Why automation is the future of incident response [Q&A]
A security breach can lead to serious reputational and legal issues for enterprises. The speed and effectiveness with which they are able to respond to incidents is therefore crucial.
Larry Gagnon, senior vice president, global incident response at eSentire, believes that the way to address this is by greater automation incident response. We talked to him to find out more.
Zero Trust: A business imperative to enable the secure, hybrid-working enterprise
Without a doubt, cybersecurity will continue to be a topic riding high on the C-Suite agenda throughout 2022. With intensifying trade disputes, an escalating threat landscape, a highly distributed workforce, supply chains stretched to breaking point by the pandemic, and extra pressure exerted by the ongoing effects of Brexit in the UK and other geo-political issues, having a secure, productive, agile and cost-effective security framework in place will be paramount.
It’s evident that today’s enterprises conduct business and use digital technologies in ways that are evolving constantly. This digital transformation is making traditional perimeter-based cybersecurity IT infrastructure redundant. The days when every user and every device operating from within an organization’s premises or firewall could be automatically trusted, are over for good.
Cloud data breaches rise as adoption and complexity increase
According to a new report, 45 percent of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up five percent from the previous year.
The latest Cloud Security Report from Thales also shows multi-cloud adoption is accelerating with 72 percent of organizations using multiple IaaS providers compared to 57 percent in 2021.
Microsoft releases public preview of Windows Autopatch
It is only a couple of months since Microsoft first talked about Windows Autopatch, a new service for users of Windows 10 and Windows 11 designed to ensure that software is kept up to date. The company has now released a public preview of the free service.
As well as keeping Windows 10 and Windows 11 updated, Windows Autopatch will also take care of updating firmware, drivers and Microsoft 365 apps. Microsoft says that the launch date for the service is July, so the release of a public preview gives interested users a chance to try it out a few weeks early.
Automating networks for whatever comes next [Q&A]
Digital transformation and modernization of IT is sweeping across many organizations at the moment. But one aspect that's sometimes neglected is their impact on networks.
How can enterprises scale their networks to cope with change and what part can automation play in the mix? We spoke to Ernest Lefner, chief product officer at Gluware, and co-founder and former co-chairman of ONUG (Open Network User Group), to find out.
Enterprises overspend by millions on cloud services
New research reveals enterprises are over-spending on cloud services by up to $8.5 million, as IT leaders grow frustrated with poor management tools, vendor-lock in and issues with accessing data.
A study from Couchbase of IT decision makers at enterprises with more than 1,000 staff finds a typical annual spend on cloud services to now stand at $33 million. However, functions that are not currently meeting businesses expectations account for over 35 percent of the total cost.
The secret sauce to finding files, emails and other enterprise data
Finding the right file, email and other internal data without enterprise search is like grilling without barbecue sauce. It is theoretically possible, but who would even want to try?
While Internet search engines like Google specialize in directing you to the right website, enterprise search products do a deep dive into an organization’s own data. The secret sauce to enterprise search is indexing. Indexing "pre-processes" Microsoft Office files, PDFs, emails plus attachments, compressed archives and other web-ready data.
APIs and cloud apps are greatest threats to enterprise security readiness
A survey of over 400 CISOs finds they are are grappling with a wide range of risks and challenges, especially linked to accelerating utilization of technologies like cloud-based applications and the use of Application Programming Interfaces (APIs).
The study from CISOs Connect, an invitation-only community of cyber experts and part of Security Current, finds the IT components rated as most needing improvement are: APIs (42 percent), cloud applications (SaaS) (41 percent), and cloud infrastructure (IaaS) (38 percent).
New study reveals serious disconnect in executive planning for cyberattacks
A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.
The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.
Three steps to turn data into an indispensable strategic tool
While 'data is the new oil' has become something of a cliché, it's undeniably true. Gartner reports that 90 percent of corporate strategies will explicitly class information as a critical enterprise asset by the end of 2022. Yet, information can only be powerful when it is put to work. Which is why the UK government and industry regulators (such as Ofwat) have set out strategies that encourage organizations to put data to use.
However, making data usable isn't always straightforward. Data doesn't come pre-packaged into customer next best actions and strategic tips. In fact, data analysis is often compared to panning for gold. Not all data is useful and you need to connect the dots to make it relevant -- when you consider the volume of data managed by the average company has grown to 162.9TB, that's one big river to pan.
Fighting the rising tide of rogue apps
We're battling a swell of rogue apps, and companies and consumers alike are struggling to keep their heads above water as these applications quickly become the tool of choice for fraudsters. According to our recent fraud data, rogue apps now make up 39 percent of global fraud attacks, growing at a rate of 50 percent per quarter.
Rogue apps attempt to impersonate a brand's application with the intent of committing financial fraud. They have the ability to wreak havoc on consumers and organizations alike, with financial institutions being a particular target.
What is needed to make digital transformation work? [Q&A]
Digital transformation is a topic that's been in the air for more than just a few years now, but the impact of the pandemic and the need for businesses to adapt has rapidly brought it back to the forefront.
It's also no longer just about IT. Digital transformation is an enterprise-wide endeavor, connecting and affecting all business units and requires a shift in mindset to take full advantage of the opportunities it offers.
Broadcom to acquire VMware for $61 billion
Broadcom has struck a deal with VMware that will see the chipmaker buying the cloud and virtualization software firm for around $61 billion in cash and stock. As part of the acquisition, Broadcom will also take on $8 billion of VMware's net debt.
When the deal is complete, Broadcom Software Group will rebrand and operate as VMware. As part of Broadcom, the new VMware will, the company says, "offer enterprise customers greater choice and flexibility to address the most complex IT infrastructure challenges".
Business-critical systems going unsecured and unmonitored
According to a new poll 40 percent of enterprises don't include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent are unsure if systems are included in their cybersecurity monitoring at all.
The survey from Logpoint also shows only 23 percent say the process of reviewing SAP logs for cybersecurity events or cyberthreat activity is automated through SIEM, with almost 19 percent still doing so manually.
Website shadow code represents major risk for enterprises
A new report from web application protection specialist Source Defense highlights the risk presented by the use of third and fourth party code on corporate websites.
The digital supply chain means that highly dynamic and unpredictable scripts and code from third parties and beyond, permeate every aspect of a business's web presence. This shadow code has led to some high profile breaches including the British Airways hack in 2018.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.