Microsoft releases public preview of Windows Autopatch


It is only a couple of months since Microsoft first talked about Windows Autopatch, a new service for users of Windows 10 and Windows 11 designed to ensure that software is kept up to date. The company has now released a public preview of the free service.
As well as keeping Windows 10 and Windows 11 updated, Windows Autopatch will also take care of updating firmware, drivers and Microsoft 365 apps. Microsoft says that the launch date for the service is July, so the release of a public preview gives interested users a chance to try it out a few weeks early.
Automating networks for whatever comes next [Q&A]


Digital transformation and modernization of IT is sweeping across many organizations at the moment. But one aspect that's sometimes neglected is their impact on networks.
How can enterprises scale their networks to cope with change and what part can automation play in the mix? We spoke to Ernest Lefner, chief product officer at Gluware, and co-founder and former co-chairman of ONUG (Open Network User Group), to find out.
Enterprises overspend by millions on cloud services


New research reveals enterprises are over-spending on cloud services by up to $8.5 million, as IT leaders grow frustrated with poor management tools, vendor-lock in and issues with accessing data.
A study from Couchbase of IT decision makers at enterprises with more than 1,000 staff finds a typical annual spend on cloud services to now stand at $33 million. However, functions that are not currently meeting businesses expectations account for over 35 percent of the total cost.
The secret sauce to finding files, emails and other enterprise data


Finding the right file, email and other internal data without enterprise search is like grilling without barbecue sauce. It is theoretically possible, but who would even want to try?
While Internet search engines like Google specialize in directing you to the right website, enterprise search products do a deep dive into an organization’s own data. The secret sauce to enterprise search is indexing. Indexing "pre-processes" Microsoft Office files, PDFs, emails plus attachments, compressed archives and other web-ready data.
APIs and cloud apps are greatest threats to enterprise security readiness


A survey of over 400 CISOs finds they are are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs).
The study from CISOs Connect, an invitation-only community of cyber experts and part of Security Current, finds the IT components rated as most needing improvement are: APIs (42 percent), cloud applications (SaaS) (41 percent), and cloud infrastructure (IaaS) (38 percent).
New study reveals serious disconnect in executive planning for cyberattacks


A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.
The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.
Three steps to turn data into an indispensable strategic tool


While 'data is the new oil' has become something of a cliché, it's undeniably true. Gartner reports that 90 percent of corporate strategies will explicitly class information as a critical enterprise asset by the end of 2022. Yet, information can only be powerful when it is put to work. Which is why the UK government and industry regulators (such as Ofwat) have set out strategies that encourage organizations to put data to use.
However, making data usable isn't always straightforward. Data doesn't come pre-packaged into customer next best actions and strategic tips. In fact, data analysis is often compared to panning for gold. Not all data is useful and you need to connect the dots to make it relevant -- when you consider the volume of data managed by the average company has grown to 162.9TB, that's one big river to pan.
Fighting the rising tide of rogue apps


We're battling a swell of rogue apps, and companies and consumers alike are struggling to keep their heads above water as these applications quickly become the tool of choice for fraudsters. According to our recent fraud data, rogue apps now make up 39 percent of global fraud attacks, growing at a rate of 50 percent per quarter.
Rogue apps attempt to impersonate a brand's application with the intent of committing financial fraud. They have the ability to wreak havoc on consumers and organizations alike, with financial institutions being a particular target.
What is needed to make digital transformation work? [Q&A]


Digital transformation is a topic that's been in the air for more than just a few years now, but the impact of the pandemic and the need for businesses to adapt has rapidly brought it back to the forefront.
It's also no longer just about IT. Digital transformation is an enterprise-wide endeavor, connecting and affecting all business units and requires a shift in mindset to take full advantage of the opportunities it offers.
Broadcom to acquire VMware for $61 billion


Broadcom has struck a deal with VMware that will see the chipmaker buying the cloud and virtualization software firm for around $61 billion in cash and stock. As part of the acquisition, Broadcom will also take on $8 billion of VMware's net debt.
When the deal is complete, Broadcom Software Group will rebrand and operate as VMware. As part of Broadcom, the new VMware will, the company says, "offer enterprise customers greater choice and flexibility to address the most complex IT infrastructure challenges".
Business-critical systems going unsecured and unmonitored


According to a new poll 40 percent of enterprises don't include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent are unsure if systems are included in their cybersecurity monitoring at all.
The survey from Logpoint also shows only 23 percent say the process of reviewing SAP logs for cybersecurity events or cyberthreat activity is automated through SIEM, with almost 19 percent still doing so manually.
Website shadow code represents major risk for enterprises


A new report from web application protection specialist Source Defense highlights the risk presented by the use of third and fourth party code on corporate websites.
The digital supply chain means that highly dynamic and unpredictable scripts and code from third parties and beyond, permeate every aspect of a business's web presence. This shadow code has led to some high profile breaches including the British Airways hack in 2018.
Growing complexity leads enterprises to look for new service providers


A new study from CloudBolt Software reveals that 80 percent of enterprises are so frustrated with their existing cloud-oriented provider they are actively looking for a replacement within the next twelve months.
At the core of this dissatisfaction with CSPs and MSPs is the growing complexity of multi-cloud environments, and a widening skills gap among both enterprises and service providers.
What is unified observability and why is it important? [Q&A]


There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.
Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.
IT pros feel the pressure to maintain organizations' security


As the number of breaches shows no sign of reducing, cybersecurity and development professionals are feeling the pressure to maintain their organizations’ security postures.
New research from Invicti Security finds DevSecOps professionals spend more than four hours each workday addressing security issues that never should have happened in the first place.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.