaS usage but neglect security risks


A new study of SaaS usage among enterprises across the US, UK and Europe shows 74 percent report more than half of their applications are now SaaS-based, and 66 percent are spending more on SaaS applications today than a year ago.
The study by cybersecurity asset management company Axonius shows the increase in SaaS applications has resulted in more complexity and increased security risk in 66 percent of organizations, but 60 percent rank SaaS security fourth or lower on their list of current security priorities, and only 34 percent say they're worried about the costs associated with rising SaaS-based app usage.
Enterprises are storing more data than ever


According to a new study more than 50 percent of enterprises are managing 5PB or more of data, compared with less than 40 percent that were doing so in the same survey last year.
The 2022 Unstructured Data Management Report from Komprise also shows most are now spending more than 30 percent of their IT budget on storage and backups.
IBM and VMware help businesses modernize hybrid cloud workloads


IBM and VMware are using this week's VMware Explore event to announce an expanded partnership to help clients and partners modernize mission-critical workloads and speed up time to value in hybrid cloud environments.
The two companies are also planning to help clients in regulated industries such as financial services, healthcare and the public sector address the cost, complexity and risk of migrating and modernizing mission-critical workloads in the cloud.
Different ways of building corporate systems based on the zero trust architecture


The corporate infrastructure of US government agencies will soon be transferred to a new network security model called Zero Trust Architecture (ZTA). Last year, U.S. President Joe Biden released an Executive Order on Improving the Nation's Cybersecurity. Later, on January 26, 2022, the Federal Government released a Federal Zero Trust Architecture (ZTA) strategy memorandum that sets the rules for the construction of a new IT infrastructure for government agencies and organizations in accordance with the ZTA strategy.
In this article, I want to look at the fundamental changes that the new paradigm brings, replacing the secure perimeter model, which has so far been the base for the construction of corporate IT systems.
How to ensure a smooth transition as a new CTO


Beginning a CTO role can be a daunting prospect, especially if you’re completely new to the company. There are lots of plates to spin, people to meet and ways of working to get used to, so it’s crucial you’re on top of your game from the outset.
In effect, those first few months in the position are about learning as much as possible in a short space of time. This learning process should encompass all elements of the business, including the company itself, its culture and your colleagues. Below, we have outlined six key areas that new CTOs can focus on, to make your transition into the role as smooth as possible.
3 major risks enterprises face in the era of digital interconnectivity


Today, enterprise-scale companies are more interconnected than ever. People, applications, servers, networks, and devices in different departments and even in different parts of the world are constantly exchanging information in both the public and private cloud. That’s not a bad thing. In fact, most organizations strive for this kind of silo-less interconnectivity. Desirable as it may be, however, it’s not risk-free.
There are cybercriminals ready to exploit any vulnerability in an organization’s digital defences. That much should be obvious from the 60 000-plus reports of fraud and cybercrime that came from UK businesses in 2021. It’s critical, therefore, that organizations do everything possible to understand and mitigate those risks.
Data maturity drives increased revenues


Data-mature enterprises see a three times improvement in revenue along with shorter time to market, greater profit, improved operational efficiency and great customer loyalty, according to a new report.
The study from IDC and sponsored by analytics specialist Heap shows that how well a company uses data and employs it in its decision making can provide up to a 2.5 times average increase in business outcomes across the board.
AIOps needs a new (customer-focused) approach


IT infrastructure has become incredibly complicated -- intensified by the investment in digital transformations encouraged by the pandemic. One of the unintended consequences? IT teams and incident responders are stressed, and stretched farther than ever. PagerDuty’s The State of Digital Operations lays out the increased burden on these teams, the results in terms of burnout, and the impact having a more mature digital operations can have on minimizing that stress.
AIOps is an essential component to any mature digital organization, and it’s clear a new approach is needed. The sheer volume of IT events, from changes, warnings and incidents, to tickets for more routine activity are increasing 70 percent year-on-year. At a moment when increases in budgets won’t keep pace with the explosion of incidents or the complexity of IT infrastructure (if the budgets aren’t being reduced outright), leveraging AIOps to serve teams and customers is critical.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.