Articles about Enterprise

Firms act to beef up software supply chain security

supply chain

New data reveals a significant increase in activities to secure open source components and integrate security into developer toolchains in order to protect the software supply chain.

The 13th edition of the Building Security In Maturity Model (BSIMM) report from Synopsys analyzes the software security practices of 130 organizations -- including Adobe, PayPal and Lenovo -- in their efforts to secure more than 145,000 applications built and maintained by nearly 410,000 developers.

Continue reading

Data center sector unprepared for expanding sustainability requirements

Data center

The latest Annual Global Data Center survey from the Uptime Institute shows an industry that remains strong but is working to address increasing pressure for sustainability progress and reporting.

The sector is also grappling with continuing staffing shortages, supply chain delays, costly outages and other complex challenges.

Continue reading

How AI and computer vision can help retailers to compete [Q&A]

The rise of online retail coupled with the pandemic have brought about some unprecedented changes to the retail landscape in recent years.

But as consumers now start to venture back into stores, how can retailers make use of technology to effectively compete with their online counterparts and with other brick-and-mortar businesses?

Continue reading

Organizations are being overwhelmed by cloud complexity

As the move toward cloud-native architectures accelerates, the data generated outstrips the ability of current solutions to produce meaningful analytics, according to a new study.

The survey, from software intelligence company Dynatrace, of 1,300 CIOs and senior cloud and IT operations managers in large organizations, shows 71 percent of CIOs say the explosion of data produced by cloud-native technology stacks is beyond human ability to manage.

Continue reading

Organizations falling short in addressing security risks

Risk dial

According to 90 percent of IT security leaders their organizations are falling short in addressing cybersecurity risks.

Research from Foundry finds that this perception comes from a number of issues including convincing all or parts of their organization of the severity of risk (27 percent), and believing their organization isn’t investing enough resources to address risks (26 percent).

Continue reading

Public cloud security gaps expose business critical assets

Cloud

The public cloud has been widely adopted by organizations of all sizes, but a new report from Orca Security reveals some alarming shortcomings in security.

Among the key findings, 72 percent of organizations have at least one Amazon S3 bucket that allows public read access, and 70 percent have a Kubernetes API server that is publicly accessible.

Continue reading

IT leaders are out of touch with development team progress

A new study reveals that 40 percent of respondents don't know whether their development teams are behind or ahead of schedule, and 27 percent say they have trouble following the teams' progress to ensure they are meeting their goals.

The research from Couchbase, based on a survey of 650 senior IT decision makers, shows 88 percent of respondents are aware of the challenges faced by development teams.

Continue reading

Protecting data during digital transformation [Q&A]

Digital transformation

In recent years, many businesses have embraced digital transformation to boost productivity and streamline operations in an attempt to create competitive advantages. But in the process of migrating critical operations to the cloud, they have exposed themselves to new risks.

With cloud apps accessible from anywhere, it not only helps your users get their work done, it also provides attackers with new vectors to exploit.

Continue reading

Lack of visibility is the biggest challenge for cybersecurity teams

New research from Sevco Security shows that more than 10 percent of enterprise IT assets are missing endpoint protection, and that roughly five percent are not covered by enterprise patch management solutions.

Nearly 20 percent of Windows servers lack endpoint protection, far more than Windows clients and MacOS assets, which are just over 10 percent.

Continue reading

Website performance issues cost eCommerce businesses 10 percent of revenue

eCommerce

A new survey of 200 UK ecommerce leaders at enterprise organizations with more than £10m ($11.5m) revenue reveals that, on average, businesses lost 10 percent in revenue due to downtime and website performance issues in the last two years.

This is despite increased investment, with 48 percent of respondents saying their spending on eCommerce solutions has increased in the last two years, according to the study by enterprise software company Box UK.

Continue reading

Understanding threat detection methods [Q&A]

Threat

Detecting threats today isn't just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well.

In order to be effective, security teams need to look at what data to use, what the science says can be done with the data, and what to expect. We spoke to Andrew Hollister, CISO at LogRhythm to find out more.

Continue reading

Security awareness training goes mainstream but still needs more work

training key

Some form of cybersecurity awareness training has been implemented in 97 percent of enterprises this year, according to a new survey of 1,900 security professionals from ThriveDX.

However, only 42 percent report involving their employees in security detection with the use of such measures as a Phishing Incident Button, while 65 percent agree that their training program needs expansion.

Continue reading

Why solving the identity management crisis facilitates the adoption of digital transformation

digital transformation

Identity data is frequently stored by organizations using a variety of sources, formats, and protocols, sometimes making it impossible to access essential identity information needed for security and business decisions. Without precise identity data, systems cannot decide what users should and should not be able to access which resources. Even worse, to make life easier for the admins, sometimes the default is overextending access and over-privileging accounts. This raises the possibility of a successful breach, as well as the possibility that it will go unnoticed for a longer period of time.

The number of identities linked to companies has also been increasing exponentially -- a recent study by Gartner Peer Insights  found that 60 percent of organizations have more than 21 identities per user.

Continue reading

How improving the application experience can deliver for business [Q&A]

Motion interface

Spending on cloud services is showing no sign of slowing down, but IT and security leaders are realizing that applications need to have high availability and strong performance in order to be effective.

Application experience management is therefore becoming a key element of enterprise strategy. We spoke to Jason Dover, VP product strategy at Progress, to find out why.

Continue reading

Enterprises increase their SaaS usage but neglect security risks

SaaS

A new study of SaaS usage among enterprises across the US, UK and Europe shows 74 percent report more than half of their applications are now SaaS-based, and 66 percent are spending more on SaaS applications today than a year ago.

The study by cybersecurity asset management company Axonius shows the increase in SaaS applications has resulted in more complexity and increased security risk in 66 percent of organizations, but 60 percent rank SaaS security fourth or lower on their list of current security priorities, and only 34 percent say they're worried about the costs associated with rising SaaS-based app usage.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.