Ensuring compliance in the modern enterprise [Q&A]


An increasing volume of regulations surrounding the security and privacy of data have been implemented in recent years. This represents a challenge for businesses that need to ensure they remain compliant.
The challenge has become even greater due to the pandemic and the consequent shift in working patterns. So how can enterprises ensure that they remain compliant and don't fall foul of the rules?
How to protect your business from loyalty fraud


Today, businesses are realizing that a top-notch customer experience is the key to staying one step ahead in a highly competitive market. Enterprises are investing in loyalty schemes to elevate the online shopping experience for their most valued customers.
Unfortunately, fraud rings have shifted towards account-based vulnerabilities and target loyalty schemes through sophisticated fraudulent techniques. Not only that, but individual customers and internal staff can also exploit loyalty schemes and commit fraud, according to Signifyd’s ecommerce data report. We explore how to protect your business from loyalty fraud to reduce both brand reputation and customer relationship damage.
Enterprises struggle to discover cloud access policies


Cloud use is commonplace among large enterprises, with 82 percent of organizations with $1B or more in revenue using three or more clouds, up from 66 percent last year.
However, with the majority of companies (70 percent) using two or more identity systems, 75 percent of respondents say they lack the ability to easily discover all existing access policies, according to a new study conducted by Osterman Research for Strata Identity.
Why the time is right for enterprises to consider edge computing [Q&A]


The technology world never stands still for very long and keeping in touch with trends is important if you're not to be left behind.
In recent years we've seen moves to the cloud and to DevOps, trends which show no signs of slowing down. But there's now a trend towards putting computing power at the edge, closer to the users.
Enterprises continue to back digital transformation


A new global study reveals that 79 percent of enterprises have made significant, transformative or even revolutionary improvements to the end user experience through digital transformation over the past year.
The research by Couchbase shows a positive outlook too, with enterprises planning to increase their investment in digital transformation by 46 percent over the next 12 months.
Staff at Fortune 1000 enterprises put their employers at risk


A new report has identified over 687 million exposed credentials and PII tied to Fortune 1000 employees, a 26 percent increase over last year's analysis.
The study from SpyCloud, based on its database of over 200 billion recaptured assets, also shows a 64 percent password reuse rate, widespread use of easy-to-guess passwords, and a spike in malware-infected devices.
The CSO's new seat at the executive table and how to use it [Q&A]


With the changes to working patterns brought about by the pandemic and increasing levels of cyberattacks, the role of the Chief Security Officer (CSO) in businesses has become more challenging.
These things have also led to a boost in the status of CSOs within their organizations. We spoke to Chaim Mazal, CISO and SVP of engineering for Apple device management platform Kandji to find out more about how things have changed and how CSOs can make the most of their new influence to drive security strategy.
The great balancing act: How to manage your workloads amidst ongoing change


Amidst the ongoing skills gap and permanent move to hybrid working, workloads are continuing to grow. Two and a half quintillion bytes of data are generated every day, often scattered between the cloud, data silos, and on-premises storage as employees work from a range of locations. Although this flexible approach to working has many benefits -- increased productivity, improved employee wellbeing, and a better work-life balance -- it also can create a sprawl of data.
Left unattended and unmonitored, workloads stack up and enterprises are left with a balancing act to manage data stored in multiple places. Whilst this can be maintained in the short term, it is not sustainable in the long term and will eventually spill over. Many will remember offices before the widespread use of computers and technology, when stacks of paper were piled up on desks and filing cabinets were full to the brim with important documents. Trying to find the single piece of paper with the information you needed was a difficult task that wasted valuable time. Having a disparate IT environment has a similar impact on today’s business operations.
Microsoft 365 targeted as businesses struggle to block email threats


A new study commissioned by email security company Cyren from Osterman Research seeks to understand how businesses using Microsoft 365 for email are being impacted by email-borne security threats, such as phishing, business email compromise (BEC), and ransomware attacks.
It shows security team managers are most concerned that current email security solutions do not block serious inbound threats -- particularly ransomware. Fewer than half of organizations surveyed rank their currently deployed email security solutions as effective.
Enterprise cloud costs up over 90 percent in the past year


Cloud costs are a measure of the services businesses are using, but they also reflect the wider market and the pricing strategies of providers.
Cloud native service provider Civo has carried out a survey into what businesses are spending on cloud and finds that enterprise cloud costs have risen by 93 percent on average in the past year.
Three-quarters of companies focus development on cloud-native applications


More and more workloads are being shifted to the cloud and a new report from Tigera shows that 75 percent of companies are focusing development on cloud-native applications.
But this increased development and deployment of cloud-native applications also creates the need for more advanced observability and security capabilities.
New endpoint solution delivers real-time protection against vulnerabilities


A new IT management and endpoint security solution from Syxsense promises to deliver real-time vulnerability monitoring and instant remediation for every endpoint across an organization’s entire network.
Syxsense Enterprise combines Syxsense Secure, Manage, and Mobile Device Manager to deliver a completely unified platform that scans and manages all endpoints, resolves problems in real-time, and reduces the risks associated with system misconfigurations.
The changing role of the CISO [Q&A]


Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.
CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.
New free tool aims to tackle post-pandemic cloud bloat


As enterprises have moved to make their systems more accessible to hybrid working during the pandemic, they have increasingly been turning to cloud-based solutions.
But this rapid growth of cloud infrastructure leads to problems managing and optimizing cloud resources. Which is why cloud networking company Alkira is launching a free tool to expose shadow IT and recommend ways to secure, optimize, and boost cloud deployments.
IT leaders think security is lagging behind current threats


New research from Vectra AI reveals that 74 percent of respondents experienced a significant cybersecurity event in the past year.
The study surveyed 1,800 global IT security decision-makers at companies with over 1,000 employees and finds that 92 percent of respondents say that they had felt increased pressure to keep their organization safe from cyberattacks over the past year.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.