Zoho launches new platform to boost collaboration and productivity
Business suite company Zoho is launching a new software platform that brings together collaboration, productivity, and communications tools and integrates them into other business processes.
Zoho Workplace is based around a fully-featured business mail and cloud office suite. It includes nine applications built on a common data model and unified through common search and AI across a single dashboard.
New development environment streamlines the creation of business apps
Low-code techniques help businesses to develop applications quickly, but in some cases they can lead to added complexity.
With the launch of OXIDE, an Integrated Development Environment (IDE), JourneyApps is seeking to combine the speed and efficiency of low-code platforms with the flexibility and power of professional development, all in a single platform.
New platform helps businesses get the most from data lakes
Data is key to the competitiveness of modern enterprises, but the quality of that data determines how useful it is.
Customer data platform Segment is launching a new data architecture product built specifically to help companies deliver better customer experiences. Segment Data Lakes gives companies a foundation to produce advanced analytics, uncover customer insights, and power machine learning and AI initiatives.
61 percent of companies experience insider attacks
A new survey from Bitglass reveals that 61 percent of organizations reported at least one insider attack over the last 12 months, with 22 percent reporting at least six separate attacks.
With a whole range of changes happening at the moment securing against insider threats has become increasingly challenging. Most organizations say they can't guarantee that they can detect insider threats from personal devices (82 percent) or the cloud (50 percent), while 81 percent find it difficult to assess the impact of insider attacks.
Cut in TLS certificate life could lead to greater risk of outages
As of September 1st, all publicly trusted TLS certificates must have a lifespan of 398 days or less -- roughly half the previous life.
According to security experts from Venafi, a provider of machine identity management, this latest change is an indication that machine identity lifetimes will continue to shrink.
COVID-19 accelerates cloud migration plans
More than half of respondents to a new survey are either accelerating their cloud adoption timeline or moving forward as planned during the COVID-19 pandemic, and this number goes up to 59 percent among respondents considering VMware Cloud on AWS.
The study from multi-cloud data service provider Faction finds that among those organizations where COVID-19 has paused or canceled cloud adoption, the top factors cited are budget pressures (75 percent) along with staffing shortages and macro-economic uncertainty (each named by 41 percent of respondents).
Why log management is essential to successful implementation of DevSecOps [Q&A]
DevSecOps, the integration of security into DevOps processes, is in increasingly common use. Logging and log management play a critical role in helping to put DevSecOps principles into practice by ensuring that developers, IT operations staff, and security teams have the visibility and communication pipelines they need to prioritize security at all stages of the DevOps delivery cycle.
We spoke to Ryan Staatz, systems architect and head of DevOps at LogDNA to discuss how log management fits in the toolchain of technology and practices that create a successful DevSecOps initiative.
Legacy tech holds back modernization efforts
A new study of over 400 technology leaders in the US, UK and Germany shows that 80 percent of organizations are struggling to reach application delivery requirements with their existing infrastructure.
However, even with the other challenges of 2020, efforts to modernize networks and applications to address this challenge are accelerating with 83 percent reporting budget increases for these initiatives over the next three years.
Departing employees and the risk to corporate data [Q&A]
New research into insider threats from security automation platform Securonix shows that 60 percent of data exfiltration incidents are carried out by employees identified as 'flight risk', in other words that are about to leave the business.
We spoke to Shareth Ben, director of insider threat and cyber threat analytics with Securonix, to find out more about insider threats, flight risks and how companies can protect themselves.
Enterprise IT still focused on the long term despite pandemic challenges
While COVID-19 has altered the cloud strategies of enterprise IT executives, the vast majority are still moving forward with their big-picture digital transformation initiatives, and most think they'll see an increase in their cloud budgets to support these projects over the next year.
A new report from professional services and managed cloud company 2nd Watch surveyed more than 100 cloud-focused IT directors or above and finds that 82 percent of respondents say they've experienced cloud-related challenges with 77 percent saying these challenges have caused them to alter their cloud strategies.
Organizations use outsourcing to meet cyber threats
More than half of UK businesses are turning to outsourced partners for cyber security services, according to research commissioned by digital risk protection company Skurio.
Lack of in-house expertise is a key issue for organizations, in particular when it comes to digital risk protection -- the ability to monitor risks, threats and breaches outside their network -- with 80 percent of respondents saying that their teams lack skills and knowledge in this area.
Why corporate communication tools are the new threat vector [Q&A]
In the new normal world where more work is being carried out remotely, corporate communications have increased in importance but they have also come under greater threat.
As the recent Twitter attack shows, communication tools offer hackers an attractive extra method of getting hold of sensitive information like login details.
SecureLink extends vendor privileged access management to the cloud
As systems move to the cloud, organizations are faced with the problem of safely managing access for third-parties and vendors.
Specialist in this field SecureLink is launching a new version of its SecureLink for Enterprises platform, introducing features to expand vendor privileged access management (VPAM) capabilities to the cloud and strengthen reporting.
Why security needs to focus on the user not the location [Q&A]
Keeping enterprise systems secure used to be a relatively simple matter of defending the network perimeter. But in recent times the increased sophistication of attacks, a shift to more remote working, and demands for more sophisticated identity management mean things are much more complex.
We spoke to Greg Keller, CTO of directory-as-a-service company JumpCloud who believes that the answer is to move the security perimeter to the user, wherever they are located.
What do we want? Zero trust! When do we want it? Later!
Almost half, of the participants in a new survey say zero trust is critical to their organizational security model, with only two percent of business leaders believing zero trust non-essential for their enterprise security posture.
But the study from Illumio, based on responses from over 460 IT and security professionals, finds that real world adoption is lagging. Of the respondents who find zero trust to be extremely or very important to their security posture, only 19 percent have fully implemented or widely implemented their zero trust plan.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.