Enterprise

Zero-Trust

New partnership simplifies zero trust access for enterprises

The shift to hybrid working means that managing enterprise networks has become more complicated, but legacy remote access solutions fall short in meeting the needs of supporting both managed and unmanaged users and devices.

Unmanaged users don't want to install heavyweight clients designed for managed use, such as VPN or ZTNA clients. Plus, in the case of contractors or consultants who service multiple customers, it's just not possible or practical to install multiple clients.

By Ian Barker -
Data security business

Data integrity and complexity are seen as top challenge for DBAs

A new survey looking at the challenges faced by database administrators (DBAs) shows 35 percent of organizations cite data integration as a top challenge.

Additionally, the study from Quest Software shows 42 percent of organizations report that data migrations are a significant obstacle to overcome, with complications in ensuring database reliability and performance.

By Ian Barker -
Manufacturing AI

Manufacturing firms worry their data isn't suitable for AI

A new study finds that 92 percent of those surveyed in the manufacturing industry say AI is a top C-Suite priority and the same percentage agree it provides a competitive advantage.

But the report from Riverbed also shows that 69 percent are concerned about the suitability of their organization's data for AI usage, and only 42 percent rated their data as excellent for completeness and accuracy. It's notable too that 42 percent say their data quality is a barrier to further AI investment.

By Ian Barker -
Artificial intelligence

How businesses are adapting to the challenges of AI [Q&A]

A recent survey found that only 37 percent of businesses are prepared for AI. This means they risk being left behind as competitors embrace the technology.

We spoke to Richard Tworek, CTO at Riverbed about how organizations can embrace AI and how they can succeed in today's rapidly evolving landscape.

By Ian Barker -
Compliance rule law and regulation graphic interface for business quality policy

Complex regulations and sophisticated cyber risks worry compliance professionals

New research from governance, risk, and compliance (GRC) specialist MetricStream, in collaboration with GRC Report, looks at risk practitioners' priorities for 2025.

Navigating the complex regulatory landscape is among their top challenges this year, named by 51 percent, with new guidelines, evolving requirements, and unexpected policy shifts occurring almost weekly.

By Ian Barker -
Cybersecurity investment money

Why unlocking the full potential of your cybersecurity investment isn't just about the tech [Q&A]

For enterprises, making the right cyber security investment isn't just about selecting the most advanced technology. To truly get the best return, decision-makers must also consider the strategic and financial aspects of their choices.

We spoke to Ben Vaughan, chief commercial officer at Bridewell, to discuss how by engaging with the right teams, businesses can ensure their security solutions are not only technically sound but also aligned with their long-term financial goals and sustainable growth.

By Ian Barker -
Data cash balance

Enterprises struggle to balance data retention costs with compliance

A new survey of 300 IT and security professionals, commissioned by Red Canary and conducted by Censuswide, finds that just 35 percent of data stored in legacy SIEMs delivers tangible value for threat detection.

In addition, only 13 percent of organizations separate out low value data for cheaper storage in a raw data repository. Due to SIEM storage costs, 68 percent of IT security decision makers say they discard low value data and have to hope they won't regret it.

By Ian Barker -
Passkey vault lock

87 percent of enterprises are deploying passkeys

A new report shows that 87 percent of companies in the US and UK have, or are in the process of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance.

The research from the FIDO Alliance, along with underwriters Axiad, HID, and Thales, finds 47 percent report rolling out a mix of device-bound passkeys on physical security keys and/or cards and passkeys synced securely across the user's devices.

By Ian Barker -
Cloud cost money cash

Enterprises set to waste billions due to lack of cloud cost awareness among developers

A disconnect between FinOps and development teams is leading to wasted spend on cloud infrastructure costs according to 52 percent of engineering leaders.

Research from software delivery platform Harness finds developers have limited insight into cloud waste. Fewer than half of respondents say they have access to real time data on idle cloud resources (43 percent), unused or orphaned resources (39 percent), and over or under-provisioned workloads (33 percent).

By Ian Barker -
Linux automation penguin

New solution automates fixing Linux vulnerabilities

More than ever enterprises are turning to Linux solutions. But while the open source OS has a good reputation for security that doesn't mean that it’s invulnerable and it's important to stay on top of updates and patching.

Seal Security is launching Seal OS, a holistic solution designed to automatically fix vulnerabilities in both Linux operating systems and application code.

By Ian Barker -
AI network enterprise

How GenAI adoption introduces network and security challenges [Q&A]

Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they're evaluating their preparedness from a business, safety, skills, and product level. But there's another key factor at the backend that's being overlooked: the network.

Full GenAI adoption introduces significant new challenges and demands on the network, such as bandwidth strain and unique security vulnerabilities. If these demands aren't accommodated, organizations won't realize the benefits of GenAI.

By Ian Barker -
Mobile phishing mishing

Mobile-first phishing attacks surge as specific capabilities are targeted

As organizations increasingly rely on mobile devices for business operations, including multi-factor authentication and mobile-first applications, mobile phishing poses a severe risk to enterprise security.

New research from Zimperium's zLabs shows a surge in mobile-focused attacks, dubbed 'mishing', activity peaking in August 2024 with over 1,000 daily attack records. These attacks are specifically designed to evade desktop security measures, executing only on mobile devices.

By Ian Barker -
Wi-fi router problem troubleshooting

New Connectivity Guru uses AI to streamline Wi-Fi troubleshooting

The average home now has multiple devices reliant on Wi-Fi connections and businesses have many times more. Users expect fast, consistent speeds, but troubleshooting problems can be complicated, leading to frustration, while service teams lack the visibility to diagnose issues beyond the router.

With the launch of its Connectivity Guru, TechSee is harnessing Agentic AI to transform the way Wi-Fi issues are diagnosed and resolved.

By Ian Barker -
Artificial intelligence AI ban block

Companies block GenAI but workers still use it

A new report from Fortanix finds that 97 percent of companies block or restrict GenAI usage, and 89 percent of the respondents believe that such controls on usage are successful.

However, the same report -- based on a survey of 1,000 executives -- reveals that 95 percent of professionals use some form of AI, and 66 percent of respondents use GenAI for work, with 64 percent using personal email accounts to access the tools.

By Ian Barker -
Enterprise AI

New platform helps enterprises take control of AI

Artificial intelligence is finding its way into more and more areas and that presents a challenge for businesses who need to keep things secure. Add in shadow use of AI and the problem becomes worse.

Californian start up Singulr.ai is launching a new enterprise AI governance and security platform to help organizations stay on top of AI adoption.

By Ian Barker -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

© 1998-2025 BetaNews, Inc. All Rights Reserved.