Articles about Enterprise

Staff at Fortune 1000 enterprises put their employers at risk

Risk dial

A new report has identified over 687 million exposed credentials and PII tied to Fortune 1000 employees, a 26 percent increase over last year's analysis.

The study from SpyCloud, based on its database of over 200 billion recaptured assets, also shows a 64 percent password reuse rate, widespread use of easy-to-guess passwords, and a spike in malware-infected devices.

Continue reading

The CSO's new seat at the executive table and how to use it [Q&A]

Boardroom

With the changes to working patterns brought about by the pandemic and increasing levels of cyberattacks, the role of the Chief Security Officer (CSO) in businesses has become more challenging.

These things have also led to a boost in the status of CSOs within their organizations. We spoke to Chaim Mazal, CISO and SVP of engineering for Apple device management platform Kandji to find out more about how things have changed and how CSOs can make the most of their new influence to drive security strategy.

Continue reading

The great balancing act: How to manage your workloads amidst ongoing change

Amidst the ongoing skills gap and permanent move to hybrid working, workloads are continuing to grow. Two and a half quintillion bytes of data are generated every day, often scattered between the cloud, data silos, and on-premises storage as employees work from a range of locations. Although this flexible approach to working has many benefits -- increased productivity, improved employee wellbeing, and a better work-life balance -- it also can create a sprawl of data.

Left unattended and unmonitored, workloads stack up and enterprises are left with a balancing act to manage data stored in multiple places. Whilst this can be maintained in the short term, it is not sustainable in the long term and will eventually spill over. Many will remember offices before the widespread use of computers and technology, when stacks of paper were piled up on desks and filing cabinets were full to the brim with important documents. Trying to find the single piece of paper with the information you needed was a difficult task that wasted valuable time. Having a disparate IT environment has a similar impact on today’s business operations.

Continue reading

Microsoft 365 targeted as businesses struggle to block email threats

Malicious email

A new study commissioned by email security company Cyren from Osterman Research seeks to understand how businesses using Microsoft 365 for email are being impacted by email-borne security threats, such as phishing, business email compromise (BEC), and ransomware attacks.

It shows security team managers are most concerned that current email security solutions do not block serious inbound threats -- particularly ransomware. Fewer than half of organizations surveyed rank their currently deployed email security solutions as effective.

Continue reading

Enterprise cloud costs up over 90 percent in the past year

Cloud money

Cloud costs are a measure of the services businesses are using, but they also reflect the wider market and the pricing strategies of providers.

Cloud native service provider Civo has carried out a survey into what businesses are spending on cloud and finds that enterprise cloud costs have risen by 93 percent on average in the past year.

Continue reading

Three-quarters of companies focus development on cloud-native applications

More and more workloads are being shifted to the cloud and a new report from Tigera shows that 75 percent of companies are focusing development on cloud-native applications.

But this increased development and deployment of cloud-native applications also creates the need for more advanced observability and security capabilities.

Continue reading

New endpoint solution delivers real-time protection against vulnerabilities

endpoint protection

A new IT management and endpoint security solution from Syxsense promises to deliver real-time vulnerability monitoring and instant remediation for every endpoint across an organization’s entire network.

Syxsense Enterprise combines Syxsense Secure, Manage, and Mobile Device Manager to deliver a completely unified platform that scans and manages all endpoints, resolves problems in real-time, and reduces the risks associated with system misconfigurations.

Continue reading

The changing role of the CISO [Q&A]

CISO

Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.

CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.

Continue reading

New free tool aims to tackle post-pandemic cloud bloat

Cloud fail

As enterprises have moved to make their systems more accessible to hybrid working during the pandemic, they have increasingly been turning to cloud-based solutions.

But this rapid growth of cloud infrastructure leads to problems managing and optimizing cloud resources. Which is why cloud networking company Alkira is launching a free tool to expose shadow IT and recommend ways to secure, optimize, and boost cloud deployments.

Continue reading

IT leaders think security is lagging behind current threats

security flaw

New research from Vectra AI reveals that 74 percent of respondents experienced a significant cybersecurity event in the past year.

The study surveyed 1,800 global IT security decision-makers at companies with over 1,000 employees and finds that 92 percent of respondents say that they had felt increased pressure to keep their organization safe from cyberattacks over the past year.

Continue reading

How IT can fix the employee experience [Q&A]

home working

The world of work has changed quite considerably over the past few years, driven by a number of factors, not least the pandemic.

Many of these changes have been positive, but some, in particular the shift to hybrid working, have brought challenges too. Some tasks are simply more difficult to do remotely.

Continue reading

Cloud-native development is the future... Erm, what's cloud-native development?

developer

While 72 percent of respondents to a new survey expect that the majority of their apps will be created using cloud-native development by 2023, only 47 percent of them say they know a lot about it.

The survey of over 500 IT leaders and developers across industries, carried out for low-code development specialist OutSystems, shows that selecting the right tools/platforms (52 percent), and architectural complexity (51 percent) are the top two challenges, even for those currently using cloud-native.

Continue reading

Shadow IT is top security concern around SaaS adoption

Shadow IT

A new study shows that 69 percent of tech executives believe shadow IT is a top security concern related to SaaS adoption.

The report from automated SaaS management platform Torii reveals 41 percent of executives say challenges with SaaS spend visibility and optimization have impacted the way their organization operates.

Continue reading

Enterprises poorly protected against third-party risks

Risk dial

A new report from compliance and risk management firm Kiteworks shows 51 percent of organizations are inadequately protected against third-party security and compliance risks related to sensitive content communications.

It also reveals that most organizations share sensitive content with a long list of third-party entities. Two-thirds do so with more than 1,000 third parties, while one-third have over 2,500.

Continue reading

Four keys to successful product lifecycle management

As companies begin their yearly evaluation of goals and objectives there may be some new discussions brewing. The need for companies to adapt their product development processes to support new types of supplier collaboration, flexible sourcing strategies, and digital transformation efforts has caused a paradigm shift toward more flexible, sustainable platform technologies that enable them to rapidly adapt to disruptions and opportunities in the market.

These new demands on businesses have stretched the limits of their legacy PLM software. Overly customized PLM software with a history of creating unresolved technical debt is driving many companies to a point of reflection -- questioning where do we go from here? Do we spend millions redeploying or trying to painfully upgrade our traditional PLM software? Will those efforts make our business more resilient and more agile? Here are four questions every company must answer:

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.