It’s going to be a hundred-zettabyte world – with major investments in the edge reaping rewards

Global data creation is predicted to grow to 163 zettabytes (ZB) by 2025, 10 times the amount of data produced in 2017, according to new figures from IDC.

The findings appear in a report put together by the analyst firm alongside data storage firm Seagate. The report, titled ‘The Digitisation of the World: From Edge to Core’, notes how the enterprise is driving this change.

“Where...

By James Bourne, 03 December 2018, 0 comments. Categories: Big Data, Cloud , Data & Analytics, Enterprise Mobility, IoT, Research.

Why more organisations are understanding the benefits of becoming an ‘intelligent enterprise’

If you want to become an ‘intelligent enterprise’ – one where the physical and digital worlds are connected to drive innovation via real-time guidance, data-powered environments and collaborative mobile workflows – then time is running out to be ahead of your peers.

According to new research published by Zebra Technologies, the number of firms who are becoming intelligent enterprises has doubled year over...

By Enterprise CIO, 20 November 2018, 0 comments. Categories: CIO, Data & Analytics, Enterprise Mobility, IoT.

How the IT world wised up to the need for tech that ‘just works’

Believe it or not, but once upon a time, we expected the computer industry to sell us products that were complicated to set up and required specialist expertise at every turn. Early personal computer software involved spending lots of time reading manuals and scratching heads before we got to grips with character-based operating systems and their applications’ cryptic syntax and commands. If you’re in your middle age, you might recall WordPerfect’s scary empty screen or WordStar where you...

By Ashish Shah, 06 November 2018, 0 comments. Categories: Applications, Collaboration, Data & Analytics.

Get to grips with DevSecOps – and address security flaws much more quickly

The number of vulnerable applications in an organisation’s ecosystem remains at a ‘staggeringly high’ level according to new research – but putting DevSecOps practices into action appear to have some benefits.

That’s according to a report from CA Veracode. The latest State of Software Security report – CA Technologies having acquired Veracode last year – gives a ‘promising’...

By James Bourne, 26 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Productivity, Security.

Four cybersecurity challenges that critical infrastructures are facing

Earlier this year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a joint alert, warning that the Russian Government had carried out an attack...

By Anthony Perridge, 16 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Deflecting DDoS: Key tactics in the battle against IoT-powered attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline.

The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia, claimed responsibility...

By Ronald Sens, 03 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Mobile, Security.

Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

Enterprises are finding open source so alluring that vulnerabilities are less important

The Equifax data breach of 2017 was a bad one. Just how bad it ended up being was only revealed in May this year. This isn’t for the faint of heart: 209,000 payment cards, 99 million addresses, and more than 146 million people affected.

Yet these revelations have had little effect on organisations using vulnerable open source software. According to the latest State of the Software Supply Chain report from Sonatype, the...

By James Bourne, 27 September 2018, 0 comments. Categories: Applications, Data & Analytics, Data Loss, Privacy.

How CIOs in Africa are defining new business models for digital transformation

A recently conducted annual CIO survey by global research firm Gartner states that half of the organisations in Africa have changed or are in the process to change their business models owing to the maturing digital business.

The 2019 Gartner CIO Agenda Survey, which polled more than 3,000 CIOs in 89 countries and all major industries, says that CIOs will play an important role in changing the business models within their...

By Enterprise CIO, 24 September 2018, 0 comments. Categories: CIO, Data & Analytics.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.