Articles about Enterprise

The challenges of hybrid cloud adoption [Q&A]

cloud data cable

Cloud is used for all kinds data processing nowadays, but there are still some things that need to be kept in-house, either for performance, compliance or other reasons.

This has given rise to the hybrid model, offering a mix of cloud and on-premise solutions, becoming increasingly popular. We spoke to Derek Taylor, lead principal security consultant at Trustwave, to find out more about the security and supply chain challenges that hybrid adoption presents.

Continue reading

Employees say finding information is harder when working from home

Frustrated laptop user

New research from enterprise search specialist Sinequa reveals that 61 percent of UK workers say it's harder to find the information they are looking for when working remotely.

The top reasons given for this are that systems are slower from home (25 percent), that information is scattered in lots of locations (24 percent) and because they can’t ask colleagues for an answer (24 percent).

Continue reading

Moving business securely to the cloud [Q&A]

Cloud data security

A large majority of enterprises are now using the cloud, but moving to cloud-based solutions inevitably presents challenges, not least in security.

We spoke to Sam Humphries, Security Strategist at SIEM (Security Information and Event Management) specialist Exabeam to get her views.

Continue reading

Security awareness training needs to be interesting to be effective

Training course

A new survey of 1,000 US employees has found that boring security awareness training doesn't make them want to be secure.

The study conducted by Osterman Research for MediaPRO shows that employees get far more benefit out of interesting and engaging training, which shouldn't really surprise anybody.

Continue reading

Pandemic provides boost to AI and ML adoption

Artificial intelligence

Companies are planning to increase their spending on AI/ML as a result of the pandemic, and many have realized that those initiatives should have been a higher priority for their organizations all along.

A new survey of enterprise IT leaders from Algorithmia, a provider of ML operations and management solutions, shows that 91 percent of respondents were spending at least $1,000,000 annually on AI/ML prior to the pandemic, and 50 percent say they are planning to spend more than that going forward.

Continue reading

How BEC attacks have adapted to the pandemic [Q&A]

Email fraud

Business Email Compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. New research from Abnormal Security  indicates that these attacks have adapted to the pandemic, with Zoom becoming the most impersonated brand and COVID-themed attacks surging.

We spoke to Evan Reiser, CEO of Abnormal Security to find out more about what’s been happening and what trends we can expect to see as the year progresses.

Continue reading

80 percent of organizations have experienced a third-party breach

Data breach

Organizations are suffering from a lack of visibility into their supply chain and 8 percent experienced a breach that originated from vulnerabilities in their vendor ecosystem in the past year.

A new report from cybersecurity services company BlueVoyant, based on research carried out by Opinion Matters, shows that only 22.5 percent of organizations monitor their entire supply chain and just 32 percent re-assess and report their vendor’s cyber risk position either six-monthly or annually.

Continue reading

85 percent of CISOs admit sacrificing security to enable remote working

home working

While the pandemic has driven a shift to remote working, a new report from cyber security vendor Netwrix shows that that 85 percent of CISOs admit they've sacrificed cybersecurity to enable it to happen.

One in four organizations feels that they are exposed to more risks than before the pandemic. Of these, 63 percent report an increase in the frequency of cyberattacks and 60 percent have found new security gaps as a result of the transition to remote work.

Continue reading

Securing privileged access can reduce the risk of data breach [Q&A]

Admin login

Accounts that have privileged access are a problem when it comes to data breaches, so securing them effectively is essential.

But things are complicated by the fact that where privileged access was once designated only for system administrators it has now been expanded to HR, finance, legal and many more parts of the organization, as well as to non-human users like machines and applications.

Continue reading

How unified XDR platforms enhance security protection for the enterprise

Security breach

Credential theft and forgery are among the leading stealthy cyber threats. The 2014 eBay breach that exposed the personal details of 145 million users is one of the high-profile cases of such surreptitious cyber-attacks. Bad actors obtained the usernames and passwords of legitimate users to steal information and compromise the organization’s database.

What makes credential theft and forgery more serious than most other cyberattacks is that the illicit access to systems or databases usually remains unnoticed for a long time. A successful attack is difficult to detect and resolve. In the case of the 2014 eBay incident, the hackers managed to maintain complete access to the user database for 229 days.

Continue reading

New tool helps protect enterprises from insider threats

insider threat

With workforces more dispersed and reliant on collaboration technologies, the risk of sensitive business information falling into the wrong hands is increased.

Code42 is launching a new SaaS tool called Incydr, aimed at guarding intellectual property, source code and trade secrets, built to mitigate exposure from data exfiltration and to directly address the gaps in traditional security solutions for insider threats.

Continue reading

How COVID-19 could be the trigger for lasting innovation [Q&A]

digital transformation

For many enterprise organizations the COVID-19 pandemic is a crisis to be managed. But could it actually be a catalyst to deliver a lasting legacy of technical innovation?

James Harvey, EMEA CTO at Cisco AppDynamics thinks it can be. We spoke to him to find out more.

Continue reading

CISOs struggle to prepare for compliance audits due to COVID-19

Compliance gauge

A new study reveals that calendars for security and compliance audits are largely unchanged despite COVID-19, yet the pandemic is straining teams as they work remotely.

The survey from automated audit preparation company Shujinko shows that CISOs are tasked with preparing for more than three audits on average in the next 6-12 months, but are struggling with inadequate tools, limited budgets and personnel, and inefficient manual processes.

Continue reading

Dashlane launches new password health reporting tool for businesses

Password on a PostIt

Good security practices are more important than ever in the current climate, with people working from home using their own devices.

Password management specialist Dashlane is launching a new reporting tool that gives company administrators in-depth visibility into employee password security along with the ability to track improvements over time.

Continue reading

Making the case for Trust in Zero Trust

Trust card

As WFH continues and bad actors and cyberthreats thrive, it is more critical than ever before for organizations to have a robust cybersecurity strategy in place. The best way to get started? Leverage Zero Trust.

The chief concern security teams have is keeping threats and attacks out of their organizations. This is why CISOs make significant investments in security controls that protect important vectors like the network, data center, cloud, email and endpoint. This defense-in-depth approach is essential to detect and block threats, but they need to be bolstered with Zero Trust capabilities. Why? Simply put, because attacks and breaches continue to occur. In fact, we know that 64 percent of CISOs believe their organization is more likely to experience a data breach due to COVID-19, and an additional 30 percent of CISOs have seen more attacks on their IT systems as a direct result of COVID-19.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.