Microsoft is shortening the support period for Windows 10 Enterprise LTSC


Anyone who has invested in Windows 10 LTSC (Long Term Servicing Channel) has had the comfort of knowing that Microsoft offered 10 years of support. But this is changing.
The company has announced that the support period for Windows 10 Enterprise LTSC is being halved to just five years, bringing the operating system in line with the recently announced changes to Office support. However, support for Windows 10 IoT Enterprise LTSC will remain at 10 years.
Digital forensics is the best offense and defense for cyber attacks


The majority of CEOs and COOs view digital forensics as an afterthought to cybersecurity. In the eyes of many business leaders, it is just a clean-up process for a data breach or cyber attack. But if you establish an effective digital forensics and incident response (DFIR) program, you can begin to use digital forensics as a tool for both recovery and prevention.
While cybersecurity and digital forensics work hand-in-hand, their close relationship can often obfuscate their individual objectives. For instance, cybersecurity’s main goal is to reduce an organization’s exposure to cyber attacks while also preventing their success. Cybersecurity has become even more important over the last decade and a half as industry leaders make the transition to digital applications. This is particularly true of the healthcare and automotive industries who have been lacking in their cybersecurity and forensic preparedness.
Why enterprises aren't properly addressing supply chain threats [Q&A]


Supply chain threats like the recent SolarWinds attack are becoming more of a concern as businesses are more reliant on smoothly functioning links with suppliers and customers.
A successful attack can have a devastating effect on an organization and its reputation, but by their very nature these are not easy threats to deal with.
Executives' social media accounts put enterprises at risk


Information security often focuses on what's going on within the enterprise perimeter, but as businesses invest more in executive communication programs, there are risks which are sometimes overlooked.
According to a new survey from SafeGuard Cyber oversight of executive social media use is lacking, record-keeping is often manual, and the responsibility for risk management isn't clear.
Emotional intelligence becoming key to CISO roles


Greater emphasis on emotional intelligence and other skills required to work with different stakeholders is placing new demands on Chief Information Security Officers (CISOs) according to a new study.
But it's also creating opportunities for CISOs to become leaders of their organizations, according to the report from cyber security provider F-Secure, in conjunction with Omnisperience.
Microsoft Teams use boosted by pandemic work shift


Among the main beneficiaries of the pandemic-related shift to remote working have been suppliers of workplace collaboration and conferencing software.
New research from digital experience management platform Aternity shows that Microsoft has been a big winner with Teams usage increased nearly 3,900 percent since the beginning of pandemic.
Demand for business intelligence solutions increases by 41 percent


A survey of over 120 developers and IT leaders from Reveal shows a 41 percent increase in demand for business intelligence solutions last year and 38 percent seeing increased revenue as the tech market shifted.
But while many took advantage of opportunities, 50 percent reported having to make do with less in 2020. Of those, 23 percent saw projects canceled or postponed, with some respondents indicating lost funding (14 percent) and staff reductions (14 percent).
Poor SIEM configuration puts enterprises at risk


Enterprises invest billions annually on SIEM (Security Information and Event Management) software and expect this investment to result in comprehensive threat coverage.
But a new report from AI-powered threat coverage platform CardinalOps shows that on average SIEM deployment rules miss 84 percent of the techniques listed in MITRE ATT&CK.
Privileged access is the Achilles heel of enterprise security


Failure to automate control of physical accounts is a major weak point in enterprise security according to a study released by Thycotic.
Among the findings are that a significant number of enterprises (28 percent) only audit privileged access management (PAM) on a quarterly or annual basis.
The importance of adaptability in an increasingly complex world


Adaptability to changing conditions is a must-have trait for today’s organizations, especially during today’s uncertain world. Business leaders must prioritize adaptability as a must-have organizational trait, and as disruption accelerates, there is no guarantee that the biggest and toughest industry players will survive.
Organizations that understand their environments and are positioned to sense change and adapt are the most likely to survive in the event of disruptions.
Automating routine operations tasks will address critical IT challenges


In a new study, 82 percent of respondents cite too many redundant or routine tasks as their most critical IT challenge, but 91 percent agree that automating routine manual tasks by introducing Artificial Intelligence for IT Operations (AIOps) can provide significant benefits across the enterprise.
The Autonomous Enterprise survey from Digitate shows 65 percent say lacking a proactive ability to predict, identify, and detect system issues is a major challenge.
Developers play a key role in digital transformation despite COVID


Developers are playing a key role in helping enterprises meet their digital transformation goals despite facing significant challenges from COVID-19 according to new research from Couchbase.
The survey of 450 European and US senior IT decision makers finds 92 percent of respondents believe that DevOps could have a revolutionary impact on their digital transformation efforts, while 63 percent say that the flexibility to change their goals when needed has been helpful in meeting their digital transformation goals.
Consultants vs. Contractors: Which is best for your organization?


For many organizations, knowing whether to choose a consultant or contractor, and understanding the difference, can be a puzzling task. There are many similarities between the two, however there are vast differences that enable organizations to achieve different end results.
The key is to understand how the roles differ, advantages and limitations of each, in order to make an informed decision. This will help an organization to better reach its business objectives. They need to ask themselves whether they would benefit from the high-impact expertise of a consultant or a long-term solution with a contractor?
CISO role expands in a changing business world


A new survey of the opinions of more than 7000 business leaders, employees and consumers from across the world shows the role of CISO has hugely expanded in its scope and responsibilities.
However, the study from BT Security also shows that fewer than half of executives and employees could put a name to their CISO. This is despite the fact that 84 percent of executives also say that their organization had suffered from data loss or a security incident in the last two years.
One Identity launches SaaS-based access management solution


The shift to more remote work has boosted companies 'move to cloud' options and that has shone a spotlight on the need for identity governance and administration (IGA) and privileged access management (PAM) solutions.
Identity-centric security firm One Identity is launching a new software-as-a-service identity platform that offers full IGA and PAM capabilities and allows organizations to implement a zero trust model.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.