Free tool helps enterprises assess their Active Directory security
Microsoft Active Directory (AD) is used by 90 percent of enterprises as the primary source of trust for identity and access, but it's also exploited in many cyberattacks.
Since AD is rarely safeguarded effectively, attackers have come to depend on weak configurations to identify attack paths, access privileged credentials and get a foothold in target networks.
Businesses more likely to buy from companies offering ongoing security
Technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk are more likely to win business according to a new study from Intel.
The results show 73 percent of respondents say their organization is more likely to purchase technologies and services from technology providers that are proactive about finding, mitigating and communicating security vulnerabilities, while 48 percent say their technology providers don’t offer this capability.
Breaking down the silos between IT and business [Q&A]
Until the cloud and the idea of big data came along it wasn't unusual for different parts of a firm to have their own information separate from the rest of the business.
But digital transformation initiatives recognize that all information is important to the organization and that silos are increasingly a bad thing.
Over two-thirds of enterprises fail to exploit valuable data
Despite the fact that data is a key resource for business decision making, a new study reveals that many businesses are leaving it untapped.
The research by Dimensional Research for data integration company Fivetran shows that 44 percent of respondents say that key data is not yet usable for decision making and 68 percent say additional business insights could be extracted from existing data if they only had more time.
Secure web gateway allows isolation of mobile devices
As mobile device usage continues to grow within enterprises the security risk increases too. Mobile browsers get patched less often and other threats come from phishing and malicious document downloads.
To combat these problems Menlo Security is extending its cloud-based Secure Web Gateway (SWG) to include web isolation for mobile devices.
Get 'Learning DevOps' ($27.99 value) FREE for a limited time
The implementation of DevOps processes requires the efficient use of various tools, and the choice of these tools is crucial for the sustainability of projects and collaboration between development (Dev) and operations (Ops).
This book presents the different patterns and tools that you can use to provision and configure an infrastructure in the cloud.
92 percent of enterprises now have a multi-cloud strategy
The latest Flexera State of the Cloud report shows that 92 percent of enterprises have a multi-cloud strategy and 80 percent have a hybrid cloud strategy.
Respondents use an average of 2.6 public and 2.7 private clouds with 49 percent saying they silo workloads by cloud, and 45 percent integrating data between clouds.
Over $200 billion at risk if top brands suffer a data breach
A new report looking at the long-tail impact data breaches have on a brand's value shows that the world's 100 most valuable brands could lose as much as $223 billion from a data breach.
The study from IT consulting firm Infosys and brand consultancy Interbrand looks at the brand factors most impacted when a company suffers a data breach -- presence, affinity, and trust -- and simulates the resulting brand value at risk in the event of a breach.
Under a quarter of businesses properly support knowledge work
Only 23 percent of knowledge workers say their organization is ahead of the curve in digital capabilities to support knowledge work according to a new survey.
The study from iManage shows 68 percent of knowledge workers believe 'information contained in digital documents and files' is vital to their business. Respondents rate contracts, emails, and spreadsheets as the three most important sources of digital information.
In the As-a-Service economy, 'subscription' without 'service' just won't fly
As we think about the past year in business, the subscription and "As-a-Service" economy has to be at the top of the trend lists. There is a difference between products on subscription and a true service. Take consumer services as an example.
Consumer-oriented grocery delivery, shipping services, videoconferencing and entertainment solutions all have seen tremendously accelerated adoption in the months since the onset of the pandemic. And these services in turn are convincing reasons to adopt IT infrastructure as a service, cloud, and sophisticated third-party logistics services. Getting what you need, when you need it, and only paying for what you use are the new standards by which businesses are measured.
New reporting tools help manage machine learning risks
Machine learning operations and management software specialist Algorithmia is launching new, advanced reporting tools to help enterprises govern the use of ML models in production environments.
The top ML challenge currently facing organizations is governance according to the company's recent machine learning trends survey. This found 56 percent of IT leaders rank governance, security and auditability issues as a major concern.
A third of enterprises suffer unauthorized cloud access
Last month we reported on public sector organizations suffering from cloud leakage. A new report out today shows that this is an issue in the private sector too.
The report from cloud governance platform CloudSphere reveals that 32 percent of enterprises have experienced unauthorized access to their cloud resources.
IBM makes hybrid cloud available at the edge and in any environment
IBM is announcing today that its hybrid cloud services are now available in any environment -- on any cloud, on premise or at the edge via IBM Cloud Satellite.
IBM Cloud Satellite delivers a secured, unifying layer of cloud services for clients across environments, regardless of where their data resides, as they address critical data privacy and data sovereignty requirements.
Illumio partners with BT to offer businesses micro segmentation
Zero trust and micro segmentation have gained in prominence in the past year as working patterns have shifted to a remote model. Illumio has announced that its micro-segmentation solution, Illumio Core, is to be made available as part of telecoms giant BT's portfolio of security solutions
Illumio Core provides application visibility, micro-segmentation, and control of all network communications across any data center, container, VM, or cloud environment. its micro-segmentation technology, delivered with BT Security’s support and services, enables a broad range of customers to prevent lateral movement and the spread of breaches within their networks.
Remote work is here to stay say business leaders
New research from mobile workforce specialist Motus shows that 67 percent of business leaders expect work-from-home policies to remain in place for the long-term or even permanently.
The report also shows businesses thriving in remote environments, with 83 percent of company leaders reporting the shift to remote work has been successful for their organization. This sentiment has increased 14 percent since June 2020 and reinforces the position among 68 percent of hiring managers that remote work is becoming easier as time goes on.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.