New exposure management platform helps businesses manage cyber risks
The average enterprise uses more than 130 cybersecurity point solutions, creating siloed data that is hard for security teams to apply in meaningful ways.
To address this problem, Tenable is launching a new exposure management platform, aimed at giving customers a unified view into their organization's assets and vulnerabilities across the whole attack surface.
New tool helps enterprises measure the effectiveness of their security spending
Spending more money on cybersecurity tools doesn't necessarily mean you're less likely to suffer from a cyberattack. Until now though it's been hard to tell whether what you do spend is actually delivering a good return on investment.
Safe Security is today launching a new Return on Security Investment (ROSI) calculator that enables CISOs and CFOs to quantify the reduction in risk for each dollar invested in cybersecurity.
Simplify developers' deployment journey with continuous deployment
Most development teams struggle early in the process of shifting to cloud native application development and deployment. Their existing tool chains that have served them well in the past struggle with them as they attempt to scale their deployment footprint. The last thing they want to do is invest time in becoming experts in deployment. They don’t want to create or troubleshoot a deployment process -- they want to code with a GitOps approach, and know their software has been deployed successfully, is working as expected, and providing value to the customer. How can team leaders satisfy those desires? Automated continuous deployment. Continuous deployment simplifies delivery, ensures the software works at each deployment stage and allows developers to focus on what they do best.
When it comes to the development cycle, faster is better. Companies with higher release rates generate four to five times higher revenue growth than those pushing updates less often. To keep up with the competition, fast and efficient deployment of quality, stable software is the priority.
Less than five percent of Fortune 500 companies are using the latest email standards
Phishing is one of the most common methods of launching a cyberattack, yet new research from Red Sift shows that only a small percentage of publicly traded companies have fully adopted the latest email standards that could protect them and their customers.
DMARC (Domain-based Message Authentication, Reporting and Conformance) and BIMI (Brand Indicators for Message Identification) help prevent spoofing and allow businesses to display their logo on authenticated emails.
Lenovo ThinkReality VRX is an all-in-one VR headset for the Enterprise Metaverse
Lenovo today took the wraps off its new all-in-one virtual reality headset which it says has been engineered to be a "high-quality, versatile and secure on-ramp to the Enterprise Metaverse".
The new ThinkReality VRX headset is powered by a Snapdragon XR platform and features a slim form factor, pancake optics, and full color, high-resolution pass-through capabilities for mixed reality applications. It also offers a full suite of end-to-end services for businesses.
How to use data to anticipate consumer behavior [Q&A]
Businesses are starting to recognize the advantages of leveraging data-driven approaches to improve customer experience. These approaches are also hugely valuable when included in strategic roadmaps to increase engagement and return on investment.
Analytical data is ideal for businesses wanting to assess the needs of their target customers to deliver personalized experiences and attain more accurate forecasting and demand planning. Moreover, data from analytics promotes more effective inventory and supply chain management, compounding supply and fulfillment issues businesses are currently experiencing
Digital transformation delays cost businesses millions
Digital transformation is still seen as a priority by many enterprises, but research for low-code application development platform, Toca, reveals the extent of the challenges faced by IT teams in delivering these projects.
Budget constraints, a lack of collaboration across the wider business, legacy systems, a shortage of developers and integration challenges are seen as the top five barriers to transformation initiatives.
Why enterprises need to treat data as a first class citizen [Q&A]
Data has become increasingly important for modern businesses and they increasingly expect it to help them improve their delivery to customers and ultimately their bottom line.
We spoke to Dom Couldwell, head of field engineering, EMEA at DataStax to discuss how companies can use data and how they need to adapt their approach to do so effectively.
Legacy technology undermines ransomware response
Almost half of respondents to a new survey say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. 46 percent are relying on primary backup and recovery infrastructure that was designed in, or before, 2010.
The study commissioned by Cohesity from Censuswide also finds 62 percent expressed some level of concern over whether their IT and security teams would be able to mobilize efficiently to respond to an attack.
Staying ahead of the hackers with zero trust [Q&A]
With the decline of the traditional enterprise network perimeter, more and more organizations are turning to a zero trust approach to securing their systems.
This not only reduces the attack surface, it ensures that if an attack does succeed it's much less likely to spread laterally within the network. We talked to Tim Silverline, VP of security at network automation specialist Gluware, to find out more about what implementing zero trust means.
Windows 11 could save you millions*
As the latest update to Windows 11 rolls out with new features focusing on productivity and collaboration, IT management efficiency and security, Microsoft is understandably keen for businesses to adopt the OS.
To that end it's commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Windows 11 and Microsoft 365.
Firms act to beef up software supply chain security
New data reveals a significant increase in activities to secure open source components and integrate security into developer toolchains in order to protect the software supply chain.
The 13th edition of the Building Security In Maturity Model (BSIMM) report from Synopsys analyzes the software security practices of 130 organizations -- including Adobe, PayPal and Lenovo -- in their efforts to secure more than 145,000 applications built and maintained by nearly 410,000 developers.
Data center sector unprepared for expanding sustainability requirements
The latest Annual Global Data Center survey from the Uptime Institute shows an industry that remains strong but is working to address increasing pressure for sustainability progress and reporting.
The sector is also grappling with continuing staffing shortages, supply chain delays, costly outages and other complex challenges.
How AI and computer vision can help retailers to compete [Q&A]
The rise of online retail coupled with the pandemic have brought about some unprecedented changes to the retail landscape in recent years.
But as consumers now start to venture back into stores, how can retailers make use of technology to effectively compete with their online counterparts and with other brick-and-mortar businesses?
Organizations are being overwhelmed by cloud complexity
As the move toward cloud-native architectures accelerates, the data generated outstrips the ability of current solutions to produce meaningful analytics, according to a new study.
The survey, from software intelligence company Dynatrace, of 1,300 CIOs and senior cloud and IT operations managers in large organizations, shows 71 percent of CIOs say the explosion of data produced by cloud-native technology stacks is beyond human ability to manage.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.