Cloud migration shows no signs of slowing down


According to a new study 31 percent of companies have moved workloads to the cloud within the last six months compared to only 18 percent six months ago.
Based on a survey of almost 1,000 IT decision makers, the report from cloud migration specialist Next Pathway shows 36 percent are migrating to the cloud to prevent customers from leaving for more personalized solutions offered by competitors that are using the cloud to enable a superior digital experience.
Mainframe applications still key to business strategy


According to a new study from the IBM Institute for Business Value, 71 percent of executives surveyed say mainframe-based applications are central to their business strategy.
Also, in three years, the percentage of organizations using mainframe assets in a hybrid cloud environment is expected to increase by more than two times.
IT leaders think remote workers are more at risk but struggle to protect them


A new survey of enterprise IT security leaders shows almost 80 percent believe remote workers are at more risk from phishing attacks now because they're isolated from their organizations' security teams.
The study from Egress also reveals that more than 59 percent of respondents feel solutions such as video training (27 percent), email reminders (20 percent), and VPNs (12 percent), are sufficient by themselves to keep organizations safe from the biggest security breach fears: damage to brand and reputation, and legal jeopardy.
What to do after a ransomware attack [Q&A]


Ransomware is a major problem and ideally while you'd like to avoid being attacked, the chances are that at some point you're going to be a target.
So, what happens following an attack and what should organizations be doing immediately afterwards to lessen the impact? We spoke to Ed Williams, EMEA director of SpiderLabs at Trustwave, to find out and to get some tips on how to proactively secure against ransomware attacks in future.
Enterprise endpoint protection needs to move to zero trust


As enterprise boundaries have become more flexible, older authentication models of security have begun to look increasingly outmoded.
A new survey of 150 IT security decision makers carried out by ThycoticCentrify finds that 71 percent of contributors agree that a distributed workforce makes a zero trust security strategy even more critical.
Why data analytics will be vital in the hybrid working arena


A quick look at the Forbes Global 2000 will tell you that not many businesses stand the test of time. To endure throughout the ages, organizations must regularly adapt and reinvent themselves to keep up with new developments. Never has this received wisdom been more apt than throughout the COVID-19 pandemic, where many businesses have had to adjust their offerings and operations to stay relevant in the remote climate.
In the aftermath of the pandemic, this sentiment will continue to be vital. Indeed, as vaccination rates climb, and nations worldwide begin to ease their lockdowns and restrictions, many governments will be scrapping their 'work from home' guidelines. That said, this doesn’t mean companies plan to return to their old ways. As such, decision-makers will require a plan of action to make the decisions necessary to keep up with new trends.
Companies risk data exposure as employees leave


New research from SASE company Netskope reveals the risk of critical data exfiltration linked to employees leaving their jobs.
The report finds that some departing employees present a disproportionately significant cloud security risk. In their last 30 days of employment, workers have been shown to be uploading three times more data than usual to personal cloud apps.
Organizations are losing the war on phishing


According to a new study of over 1,000 enterprise IT professionals around the world, 40 percent of organizations confirm they have fallen victim to a phishing attack in the last month, with 74 percent experiencing one in the last year.
The research from automation platform Ivanti also shows that 80 percent of respondents say they have witnessed an increase in volume of phishing attempts, with 85 percent saying those attempts are getting more sophisticated.
How real live phishing emails can help protect users [Q&A]


Phishing remains one of the most popular attack vectors for cybercriminals. But traditional defenses relying on filtering or raising user awareness via training aren't always effective.
We spoke to Lior Kohavi, chief technology officer at enterprise SaaS security specialist Cyren to discover how a new approach is using genuine attacks to help both educate users and keep phishing emails out of our inboxes.
New solution helps manage identities and entitlements


Businesses are increasingly adopting the public cloud, but this brings with it a number of security challenges that traditional tools struggle to handle.
Identity specialist Attivo Networks is launching a new Cloud Infrastructure Entitlement Management (CIEM) solution designed to improve visibility and reduce the attack surface for identities and entitlements in the cloud.
Companies face more than 1,000 domain impersonations each year


Businesses are facing a wave of attacks using domains impersonating their company and brand names according to a new study.
The research from risk protection specialist Digital Shadows shows that in the last four months its clients experienced an average of 360 domain impersonations, amounting to over 1,100 per year.
New free tool helps map legacy identity systems


A number of on-premise identity systems from major suppliers including CA, Oracle and IBM are coming to the end of their lives and many businesses are looking to migrate to cloud alternatives.
But before migration can begin it's necessary to discover and catalog legacy identity systems. This is a largely manual process because there is no unified view of older environments that span multiple stakeholders, have evolved over a number of years, and can contain hidden complexities.
Why enterprises need a data-centric approach to security [Q&A]


Most cybersecurity focuses on keeping out threats, but there's an increasing view that everyone is going to get breached sooner or later and that protecting data is key to keeping a business safe.
We spoke to Kurt Mueffelmann, global chief operating officer of Nucleus Cyber -- which has recently been acquired by Australian access control company archTIS -- to find out more about how this approach works.
Panasonic sets up a new business solutions arm


Electronics giant Panasonic is launching a new solutions-focused organization, Panasonic Connect Europe, to address the changing technology needs of European businesses.
The new business will offer diverse B2B technology solutions, alongside an enhanced services capability, to help customers maintain mission critical operations and organizations transform their business operations.
IBM CodeFlare simplifies the move to hybrid cloud


Enterprises are relying on data more than ever before, but that can come at a cost in terms of the time spent on building and managing the infrastructure to handle it.
In order to streamline the integration and efficient scaling of these big data and AI workflows into hybrid cloud environments, IBM Research is launching CodeFlare.
Recent Headlines
Most Commented Stories
Betanews Is Growing Alongside You
Only a fool still uses Windows 7
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.