How the top PAM-mature enterprises are thwarting privileged credential breaches

  • Energy, technology and finance are the most mature industries when it comes to privileged access management (PAM) adoption and uses, outscoring peer industries by a wide margin
  • 58% of organisations do not use multi-factor authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged access abuse
  • 52% of organisations are using shared accounts for controlling privileged access, increasing the probability of privileged credential...

By Louis Columbus, 18 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Global enterprise storage systems market saw decline in Q119, says IDC

The global enterprise storage systems market recorded $13.4b in revenues in the first quarter of 2019 (1Q19), which is a decline of 0.6% on year-over-year (YOY) basis.

According to International Data Corporation’s (IDC) latest study, titled Worldwide Quarterly Enterprise Storage Systems Tracker, the total capacity shipments increased 14.1% to 114.2 exabytes on a YOY basis during the quarter.

By Enterprise CIO, 11 June 2019, 0 comments. Categories: Big Data, Cloud , Data & Analytics, Research.

SentinelOne raises $120 million in Series D funding to automate enterprise endpoint security

California-based endpoint security software provider SentinelOne has raised $120 million (£94m) in a recently conducted Series D round led by Insight Partners.

Samsung Venture Investment Corporation, Third Point Ventures, Redpoint Ventures, NextEquity, Data Collective, and other firms also participated in the funding round.

SentinelOne offers security services to companies...

By Enterprise CIO, 07 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

How artificial intelligence will affect the future of networks – and what you need to do about it now

"Prediction is very difficult, especially if it's about the future," said Nils Bohr, Nobel laureate in Physics, and that observation certainly applies to evaluating technology trends and their impact on the business networks of tomorrow.

Today’s network is built to deliver applications and services that didn’t exist 15 years ago, and is designed for companies that may themselves only be a few years old and...

By Carl Grivner, 13 May 2019, 0 comments. Categories: Applications, Data & Analytics, Design, Employees, Productivity.

Humanising automation: Understanding the five senses of artificial intelligence

In reality, AI's true potential can only be realised when organisations approach it like a portfolio of technologies, with different attributes, that work together to optimise operational efficiency whilst delivering better service levels and improving the customer and user experience.

This concept of a portfolio of technologies working together can be illustrated further by what I refer to...

By Christopher Stancombe, 10 May 2019, 0 comments. Categories: Applications, Data & Analytics, IoT, Marketing, Productivity.

The big enterprise security problem posed by small – or at least smaller – businesses

As the threat level grows and diversifies, global enterprises continue to make cybersecurity a top priority. As they should: high-profile attacks continue to wreak havoc on major brands—with Humana and Marriott among the most notable recent victims. One silver lining in the continued fight is that the pervasiveness of threats has elevated cybersecurity from an IT problem to a board-level issue.

In fact, according to

Why CIOs need to question 5G and the 'need for speed'

Who doesn’t want a bit of extra speed in their life – especially when it comes to mobile data? Well, quite a few people, as it turns out.

The advent of 5G services promises much faster mobile communications, with ten times the speeds of existing 4G services (and remember what a transformation that was). According to received wisdom, everyone stands to benefit – from consumers who will be able to download an HD film in seconds, to urban planners who can use 5G to provision the services that...

By Harry Chima, 02 May 2019, 0 comments. Categories: App Platforms, CIO, Data & Analytics, Development.