Data strategy isn't understood in two-thirds of companies


Research from data science consultancy Mango Solutions shows that while 95 percent of companies questioned have a data strategy, less than a third of those (29 percent), claim their data strategy is clear and widely understood.
The survey, of over 100 data professionals at the Big Data LDN event in September, reveals companies are investing heavily in data capabilities, resulting in maturing data functions -- for example, 41 percent have established data science functions in the last two years.
A minute is a long time on the internet


Former British prime minister Harold Wilson famously once said, "A week is a long time in politics." Of course in the age of the internet things move faster still.
Research from advertising company N.Rich shows that in the online world an awful lot happens in just one minute.
Why data quality is essential to business success [Q&A]


Enterprises are increasingly reliant on data, but it's only really useful if its quality can be assured. With growing volumes though maintaining data quality and compliance is a big challenge.
We spoke to Rex Ahlstrom, chief strategy and technology officer at Syniti to find out how businesses can improve and maintain the quality of their data and how this can benefit them.
Tech industry has become more inclusive but women still face barriers


The past decade has seen a concerted effort to improve opportunities for women in the technology sector, and 80 percent of female and 89 percent of male respondents to a new survey believe that it's now more welcoming.
However, a report out today from consulting company NTT DATA UK shows that 74 percent of women say they have had a negative experience at work because of their gender.
Enterprise asset management not keeping pace with pandemic changes


A new report from IT management specialist Flexera looks at how organizations have adapted their technology to meet the demands imposed by the pandemic.
It reveals information technology asset management (ITAM) trends relating to responsibilities and challenges introduced by the increased use of new IT environments such as software-as-a-service (SaaS), cloud and containers.
Hackers exploit zero day before enterprises can patch


Cybercriminals exploited the new CVE-2021-40444 remote code execution zero-day a week before the patch was issued on September 14, according to the latest report from HP Wolf Security.
Researchers also saw scripts that automated the creation of the exploit on Github on the 10th, making it easier for less-sophisticated attackers to use the exploit against vulnerable organisations.
Be part of a cybersecurity world record attempt


It's Cybersecurity Awareness Month and also Serious Security Week. To mark these events, cybersecurity companies KnowBe4 and OneLogin are partnering with Security Serious in a bid to set a brand new Guinness World Record for the most views of a cyber security lesson video on YouTube in 24 hours.
The record attempt will take place starting today, October 14th at 11am EDT, (8am PDT, 4pm BST) and will see KnowBe4 and OneLogin provide a 45-minute training session that will be live-streamed via YouTube.
Industry leaders comment on Cybersecurity Awareness Month


Most things have a day or a week or a month nowadays, and as you're reading a tech news site it probably hasn't escaped your attention that October is Cybersecurity Awareness Month.
But just in case you missed it in all of the Windows 11 excitement, here's a round up of what some leading industry figures have to say on cybersecurity, and why we need to be aware of it.
Crypto trading scam targets iPhone users looking for love


Researchers at Sophos have uncovered a cryptocurrency trading scam that targets iPhone users through popular dating apps, such as Bumble and Tinder.
Researchers have code-named the threat 'CryptoRom' and have discovered a Bitcoin wallet controlled by the attackers that contains nearly $1.4 million in cryptocurrency, allegedly collected from victims.
New software streamlines customer access management


As more customers use apps and online portals, businesses need to ensure that these day-to-day interactions that are both inviting and secure.
However, developers often lack the expertise to incorporate CIAM (Customer Identity and Access Management (CIAM) into their applications. WSO2 is addressing this challenge with today's introduction of its next-generation identity as a service (IDaaS) solution, Asgardeo.
IBM helps developers deploy AI and ML models on Kubernetes


Responding to a user request from an AI model -- 'model serving' -- is a key part of making use of the technology. But as the number of models expands serving them all raises problems and can lead to many being rarely used or abandoned.
Which is why IBM is introducing ModelMesh, a model serving management layer for Watson products that is designed to cope with high-scale, high-density and frequently-changing model use cases. It intelligently loads and unloads AI models to and from memory to strike an optimized trade-off between responsiveness to users and computational footprint.
The changing face of digital identity verification [Q&A]

93 percent of businesses experience breaches caused by third-party vendors


A new study reveals that 97 percent of firms surveyed have been negatively impacted by a cybersecurity breach that occurred in their supply chain and 93 percent have suffered a direct cybersecurity breach.
The third-party cyber risk survey form BlueVoyant also shows the average number of breaches experienced in the last 12 months grew from 2.7 in 2020 to 3.7 in 2021 -- a 37 percent year-on-year increase.
Enterprises move to software-defined storage as data volumes increase


A new report from the Linux Foundation looks at enterprise use of data and storage relating to cloud services and workloads.
The 2021 Data and Storage Trends Report, produced by the SODA Foundation and Linux Foundation Research, shows rapidly growing data volumes and a shift in how they're being handled.
Google Cloud and Cybereason team up to fight cyberattacks


As the IT landscape has evolved, securing hybrid and cloud environments has become a more complex and challenging process.
To improve Extended Detection and Response (XDR) across endpoints, networks, cloud and workspaces, operation-centric cyber attack protection specialist Cybereason, and Google Cloud have today announced a collaboration.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.