Security and automation are top priorities for IT pros


The top three priorities for IT professionals are improving IT security overall (52 percent), increasing IT productivity through automation (33 percent), and migrating to the cloud (32 percent), according to a new report.
A survey of almost 2,000 IT pros from Kaseya also reveals the main three challenges are cybersecurity and data protection (49 percent), insufficient IT budgets and resources to meet demands (29 percent), and legacy systems that hamper growth and innovation (21 percent).
Identifying key risks is top cybersecurity challenge


Risk-based strategies are most successful in preventing security breaches, according to a new study from Skybox Security.
Of companies taking a risk-based approach 48 percent suffered no breaches, 50 percent were top performers in time to mitigate issues, and 46 percent top performers in response time.
Update seems to be the hardest word as enterprises struggle to maintain endpoints


The average enterprise now manages approximately 135,000 endpoint devices. But in spite of large budgets spent on endpoint protection, an average of 48 percent of devices -- or 64,800 per enterprise -- are at risk because they are no longer detected by the organization's IT department or because operating systems have become outdated.
A new study conducted by the Ponemon Institute for Adaptiva also finds 63 percent of respondents find that the lack of visibility into endpoints is the most significant barrier to achieving a strong security posture.
Size matters -- small cybersecurity teams face greater risk of attack


Companies with small security teams continue to face a number of unique challenges that place these organizations at greater risk than larger enterprises, according to a new study.
Research from Cynet, based on responses from 200 CISOs at small and medium businesses, finds 58 percent feel their risk of attack is higher compared to enterprises, despite the fact that enterprises are a bigger target.
Ten years of IPv6 and how it's changed the internet [Q&A]


The IPv6 protocol reached its 10th birthday in June this year. By using more address bits than the earlier IPv4 it opened up the way for more connected devices.
But IPv6 has other benefits too. We spoke to Akamai fellow and chief architect Erik Nygren to find out more about them and how they've changed the internet.
Businesses struggle with high levels of 'dark data'


In a new survey 42 percent of respondents say at least half of their data is 'dark data' -- retained by the organization, but never used.
The study from Quest Software, in collaboration with the Enterprise Strategy Group (ESG), highlights the top challenges and innovations in data governance, data management and DataOps.
Majority of industrial IoT security projects end in failure


According to new research, 93 percent of organizations have had failed industrial Internet of Things or operational technology (IIoT/OT) security projects.
The study from Barracuda Networks surveyed 800 seniors staff responsible for IIoT/OT security and finds that 94 percent admit experiencing a security incident in the last 12 months, while 87 percent of organizations that experienced an incident were impacted for more than one day.
Asset visibility is a major challenge for security professionals


A new study of over 100 security professionals, carried out by unified asset intelligence platform Armis, shows almost 40 percent say asset visibility is the biggest challenge facing their organizations.
A quarter say poor asset visibility is the biggest risk and over half (54 percent) of respondents say employee behavior is a top risk.
How no-code platforms are helping meet enterprise business challenges [Q&A]


According to a November Wall Street Journal article, Gartner predicts global revenue in the low-code application platforms market will exceed $14 billion by 2025. Also, in a Forrester Research poll earlier this year of over 1,800 corporate tech officials at global companies, roughly 37 percent say they currently use low-code, no-code or digital process automation tools.
No-code is undoubtedly having its time in the sun and looks to be here for the long term. We recently caught up with Vinod Kachroo, CEO of no-code technology platform Innoveo, to learn more about what's driving the demand for no-code and what kind of ROI companies can realistically anticipate from it.
A third of mid-sized organizations don't have a cyber-incident response plan


The rise of ransomware and other attacks has pushed cybersecurity up the agenda of businesses, yet according to a new study 36 percent of mid-sized organizations don't have a formal incident response plan in place.
The report from Egnyte, based on a survey of 400 US executives conducted by Wakefield Research, also shows that the rise in cyberattacks has prompted organizations to increase focus on user access to critical data repositories.
What is the business metaverse and why should enterprises care? [Q&A]


The metaverse has triggered something of a buzz in recent months, particularly among big tech companies and wealthy investors.
But while the idea of a virtual world might be compelling for consumers, what does it mean for enterprises? We spoke to Nadir Ali, CEO of Inpixon to find out.
Ransomware and the places that worry about it most


Ransomware is predicted to cost businesses over $265 billion worldwide by 2031 according to Cybersecurity Ventures. New research from Ottowa-based managed services firm Firewall Technical has analyzed search data relating to ransomware attacks and come up with some interesting results.
Wannacry is the most searched for ransomware attack. With 6,830 related searches every month, the ransomware is still causing problems worldwide even though it was released back in 2017.
IBM's latest acquisition helps enterprises spot 'bad data' at source


As the volume of data continues to grow at an unprecedented rate, organizations often struggle to manage the health and quality of their data sets.
To deal with this IBM has announced that it's acquiring Israel-based Databand.ai, a provider of data observability software that helps organizations fix issues with their data, including errors, pipeline failures and poor quality before it impacts their bottom-line.
DevSecOps and the importance of threat modeling [Q&A]


In the past security has been something that was added only at the end of the development process. But as release cycles have accelerated this is no longer a viable approach.
DevSecOps (development, security and operations) is all about automating the integration of security at every phase of the software development lifecycle.
The tech devices we worry about the most


Technology is supposed to make our lives easier, but it seems that in many cases it also gives us something else to worry about.
Research by Bespoke Software Development Company has used the online analytics tool Ahrefs to work out which products we're most concerned about being hacked.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.