Why Kubernetes deployment needs a security first mindset [Q&A]

Kubernetes

Kubernetes has been at the forefront of container deployment, allowing the automation of development, scaling and management, and supported on a wide range of public cloud platforms.

But as with any cloud deployment there are potential risks from mis-configuration, poorly managed access privileges and more. It's important therefore that when deploying Kubernetes security is given top priority.

Continue reading

Microsoft's free App Assure program gives software compatibility assistance to Windows 11 upgraders

Windows 11 monitor

Microsoft has reminded business and enterprise users about its App Assure program and how it can help with the process of upgrading to Windows 11.

The program has been running for a while, and was expanded to cover Windows 11 back in October to coincide with the release of the latest version of the operating system. Available at no cost, App Assure gives users a chance to work with Microsoft engineers to ensure app compatibility, and to gain assistance in addressing issues.

Continue reading

Poor integration and lack of supply chain agility costs businesses dear

integration jigsaw

According to a new survey, 85 percent of companies say they are losing money to integration issues related to their supply chains, with 24 percent admitting to losing $500,000 or more.

The study carried out by Dimensional Research for Cleo shows 14 percent, say they are losing over $1 million per year, up from just 10 percent in each of the previous two years, reflecting a 40 percent year-on-year increase.

Continue reading

Innovation and culture shift are needed to reach a 'new digital normal'

innovation lightbulb moment

Over the last two years the pandemic has accelerated a trend towards businesses looking for better digital habits and systems.

But a new survey of business leaders across the EMEA region, commissioned by Nutanix from IDC, suggests that a shift in culture as well as technical innovation is required in order to realize value from investments and create a new digital normal.

Continue reading

How enterprises can boost security with vulnerability management [Q&A]

server vulnerability unlock

Cyberattacks come in many different forms and it’s important for businesses to understand where they're vulnerable in order to mount an effective defense.

We spoke to Ed Williams, cybersecurity specialist at Trustwave, to find out more about vulnerability management, why it's important and how it fits into an organization's overall security strategy.

Continue reading

The rise of application modernization and how to approach it

office-collaboration_contentfullwidth

If recent times have taught us anything, it is that technology and digitization capabilities continue to advance at a rapid rate. Organizations, rightly, are fearing being left behind with legacy systems, and there are many reasons why application modernization strategies make business sense.

One of the most obvious and essential drivers is cost. Maintaining and operating legacy applications will become increasingly expensive as time passes. At the same time, new software engineers will also be eager to master new technology instead of being trained on old systems. For instance, a survey conducted by UK Cloud found 83 percent of organizations saw skills and capabilities as an impediment in adopting cloud. As engineers proficient in the dated technologies leave, new training requirements will eat into budgets. 

Continue reading

IT support still not getting to grips with hybrid working

Stressful woman talking on the phone.

In spite of two years of radical change brought about by COVID-19, most IT service management (ITSM) organizations still haven't redesigned their employee support for a hybrid world.

A new study from AI service management company Espressive finds that even though there are new support tools available most enterprises haven't updated their model for employee self-help, forcing remote employees to phone and email the help desk in record numbers.

Continue reading

New AI platform helps financial enterprises handle unstructured data

Unstructured data

Unstructured data might include everything from documents to social media posts, all enterprises have it but being able to make use of it is a challenge.

AI startup nRoad is launching its new Convus platform, aimed at financial services businesses enabling them to extract critical business information buried in unstructured documents.

Continue reading

New Hitachi solutions aim to streamline business cloud management

Cloud

Cloud strategy can make or break an organization's ability to provide timely access to data in order to deliver actionable insights.

Digital infrastructure, data management and analytics company Hitachi Vantara is launching a range of new hybrid cloud products and services that aim to deliver agility, scalability, and flexibility for both private and hybrid clouds.

Continue reading

Ransomware impacts 80 percent of enterprises

ransomware laptop

A new survey reveals that 80 percent of companies have experienced a ransomware attack, despite spending an average of $6 million annually on ransomware mitigation.

The study, from cyber advisory and solutions firm CBI, based on research by the Ponemon Institute and co-sponsored by Check Point, finds Companies are spending $170,000 per ransomware incident on staffing alone, with an average of 14 staff members each spending 190 hours on containment and remediation activities.

Continue reading

Enterprise tech leaders want a one-stop solution to manage all their platforms and clouds

Businessman working with a Cloud Computing diagram

The old days of having systems in-house where they were easy to control are long gone. Businesses today are increasingly reliant on a range of cloud, SaaS and other solutions that can be a challenge to manage.

A new report from CloudBolt Software shows that 88 percent of over 500 senior tech people surveyed say they want a 'manager of managers' -- an overarching solution to bridge the siloes, unify the overall multi-cloud/multi-tool strategy, and actively govern everything from a single location.

Continue reading

How long does it take to become a CTO?

Relaxed businessman working with a laptop

Chief Technology Officer. Sounds good doesn't it? But it must take years slogging away at the IT coal face to reach such an exalted position, right?

Wrong actually. New research from European software development company STX Next shows that 20 percent of CTOs reached their position in fewer than five years.

Continue reading

How to address the security risks of cloud migration [Q&A]

cloud migration

Cloud is an enabler of productivity and provides the infrastructure which supports modern distributed workforces. But it also poses a serious security risk to businesses that are unprepared to cope with modern threats. Figures from 451 Research show that 40 percent of organizations have experienced a cloud-based data breach in the past 12 months.

Organizations are spending millions on firewalls, endpoint protection and other security measures. What these organizations are missing, however, is visibility and control of security policies that govern 'what can talk to what' and 'who can talk to who' across the entire organizational infrastructure, including on-premise, cloud-native, and hybrid cloud. This creates security blind spots and misconfigurations.

Continue reading

Security concerns are the biggest barrier to cloud adoption

cloud worry

Cloud take up is showing no signs of slowing down, with 97 percent of IT leaders in a new survey saying that their strategy includes the expansion of cloud deployments, however, 63 percent say that cyberthreats are the main obstacle to their cloud plans.

The study, from cloud security company Confluera, looks at how IT leaders detect, evaluate, and act against cybersecurity threats in today's cloud environment.

Continue reading

Google's Linux-based Chrome OS Flex is a huge threat to Windows 11, and Microsoft should be extremely worried

Scared_Man_Laptop

Windows 11 is a really good operating system, but it is overkill for many home and education users these days. Not to mention, it can be risky to use since there is so much malware designed for it. Even for business, many companies are exclusively using web-based solutions in the browser, making Windows unnecessary for them. And so, Chromebooks are becoming more and more popular. They are affordable, easy to use, and extremely secure.

If a company wants to switch to Chromebooks from Windows laptops, however, there is a big dilemma -- what should be done with existing computers? After all, Chrome OS cannot be installed on computers that didn't ship with Chrome OS, right? Well, actually, this is changing...

Continue reading

Load More Articles