Enterprises are finding open source so alluring that vulnerabilities are less important

The Equifax data breach of 2017 was a bad one. Just how bad it ended up being was only revealed in May this year. This isn’t for the faint of heart: 209,000 payment cards, 99 million addresses, and more than 146 million people affected.

Yet these revelations have had little effect on organisations using vulnerable open source software. According to the latest State of the Software Supply Chain report from Sonatype, the...

By James Bourne, 27 September 2018, 0 comments. Categories: Applications, Data & Analytics, Data Loss, Privacy.

How CIOs in Africa are defining new business models for digital transformation

A recently conducted annual CIO survey by global research firm Gartner states that half of the organisations in Africa have changed or are in the process to change their business models owing to the maturing digital business.

The 2019 Gartner CIO Agenda Survey, which polled more than 3,000 CIOs in 89 countries and all major industries, says that CIOs will play an important role in changing the business models within their...

By Enterprise CIO, 24 September 2018, 0 comments. Categories: CIO, Data & Analytics.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

Building trust in a ‘zero trust’ environment: A more dynamic security model

Today’s working environments are no longer governed by the perimeters and boundaries they once were.  As a result, security threats have multiplied and the pressure on IT teams to protect data has increased rapidly. Modern work happens in a mobile-cloud environment outside traditional security controls, and from the perspective of those controls it’s a zero trust environment.

As attacks become more sophisticated, security professionals are forced to reconsider the best practices on which...

By Ojas Rege, 17 September 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Enterprises waiting months for security updates may cause concern in ‘as a service’ future

Revamping an enterprise’s IT security is never going to be a simple flick of a switch. Yet for more than a quarter of organisations polled by enterprise software provider Kollective, it will take at least a month before vital updates are installed.

The study, which polled 260 IT managers, found that for almost two in five (37%), not installing updates is seen as the biggest security threat this year, with outdated...

By James Bourne, 22 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Google digs deeper into the enterprise at Google Cloud Next ‘18

Google Cloud Next '18 put customers, developers, partners and analysts through their paces last week in San Francisco, with an exhausting set of more than 100 announcements. The event confirmed the transformation Google Cloud has undergone since Diane Greene took the helm, and it revealed Google's growing momentum with enterprises and advances against Amazon Web Services and Microsoft.

But if Google really wants to vie for cloud supremacy in the next few years, it must also improve its global...

By Nicholas McQuire, 09 August 2018, 0 comments. Categories: Applications, Cloud , Collaboration, Data & Analytics, Enterprise Mobility.

Dealing in data: Insider tips for effective document management during the M&A process

The efficient management of sensitive and confidential documents is crucial to the completion of a smooth M&A process.

From a seller’s perspective, decisions need to be made throughout the process about who has access to what information, due to competition and privacy concerns. From a buyer’s perspective, the transaction will only proceed once the...

By Tom Wheeler, 08 August 2018, 0 comments. Categories: CIO, Collaboration, Data & Analytics, Employees, M&A.

How to combat daily security threats within the healthcare sector

Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on May 12, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents.

According to the NAO’s published report earlier this...

By Anthony Perridge, 07 August 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, IoT, Security.

The risk of ransomware: How to avoid becoming a victim

Since it made more frequent waves in the headlines in waves in 2017, ransomware – which allows hackers to commandeer a company’s data and hold it under password protection until a ransom is paid – has become one of the most feared and profitable weapons in a cybercriminal’s arsenal. More and more hackers are turning to ransomware because it delivers them the best bang for their buck. Small and medium-sized businesses (SMBs) are particularly vulnerable to this...

By Mark Banfield, 02 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

CIOs want cloud, cybersecurity and AI – but not all confident their IT is up to it

Data analytics, cloud and cyber security are the key technologies for CIOs today – but a fair proportion are looking at artificial intelligence (AI) and machine learning.

That is the primary finding from a study by Trace3, a provider of, well, cloud, cybersecurity, and machine learning software. Never mind that however – the statistics from the study, which featured more than 200 responses from the C-suite, as well as vice presidents and directors, are still...

By James Bourne, 25 July 2018, 0 comments. Categories: CIO, Cloud , Data & Analytics, Security.