What is unified observability and why is it important? [Q&A]

Binoculars laptop

There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.

Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.

Continue reading

IT pros feel the pressure to maintain organizations' security

stressed overwork pressure

As the number of breaches shows no sign of reducing, cybersecurity and development professionals are feeling the pressure to maintain their organizations’ security postures.

New research from Invicti Security finds DevSecOps professionals spend more than four hours each workday addressing security issues that never should have happened in the first place.

Continue reading

Ensuring compliance in the modern enterprise [Q&A]

Compliance gauge

An increasing volume of regulations surrounding the security and privacy of data have been implemented in recent years. This represents a challenge for businesses that need to ensure they remain compliant.

The challenge has become even greater due to the pandemic and the consequent shift in working patterns. So how can enterprises ensure that they remain compliant and don't fall foul of the rules?

Continue reading

How to protect your business from loyalty fraud

Fraud stop

Today, businesses are realizing that a top-notch customer experience is the key to staying one step ahead in a highly competitive market. Enterprises are investing in loyalty schemes to elevate the online shopping experience for their most valued customers.

Unfortunately, fraud rings have shifted towards account-based vulnerabilities and target loyalty schemes through sophisticated fraudulent techniques. Not only that, but individual customers and internal staff can also exploit loyalty schemes and commit fraud, according to Signifyd’s ecommerce data report. We explore how to protect your business from loyalty fraud to reduce both brand reputation and customer relationship damage.

Continue reading

Enterprises struggle to discover cloud access policies

cloud confusion

Cloud use is commonplace among large enterprises, with 82 percent of organizations with $1B or more in revenue using three or more clouds, up from 66 percent last year.

However, with the majority of companies (70 percent) using two or more identity systems, 75 percent of respondents say they lack the ability to easily discover all existing access policies, according to a new study conducted by Osterman Research for Strata Identity.

Continue reading

Why the time is right for enterprises to consider edge computing [Q&A]

Edge computing

The technology world never stands still for very long and keeping in touch with trends is important if you're not to be left behind.

In recent years we've seen moves to the cloud and to DevOps, trends which show no signs of slowing down. But there's now a trend towards putting computing power at the edge, closer to the users.

Continue reading

Enterprises continue to back digital transformation

Digital transformation

A new global study reveals that 79 percent of enterprises have made significant, transformative or even revolutionary improvements to the end user experience through digital transformation over the past year.

The research by Couchbase shows a positive outlook too, with enterprises planning to increase their investment in digital transformation by 46 percent over the next 12 months.

Continue reading

Staff at Fortune 1000 enterprises put their employers at risk

Risk dial

A new report has identified over 687 million exposed credentials and PII tied to Fortune 1000 employees, a 26 percent increase over last year's analysis.

The study from SpyCloud, based on its database of over 200 billion recaptured assets, also shows a 64 percent password reuse rate, widespread use of easy-to-guess passwords, and a spike in malware-infected devices.

Continue reading

The CSO's new seat at the executive table and how to use it [Q&A]

Boardroom

With the changes to working patterns brought about by the pandemic and increasing levels of cyberattacks, the role of the Chief Security Officer (CSO) in businesses has become more challenging.

These things have also led to a boost in the status of CSOs within their organizations. We spoke to Chaim Mazal, CISO and SVP of engineering for Apple device management platform Kandji to find out more about how things have changed and how CSOs can make the most of their new influence to drive security strategy.

Continue reading

The great balancing act: How to manage your workloads amidst ongoing change

Tightrope sharks threat

Amidst the ongoing skills gap and permanent move to hybrid working, workloads are continuing to grow. Two and a half quintillion bytes of data are generated every day, often scattered between the cloud, data silos, and on-premises storage as employees work from a range of locations. Although this flexible approach to working has many benefits -- increased productivity, improved employee wellbeing, and a better work-life balance -- it also can create a sprawl of data.

Left unattended and unmonitored, workloads stack up and enterprises are left with a balancing act to manage data stored in multiple places. Whilst this can be maintained in the short term, it is not sustainable in the long term and will eventually spill over. Many will remember offices before the widespread use of computers and technology, when stacks of paper were piled up on desks and filing cabinets were full to the brim with important documents. Trying to find the single piece of paper with the information you needed was a difficult task that wasted valuable time. Having a disparate IT environment has a similar impact on today’s business operations.

Continue reading

Microsoft 365 targeted as businesses struggle to block email threats

Malicious email

A new study commissioned by email security company Cyren from Osterman Research seeks to understand how businesses using Microsoft 365 for email are being impacted by email-borne security threats, such as phishing, business email compromise (BEC), and ransomware attacks.

It shows security team managers are most concerned that current email security solutions do not block serious inbound threats -- particularly ransomware. Fewer than half of organizations surveyed rank their currently deployed email security solutions as effective.

Continue reading

Enterprise cloud costs up over 90 percent in the past year

Cloud money

Cloud costs are a measure of the services businesses are using, but they also reflect the wider market and the pricing strategies of providers.

Cloud native service provider Civo has carried out a survey into what businesses are spending on cloud and finds that enterprise cloud costs have risen by 93 percent on average in the past year.

Continue reading

Three-quarters of companies focus development on cloud-native applications

Businessman working with a Cloud Computing diagram

More and more workloads are being shifted to the cloud and a new report from Tigera shows that 75 percent of companies are focusing development on cloud-native applications.

But this increased development and deployment of cloud-native applications also creates the need for more advanced observability and security capabilities.

Continue reading

New endpoint solution delivers real-time protection against vulnerabilities

endpoint protection

A new IT management and endpoint security solution from Syxsense promises to deliver real-time vulnerability monitoring and instant remediation for every endpoint across an organization’s entire network.

Syxsense Enterprise combines Syxsense Secure, Manage, and Mobile Device Manager to deliver a completely unified platform that scans and manages all endpoints, resolves problems in real-time, and reduces the risks associated with system misconfigurations.

Continue reading

The changing role of the CISO [Q&A]

CISO

Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.

CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.

Continue reading

Load More Articles