What should the role of IT be in low- and no-code application development?
No-code and low-code application development platforms are clearly catching on. Leading research firm, Gartner, predicts that “by 2024, low-code application platforms will be responsible for 65 per cent of all application development activity.” Much of the demand is driven by so-called citizen developers who are using rapid application development (RAD) tools like these to build the software they need to do their jobs, despite having little or no coding...
How AI technologies will improve talent management in 2020: Speed and selection
47% of US-based enterprises are using AI today for recruitment, leading all countries in the survey. US-based enterprises' adoption of AI for recruitment soared in the last year, jumping from 22% in 2018 to 47% this year based on last year's Harris Interactive Talent Intelligence and Management Report 2018.
- 73% of US CEOs and CHROs plan to use more AI in the next three years to improve talent management
- US-based enterprises’’ adoption of AI for recruitment soared in the last year, jumping from 22% in 2018 to 47% this year
- US-based enterprises...
Why shadow IT is the cybersecurity threat which keeps giving – and what needs to be done about it
- More than 5,000 personal devices connect to enterprise networks every day with little or no endpoint security enabled in one of every three companies in the US, UK, and Germany
- More than 1,000 shadow IoT devices connect to enterprise networks every day in 30% of the U.S., U.K., and German companies
- 12% of U.K. organisations are seeing more than 10,000 shadow IoT devices connect to their enterprise networks every day
- Associates most often use shadow IT devices to access social media (39%), followed by downloading apps (24%), games (13%), and films (7%). Hackers, organised crime and...
Why it’s time to make culture the main driver of change for your enterprise
Culture - we’ve talked about it a lot recently and how businesses with a happy and engaged workforce tend to succeed more than those with a poor culture. In fact, research suggests businesses with a poor company culture cost the UK economy £23.6million a year. But culture is more, much more than that....
Why it’s time for IT to have a proper chat with HR to improve business continuity
In recent years, IT’s role within a business has massively shifted. Long gone are the days of it simply being a backend operation, stuck in the company basement like the IT Crowd in the mid noughties. Now, technology is the driver of change and IT is the hub of a business – and it needs to own that position.
Yet, this change can also bring its own difficulties. There are still ongoing...
How automation will help enterprises overcome the cybersecurity skills gap
There are few verticals that can boast a 0% unemployment rate, but cybersecurity is one of them. There are far more job openings than there are skilled professionals to fill them. This is despite many efforts to train, upskill and reskill people to close this talent gap. With almost three million unfilled cybersecurity positions around the world, the industry needs to come to grips with the serious nature of this skills gap.
The speed at which the threat landscape is...
The seven signs which mean it’s time to get focused on Zero Trust security
When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of this year alone, according to
What’s new on Forrester’s Zero Trust security landscape in 2019: From theory to integration
- Forrester added in Checkpoint, Forescout, Google, illumio, MobileIron, Proofpoint, Symantec, and Unisys in their latest Forrester Wave Zero Trust eXtended Ecosystem Platform Providers this year
- Forrester’s 2019 scorecard increased the weight on network security, automation and orchestration, and portfolio growth rate compared to last year, adding in Zero Trust eXtended (ZTX) ecosystem advocacy to the...
How three digital banks have been targeted in account takeover scams – and how to avoid it
Financial services companies have always been primary targets for scammers, with account takeover the ultimate prize. If successful, phishing scams reward attackers with sensitive data they can use for financial gain, identity theft, or brand damage.
With this in mind, Segasec monitored several prominent digital banks between October 17 and November 5. The research uncovered hundreds of dangerous URLs and many live...
Allison Cerra, CMO, McAfee: On education and mindfulness in removing cybersecurity complexity
If you’re going to write a playbook around cybersecurity best practice, as a leading executive of one of the major security companies, then it may be a wise idea to deal with any skeletons in the cupboard before dispensing the pellets of wisdom.
Thankfully Allison Cerra, senior vice president and chief marketing officer at McAfee, does so in her new book with integrity, grace, and no little wit.
In April 2017, as
Are we doing enough to secure our digital business? Why automation is the answer
To nobody’s shock, security shortcomings exist everywhere. Take senior IT leaders and the customers they serve. These customers believe IT leaders have taken every security precaution possible, yet any knowledgeable IT professional can look at their setup and see gaps. Unfortunately, the disparity between perceived protection and actual exposure also exists at the enterprise level.
Financial services firms rely on BYOD – so how do they stay secure?
Bottom line: 2020 is going to be the year companies launch more digital business initiatives that depend on BYOD than ever before, making Zero Trust Security a key contributor to their success.
Financial services firms are at an inflection point going into 2020. Mobile-first products and services now dominate their product roadmaps for next year, with applications’ speed and security being paramount. In fintech, DevOps teams have been working with
Lack of communication between CEO and CISOs put organisations at risk of cyberattacks, says Australian study
The latest research report from Unisys has revealed a major persisting issue between two members of the C-suite that could put organisations at greater risk of cyber-attacks.
The study, which surveyed 88 CEOs and 54 CISOs from Australian small-to-medium businesses, found that many CEOs still see cyber-security in tactical terms and thus failing to integrate safeguard essential digital assets into their strategic planning.
Why 2020 could be our year to achieve one workforce and true transparency
We can’t change what’s happened this year, but there is plenty to look forward to in 2020. I’m excited about the year ahead because, despite the many challenges in 2019, I believe we’re witnessing an evolution in businesses and how they choose to operate.
The next year, and indeed, decade looks to be exhilarating - and here's why.
Why improving endpoint security needs to be a primary enterprise goal in 2020
Bottom line: Attacking endpoints with AI, bots, and machine learning is gaining momentum with cybercriminals today with no signs of slowing down into 2020, making endpoint security a must-have cybersecurity goal for next year.
Cyberattacks are growing more complex and difficult to prevent now and will accelerate in the future, making endpoint security a top goal in 2020. Cybercriminals are using structured and unstructured machine learning algorithms to hack organisations’ endpoints with increasing frequency....
Five strategies healthcare providers are using to secure their networks
- Healthcare records are bestsellers on the Dark Web, ranging in price from $250 to over $1,000 per record
- The growing, profitable market for Protected Health Information (PHI) is attracting sophisticated cybercriminal syndicates, several of which are state-sponsored
- Medical fraud is slower to detect and notify, unlike financial fraud (ex. stolen credit cards), contributing to its popularity with cybercriminals globally
- Cybercriminals prefer PHI data because it’s easy to sell and contains information that is harder to cancel or secure once stolen. Examples include insurance policy...
Using AI to secure the modern world – where enterprises are particularly vulnerable
The types of threats that are targeting enterprises are evolving and completely different to what they were a decade ago. Enterprise attacks are no longer executed by “lone wolf” hackers, but instead come from highly sophisticated and professional cybercriminal networks. Artificial Intelligence (AI) and machine learning (ML) can be harnessed by hackers to automatically seek out weaknesses in organisations’ ecosystems.
From culture to communication: Why the success of your ITIL initiative depends on many factors
One of the world's most famous (or infamous) structural frameworks for process and communication management is ITIL. ITIL often is used to generate results in a service-oriented organisation. ITIL benefits frequently cited include improved customer and user satisfaction, as well as increased service-orientation for IT staff. ITIL can increase professional standards by implementing best practices for specific processes, reducing costs, and clarifying organisational...
It’s no longer time to think of ‘digital’ for manufacturing – it’s the new business as usual
The recent Industry 4.0 Exchange held in Derby, brought together digital leaders from some of the UK’s great manufacturing organisations from Astra Zeneca, BAE, Dyson and GlaxoSmithKline to Jaguar Land Rover, Rolls Royce and Toyota. Hosted by the ‘Father of Industry 4.0’, Henrik von Scheel, the event brought together these industry leaders to share and delve into their digital ambitions for manufacturing.