Articles about Enterprise

Starburst platform updates boost enterprise AI initiatives

Enterprise AI

Updates to the Starburst data platform for apps and AI are designed to accelerate enterprise AI initiatives and support the transition to a future-ready data architecture built on a data lakehouse.

At the heart of these changes are Starburst AI Workflows, a purpose-built suite of capabilities that speed AI experimentation to production for enterprises. AI Workflows provides a link between vector-native search, metadata-driven context, and robust governance, all on an open data lakehouse architecture.

Continue reading

How social media is changing workplace communication

Time was when office colleagues would exchange information, ideas and gossip around the water cooler or coffee machine.

That's changing because of technology though, new research reveals that platforms like TikTok and Instagram are directly influencing how 83 percent of people communicate professionally, fueling conflict and misunderstanding among an increasingly intergenerational workforce.

Continue reading

Why subsea cables are essential to business resilience [Q&A]

Underwater cable fibre

While businesses focus on cloud services and digital transformation, they often don't realize that their operations depend on the massive cable networks laid underwater.

Recent incidents have highlighted how critical these subsea cables are for business continuity, so do businesses need to rethink their approach to infrastructure as a result? We spoke to Sharat Sinha, director and CEO of Airtel Business to find out.

Continue reading

Chainguard launches malware-resistant dependencies for Python

Software supply chain blockchain

The Python programming language has become the foundation of modern AI and machine learning applications. Of course that makes it a prime target for supply chain attacks.

Public registries do minimal vetting of hosted artifacts, and they don't provide assurance that the distributed library matches its source code, exposing enterprises to supply chain attacks. Python libraries are also susceptible to supply chain attacks because many projects include more than just pure Python code -- for example project maintainers often rebundle shared system libraries into their Python libraries to ensure stable behavior.

Continue reading

Enterprises rush to adopt AI but struggle to measure its value

AI network enterprise

New research shows that enterprises are going beyond AI experimentation and into large-scale production but that return on investment is taking a back seat in the process.

The report from Domino Data Lab shows that while 88 percent of organizations report improved ability to move AI from experimentation to production, nearly 60 percent expect less than 50 percent ROI in the rapidly changing areas of machine learning (60 percent) or Gen AI (57 percent).

Continue reading

New edge appliances allow organizations to deploy AI securely

Edge computing

Enterprises and governments share a common interest in safeguarding private information, but often the rollout of AI systems can unwittingly put sensitive data at risk.

Trusted AI specialist Seekr is announcing a new all-in-one AI system -- built for government agencies -- to ensure that AI can be deployed in air-gapped environments, standalone data centers, and contested environments.

Continue reading

Employee browser activity creates a security blindspot

Man working on computer laptop with triangle caution warning sig

Thanks to a growth in remote working and the use of SaaS applications enterprise reliance on browsers is growing, but this leaves them open to risks stemming from dangerous employee web behavior.

According to a cybersecurity expert at network security platform NordLayer, some employee activity that may go undetected by security teams can result in confidential data and industry secrets leaks or violations of GDPR.

Continue reading

Enterprises shift to software-based pentesting

Pentesting penetration testing

The latest State of Pentesting report from Pentera reveals that over 50 percent of enterprise CISOs now report using software-based pentesting to support their in-house testing practices.

Based on research conducted by Global Surveyz, the report notes that 50 percent of CISOs now identify software-based testing as a primary method for uncovering exploitable security gaps within their organizations.

Continue reading

76 percent of enterprises make decisions without consulting data because it's too hard to access

Decision guess coin toss

A new report finds that 76 percent of enterprises admit they've made business decisions without consulting available data because it was too difficult to access, creating a concerning gap between data availability and data-driven decision-making.

The report from Sisense with research firm UserEvidence shows that although 81 percent of organizations believe they have good or full control of their data, 64 percent acknowledge that they can't reliably access it for decision-making.

Continue reading

New MCP server uses AI to help enterprises secure SaaS

SaaS AI

Organizations are often using 50 or more different security tools and, even with the help of AI, they need to manually interact with each when investigating cybersecurity incidents.

A new SaaS security Model Context Protocol (MCP) server launched by AppOmni at this week's RSA Conference is designed to let security teams spend less time investigating incidents and more time taking action to fix them.

Continue reading

Mobile becomes the preferred route for attacks on enterprises

Mobile phishing mishing

Mobile threats are no longer an emerging issue, they're here, rapidly evolving, and targeting the devices organizations depend on every day.

As employees use smartphones, laptops, and tablets to access sensitive data and systems, a new report from Zimperium zLabs shows attackers are increasingly exploiting these endpoints through mobile-first strategies that bypass traditional security defenses.

Continue reading

Cloud waste -- why it's a problem and how to tackle it [Q&A]

Cloud money dollar

In recent years, businesses have stampeded to move systems to the cloud. But in doing so they often unwittingly introduce multiple layers of virtualization which means they can be paying to run the same processes multiple times.

Can optimization techniques help to improve performance and cut cloud costs? We spoke to Dr. Ignacio M Llorente, CEO and founder of OpenNebula Systems to find out more.

Continue reading

Enterprises struggle with serious gaps in cyber response plans

Incident response plan

A new survey of 1,000 businesses across the UK, UK, Europe and the Asia-Pacific region reveals a worrying disconnect between organizations' perceived readiness and actual performance in cyber crisis response.

The study for Semperis, with research from Censuswide, finds 90 percent of enterprises surveyed struggle with serious blockers to effective cyber response. Top issues include cross-team communication gaps (48 percent), out-of-date response plans (45 percent) and unclear roles and responsibilities (41 percent).

Continue reading

New Qualys tool aims to streamline enterprise compliance audits

Compliance rule law and regulation graphic interface for business quality policy

Enterprises are grappling with an increasing compliance burden, subject to multiple frameworks and more regulatory mandates that stretch resources and drive-up costs.

Misconfigurations can further complicate things, often leading to non-compliance and regulatory penalties. Plus time-consuming tasks like auditing, reporting, and system remediation are prone to human error.

Continue reading

AI tools present critical data risks in the enterprise

Risky AI

New research shows that 71.7 percent of workplace AI tools are high or critical risk, with 39.5 percent inadvertently exposing user interaction/training data and 34.4 percent exposing user data.

The analysis from Cyberhaven draws on the actual AI usage patterns of seven million workers, providing an unprecedented view into the adoption patterns and security implications of AI in the corporate environment.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.