Over 60 percent of enterprise cybersecurity incidents relate to known risks

Businesswoman in risk metering and management concept

A new Cloud Risk Exposure Impact Report from ZEST Security shows that 62 percent of incidents are directly related to risks the security team had previously identified, researched fixes for, and had open tickets for remediation in the backlog.

The survey of over 150 security decision makers working in large US enterprises reveals that it takes 10 times longer to remediate vulnerabilities than it takes for attackers to exploit them, highlighting a significant advantage for attackers.

Continue reading

Why adopting AI needs a holistic approach [Q&A]

Futuristic AI thinking of droid robot artificial intelligence concept

It's an increasingly rare system these days that doesn't claim to have incorporated artificial intelligence in some form or another.

But when implementing AI it's important to look beyond the hype and ensure that it can deliver real value for the business. We spoke to Ajay Kumar, CEO of SLK Software, about the need for a holistic approach to allow enterprises to leverage AI for solving complex business challenges.

Continue reading

The challenges of managing non-human identities [Q&A]

Future artificial intelligence robot and cyborg.

Non-human identities (NHIs) outnumber human identities by between 10 and 50 times, but the industry lacks solutions to properly address this hole in the security perimeter.

Traditional IAM solutions and best practices aren't sufficient when it comes to managing NHIs, as evidenced by some recent breaches that have stemmed from exploitation of NHIs.

Continue reading

The role of private clouds in enterprise data strategy [Q&A]

Cloud Computing Power Enhance Cloud Strategy for Business EIDE

As AI reshapes business operations, companies are facing new challenges around cost uncertainty, security, and data integrity. The rise of hybrid cloud strategies -- combining private clouds with public infrastructure -- is becoming a key approach to addressing these concerns.

While enterprises focus on cost control, safeguarding sensitive corporate data, and preventing AI-driven data leakage, they are also trying to leverage LLMs to exploit data in the public cloud while retaining sensitive data in private clouds that they control.

Continue reading

Enterprises consider ditching Oracle Java over cost worries

Oracle Java

The percentage of organizations considering alternatives to Oracle Java has jumped significantly from 72 percent in 2023 to 88 percent today.

The Azul 2025 State of Java Survey and Report finds 99 percent of enterprises are using Java. The top reasons given for considering a migration away from Oracle Java include cost (42 percent), preference for open-source (40 percent), Oracle sales tactics (37 percent), uncertainty created by ongoing changes to pricing and licensing (36 percent), and restrictive Oracle policies (33 percent).

Continue reading

The human-centric approach to moving to the cloud [Q&A]

Human-centric cloud

Over the past decade, cloud computing has emerged as a transformative force, promising unprecedented efficiency and scalability.

However, despite the rush for businesses to adopt this technology, many cloud projects still fail to meet their stated objectives

Continue reading

80 percent of organizations are adopting passkeys but many face challenges with older systems

Passkey adoption

A new report finds that 80 percent of organizations are using or planning to adopt passkeys, as they offer a significant reduction in risks like phishing and credential stuffing, compared to traditional passwords.

However, the study from Keeper Security also finds that 40 percent of businesses continue to rely on hybrid authentication systems that blend both passwords and passkeys. These hybrid setups are often needed due to the use of legacy systems and specialized applications that have yet to support passkeys.

Continue reading

CISOs get more time in the boardroom but struggle with budgets

Boardroom CISO

A new report from Splunk shows 82 percent of CISOs now report directly to the CEO, up from 47 percent in 2023, and 83 percent participate in board meetings somewhat often or most of the time.

However, only 29 percent of CISOs say they receive the proper budget for cybersecurity initiatives and accomplishing their security goals, compared to 41 percent of board members who think their cybersecurity budgets are adequate.

Continue reading

Mobile intelligence APIs open up visibility into enterprise mobile security data

Enterprise mobile

Mobile and cloud security company Lookout is launching new Mobile Intelligence APIs integrating critical security data from mobile devices into the solutions already in use by enterprise security teams -- those like SIEM, SOAR, and XDR.

This is aimed at allowing security teams to identify cross-platform attacks, risky trends or abnormalities, and potential risks.

Continue reading

Increasing business process complexity could lead to chaos

Office chaos abyss

A new report shows 82 percent of organizations fear 'digital chaos' due to increasingly complex, interconnected, and automated processes. According to the report, a lack of control has increased compliance risks for 82 percent of organizations, while 77 percent report higher risks of core business processes failing.

The study from Camunda highlights that organizations now manage an average of 50 endpoints to execute tasks that are part of a process in their business. This is an increase of 19 percent over the past five years, and is contributing to growing business risk.

Continue reading

How much power does your AI use? Most businesses don't know

AI energy lightbulb

According to new research only 13 percent of businesses are monitoring their AI’s energy consumption despite escalating power demands.

The study from SambaNova Systems gathered responses from 2,012 business leaders (1,004 in Europe and 1,008 in the US) finds that 49.8 percent are concerned about the energy and efficiency challenges posed by AI.

Continue reading

Supply chain 'butterfly effects' what are they and how do you navigate them? [Q&A]

Butterfly on a typewriter

The world is a pretty unstable place at the moment, which can lead to problems when it comes to making decisions on whether to invest in new technologies -- particularly in the context of a rapidly changing landscape for supply chains.

We spoke to Jonathan Barrett, CEO of Kallikor, to discuss how a new generation of AI-powered digital twin technology can help businesses to anticipate changes brought about by events outside their control, and adopt efficiency-driving technologies, such as robotics and automation, with confidence.

Continue reading

SIEM and its role in the enterprise SOC [Q&A]

SIEM tablet

SIEM (security information and event management) is currently one of the cybersecurity field’s most active markets. It holds the promise of making sense of the disparate data sources across enterprise environments to detect and respond to malicious activity.

Over the past year, we’ve witnessed a wave of innovation, mergers and acquisitions and consolidation in this area, largely driven by AI advancements and the push toward the AI-native security operations center (SOC). But there's also a 'data paradox' involved in balancing cost with importing and storing as much data as possible.

Continue reading

Enterprises risk falling behind in AI adoption

Enterprise AI

Despite the excitement around AI as a transformative force, many enterprises are struggling to adopt the technology in meaningful ways, according to a new survey from Unily.

This has resulted in a growing gap between AI 'haves' and 'have nots,' where enterprises adopting AI tools for their people are making quicker gains than those without. At the same time employees who are open to using AI tools increasingly want more exposure to them and may even choose employers who are early AI adopters over those who are slower to adapt.

Continue reading

CISOs take on extra responsibilities

CISO graphic

The majority of CISOs are taking on responsibilities beyond cybersecurity, including business risk, IT oversight, and digital transformation. Three percent of CISOs attribute their raise to taking on larger scope, while others see it reflected in merit increases.

New research from IANS Research and Artico Search surveyed over more than 830 CISOs and other security leaders to understand the key trends and challenges reshaping CISO role.

Continue reading

Load More Articles