Growing complexity leads enterprises to look for new service providers
A new study from CloudBolt Software reveals that 80 percent of enterprises are so frustrated with their existing cloud-oriented provider they are actively looking for a replacement within the next twelve months.
At the core of this dissatisfaction with CSPs and MSPs is the growing complexity of multi-cloud environments, and a widening skills gap among both enterprises and service providers.
What is unified observability and why is it important? [Q&A]
There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.
Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.
IT pros feel the pressure to maintain organizations' security
As the number of breaches shows no sign of reducing, cybersecurity and development professionals are feeling the pressure to maintain their organizations’ security postures.
New research from Invicti Security finds DevSecOps professionals spend more than four hours each workday addressing security issues that never should have happened in the first place.
Ensuring compliance in the modern enterprise [Q&A]
An increasing volume of regulations surrounding the security and privacy of data have been implemented in recent years. This represents a challenge for businesses that need to ensure they remain compliant.
The challenge has become even greater due to the pandemic and the consequent shift in working patterns. So how can enterprises ensure that they remain compliant and don't fall foul of the rules?
How to protect your business from loyalty fraud
Today, businesses are realizing that a top-notch customer experience is the key to staying one step ahead in a highly competitive market. Enterprises are investing in loyalty schemes to elevate the online shopping experience for their most valued customers.
Unfortunately, fraud rings have shifted towards account-based vulnerabilities and target loyalty schemes through sophisticated fraudulent techniques. Not only that, but individual customers and internal staff can also exploit loyalty schemes and commit fraud, according to Signifyd’s ecommerce data report. We explore how to protect your business from loyalty fraud to reduce both brand reputation and customer relationship damage.
Enterprises struggle to discover cloud access policies
Cloud use is commonplace among large enterprises, with 82 percent of organizations with $1B or more in revenue using three or more clouds, up from 66 percent last year.
However, with the majority of companies (70 percent) using two or more identity systems, 75 percent of respondents say they lack the ability to easily discover all existing access policies, according to a new study conducted by Osterman Research for Strata Identity.
Why the time is right for enterprises to consider edge computing [Q&A]
The technology world never stands still for very long and keeping in touch with trends is important if you're not to be left behind.
In recent years we've seen moves to the cloud and to DevOps, trends which show no signs of slowing down. But there's now a trend towards putting computing power at the edge, closer to the users.
Enterprises continue to back digital transformation
A new global study reveals that 79 percent of enterprises have made significant, transformative or even revolutionary improvements to the end user experience through digital transformation over the past year.
The research by Couchbase shows a positive outlook too, with enterprises planning to increase their investment in digital transformation by 46 percent over the next 12 months.
Staff at Fortune 1000 enterprises put their employers at risk
A new report has identified over 687 million exposed credentials and PII tied to Fortune 1000 employees, a 26 percent increase over last year's analysis.
The study from SpyCloud, based on its database of over 200 billion recaptured assets, also shows a 64 percent password reuse rate, widespread use of easy-to-guess passwords, and a spike in malware-infected devices.
The CSO's new seat at the executive table and how to use it [Q&A]
With the changes to working patterns brought about by the pandemic and increasing levels of cyberattacks, the role of the Chief Security Officer (CSO) in businesses has become more challenging.
These things have also led to a boost in the status of CSOs within their organizations. We spoke to Chaim Mazal, CISO and SVP of engineering for Apple device management platform Kandji to find out more about how things have changed and how CSOs can make the most of their new influence to drive security strategy.
The great balancing act: How to manage your workloads amidst ongoing change
Amidst the ongoing skills gap and permanent move to hybrid working, workloads are continuing to grow. Two and a half quintillion bytes of data are generated every day, often scattered between the cloud, data silos, and on-premises storage as employees work from a range of locations. Although this flexible approach to working has many benefits -- increased productivity, improved employee wellbeing, and a better work-life balance -- it also can create a sprawl of data.
Left unattended and unmonitored, workloads stack up and enterprises are left with a balancing act to manage data stored in multiple places. Whilst this can be maintained in the short term, it is not sustainable in the long term and will eventually spill over. Many will remember offices before the widespread use of computers and technology, when stacks of paper were piled up on desks and filing cabinets were full to the brim with important documents. Trying to find the single piece of paper with the information you needed was a difficult task that wasted valuable time. Having a disparate IT environment has a similar impact on today’s business operations.
Microsoft 365 targeted as businesses struggle to block email threats
A new study commissioned by email security company Cyren from Osterman Research seeks to understand how businesses using Microsoft 365 for email are being impacted by email-borne security threats, such as phishing, business email compromise (BEC), and ransomware attacks.
It shows security team managers are most concerned that current email security solutions do not block serious inbound threats -- particularly ransomware. Fewer than half of organizations surveyed rank their currently deployed email security solutions as effective.
Enterprise cloud costs up over 90 percent in the past year
Cloud costs are a measure of the services businesses are using, but they also reflect the wider market and the pricing strategies of providers.
Cloud native service provider Civo has carried out a survey into what businesses are spending on cloud and finds that enterprise cloud costs have risen by 93 percent on average in the past year.
Three-quarters of companies focus development on cloud-native applications
More and more workloads are being shifted to the cloud and a new report from Tigera shows that 75 percent of companies are focusing development on cloud-native applications.
But this increased development and deployment of cloud-native applications also creates the need for more advanced observability and security capabilities.
New endpoint solution delivers real-time protection against vulnerabilities
A new IT management and endpoint security solution from Syxsense promises to deliver real-time vulnerability monitoring and instant remediation for every endpoint across an organization’s entire network.
Syxsense Enterprise combines Syxsense Secure, Manage, and Mobile Device Manager to deliver a completely unified platform that scans and manages all endpoints, resolves problems in real-time, and reduces the risks associated with system misconfigurations.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.