Zero Trust: A business imperative to enable the secure, hybrid-working enterprise
Without a doubt, cybersecurity will continue to be a topic riding high on the C-Suite agenda throughout 2022. With intensifying trade disputes, an escalating threat landscape, a highly distributed workforce, supply chains stretched to breaking point by the pandemic, and extra pressure exerted by the ongoing effects of Brexit in the UK and other geo-political issues, having a secure, productive, agile and cost-effective security framework in place will be paramount.
It’s evident that today’s enterprises conduct business and use digital technologies in ways that are evolving constantly. This digital transformation is making traditional perimeter-based cybersecurity IT infrastructure redundant. The days when every user and every device operating from within an organization’s premises or firewall could be automatically trusted, are over for good.
The technology turning point: Five key tech trends that will define the next decade
The central theme of this year’s World Economic Forum is how history is at a 'turning point', based on the era-defining impact of the COVID-19 pandemic. This moment is not just a turning point in history, but also for technology: businesses and society are in the midst of a digital revolution.
To underline just how much change is afoot, Gartner says worldwide IT spending will increase 5 percent this year, hitting $4.5 trillion. With so much going on, it can be hard to focus on what the key technology developments are, meaning there is a risk of spreading yourself too thinly. To help cut through the noise and prioritize the biggest technology trends, here are five key technology trends that look set to define the next decade, and beyond.
Why business technologists hold the key to long-term digital success
Digital transformation supported many organizations through the pandemic. Now the world is reopening, it’s enabling first-movers to adapt once again to changing market conditions. This is about more than survival. It’s about creating exceptional customer experiences, while becoming a more nimble, agile, and resilient organization. To do so, IT and business teams must come together to break down traditional silos and equip the entire workforce with the tools they need to deliver fast and continuous digital innovation.
That means empowering business technologists -- employees from the wider business who can compose new digital products and services from reusable "building blocks". This composable enterprise model is fast taking hold across many industries, and may ultimately define the winners and losers of the post-pandemic era.
Demonstrating business resilience in an ever-changing world
Has the world around us ever felt so uncertain? It’s a pertinent question to ask with the world still reeling from the once-in-a-lifetime disruption of the pandemic, and facing the threats of climate change, war in Europe and almost unprecedented levels of inflation which is placing a squeeze on even the most robust of household budgets.
Since the turn of the new decade, businesses have had to deal with a number of challenges, often adapting to huge turns of events with minimal warning. If the last two years have taught us anything, it’s reaffirmed the fact that all businesses of all shapes and sizes need to be able to demonstrate a high degree of business resilience, so they can continue to operate effectively in times of great change and uncertainty.
APIs or custom AI? Everything businesses need to know before taking the leap
The call to implement Artificial Intelligence (AI) is becoming difficult for businesses to ignore. Offering the promise of increased organizational productivity, speed and accuracy, some applications can be greatly beneficial to firms across a wide variety of industries and sectors.
That said, companies will naturally have some difficulty deciding on how best to implement AI, and where to achieve the best return on investment in innovative technology. Given the inherent difficulties involved in building an AI solution, finding a solution that is the perfect fit can be a mammoth task, involving great resource and even greater costs. For some, the drawbacks might even outweigh the benefits; perhaps this is why less than 15 percent of firms have implemented AI in their operations.
Five steps to a secure cloud architecture
Policy as code is central to establishing and maintaining secure cloud architecture by enabling security teams to impart their knowledge across the organization in a common, machine-readable language.
Cloud computing cyberattacks don’t play out like the scenes from Hollywood thrillers. No one is slowly lowering Tom Cruise into a preselected target’s secure data center equipped with ultrasensitive noise, temperature and motion detectors so he can steal a specific file.
Are robotics set to play a starring role in the next ten years of British manufacturing?
Technology is constantly changing our day-to-day lives and has had a particular impact on the working world. Automation is fast becoming a key conversation within multiple industries in Great Britain, including manufacturing with robotics emerging as the solution.
Over the past few years, a need to move towards more automation in the manufacturing industry has been seen. In fact, a survey done by ABB Robotics found that of 250 SME and manufacturing companies, 81.2 percent were considering incorporating robotics into their processes to combat issues with workforce shortages and supply chain disruptions.
The secret sauce to finding files, emails and other enterprise data
Finding the right file, email and other internal data without enterprise search is like grilling without barbecue sauce. It is theoretically possible, but who would even want to try?
While Internet search engines like Google specialize in directing you to the right website, enterprise search products do a deep dive into an organization’s own data. The secret sauce to enterprise search is indexing. Indexing "pre-processes" Microsoft Office files, PDFs, emails plus attachments, compressed archives and other web-ready data.
Why data lineage matters and why it's so challenging
Change introduces risk. It’s one of those foundational principles of software development that most of us learned very early in our careers. Nevertheless, it always seems to keep cropping up in spite of those repeated life lessons. Our inability to foresee the impact of changes, even small ones, often leads to negative outcomes.
As the complexity of interconnected IT systems has increased, this problem has grown worse. It’s harder and harder to predict how even a small modification might impact systems upstream or downstream of the change. Data lineage accomplishes that, but it’s extraordinarily difficult to do data lineage well.
Top 5 issues IT departments face in 2022 and how IT pros can face these challenges
Over the past two years, IT departments have faced numerous unprecedented challenges. The rapid shift to remote work is chief among them.
However, as we progress through 2022, employees are no longer working from just their homes; they are working from everywhere. Hybrid work is becoming the norm, and with that comes significant challenges for IT Managers and departments.
Three steps to turn data into an indispensable strategic tool
While 'data is the new oil' has become something of a cliché, it's undeniably true. Gartner reports that 90 percent of corporate strategies will explicitly class information as a critical enterprise asset by the end of 2022. Yet, information can only be powerful when it is put to work. Which is why the UK government and industry regulators (such as Ofwat) have set out strategies that encourage organizations to put data to use.
However, making data usable isn't always straightforward. Data doesn't come pre-packaged into customer next best actions and strategic tips. In fact, data analysis is often compared to panning for gold. Not all data is useful and you need to connect the dots to make it relevant -- when you consider the volume of data managed by the average company has grown to 162.9TB, that's one big river to pan.
Fighting the rising tide of rogue apps
We're battling a swell of rogue apps, and companies and consumers alike are struggling to keep their heads above water as these applications quickly become the tool of choice for fraudsters. According to our recent fraud data, rogue apps now make up 39 percent of global fraud attacks, growing at a rate of 50 percent per quarter.
Rogue apps attempt to impersonate a brand's application with the intent of committing financial fraud. They have the ability to wreak havoc on consumers and organizations alike, with financial institutions being a particular target.
A human-centric approach is key to unlocking digital transformation success
The information age has gone through many phases, but one thing has always remained true -- the constant acceleration of evolution. This acceleration hasn’t always been consistent, but we’ve seen another leap in the already high urgency for businesses to adopt new tools, services, and technologies boom again with the growth of hybrid working.
Enterprises have become laser-focused on what will help hybrid workers be as productive as they were in the traditional office space -- wherever they choose to work. But knowing what technology and software are best to invest in to maintain -- or even boost -- productivity is not always a simple task.
How secure is your supply chain?
Supply chains are fast becoming one of the top targets for cyber criminals, so when it comes to supply chain risk management, organizations in every industry need to start paying more attention.
While the vast majority of business leaders recognize that cybersecurity is now a key priority, the UK’s Department for Digital, Culture, Media and Sport (DCMS) recently noted that in too many instances, actions aren’t keeping up with intentions. In fact, nearly a third of UK companies admitted they aren’t currently taking any preventative action at all.
The current state of intelligent automation adoption in cybersecurity
In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, whilst another 85 percent plan on automating them in the next 12 months.
Despite the positivity of these statistics, many organizations struggle to change to a more automated process. This was highlighted at a recent webinar we held with a panel of senior cybersecurity experts from a multitude of sectors. The discussion revealed that, while most organizations are exploring automation, few have made significant progress and they attributed this to a combination of factors including needing an improved understanding of automation, increased help from vendors and a lack of good IT foundations.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.