How Walmart – among others – fell victim to recent customer phishing scams

One thing we know about consumer-focused cyber criminals is they’re more likely to strike during busy shopping periods. Black Friday – the day after Thanksgiving – and Cyber Monday, the first Monday after the holiday, are well-known to be hotbeds of cyber-criminal activity.

With this in mind, in the days leading up to Mother’s Day and Memorial Day 2019, Segasec monitored several large US-based retailers...

By Elad Schulman, 03 July 2019, 0 comments. Categories: Data Loss, Privacy, Research, Security.

Myth-busting mobile in the enterprise: The price of mobile lifecycle management

If I were to ask you what it takes to keep your mobile device ecosystem functioning in a business environment 24/7/365, the answer would probably come easy. You’d probably be able to reference managing frequent OS/application requirements or rapidly deploying replacement devices.

If I asked you, however, what is the true total cost of ownership (TCO) of these very same mobile devices and what’s the biggest cost...

By Ross Homans, 01 July 2019, 0 comments. Categories: Employees, Enterprise Mobility, Mobile, Research.

Security executives want to push forward a password-free future, finds MobileIron

The password is increasingly becoming an endangered species – and it is an area which vendors focused on Zero Trust Security (ZTS) are becoming increasingly focused. According to a new study from MobileIron, the future of authentication for enterprise services will soon be through mobile devices.

The study, which polled 200 IT security leaders across three continents and at organisations with more than 500 employees,...

By James Bourne, 28 June 2019, 0 comments. Categories: Data & Analytics, Employees, Enterprise Mobility, Security.

How machine learning is helping to stop security breaches with threat analytics

Bottom line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up.

Separating security hacks fact from fiction

It’s time to demystify the scale and severity of breaches happening globally today. A commonly-held misconception...

By Louis Columbus, 27 June 2019, 0 comments. Categories: Applications, Data & Analytics, Enterprise Mobility, Security.

The CIO's role is moving to customer obsession - but many lack the tools to do it

The CIO role is moving ever further towards customer experience as a priority; yet new research argues a 'digital deadlock' means the C-suite is struggling at delivering new KPIs.

The study, from analytics provider Accedian, argued that three in five (61%) CIOs polled feel entirely responsible for customer experience. The vast majority (99%) agreed that this aspect was in their job description.

95% of CIOs polled said their teams were at least partially responsible for delivering excellent customer...

By James Bourne, 26 June 2019, 0 comments. Categories: Applications, CIO, Data & Analytics, Research.

More tales of woe for enterprise network security, report warns

The vast majority of enterprises are struggling when it comes to protecting critical network assets from cyber threats, according to a new study from Endace.

The report, Challenges of Managing and Securing the Network 2019, which polled senior executives at more than 250 large enterprises globally, found an overwhelming sense of concern among respondents. More than four in five (81%) said they did not have enough monitoring...

By James Bourne, 25 June 2019, 0 comments. Categories: Data & Analytics, Mobile Analytics, Research, Security.

Myth-busting mobile in the enterprise: Combining speed with sustainability in device rollout

Opinion Technology moves at a remarkable pace of acceleration. For enterprises, that means “the perfect solution” is a dynamic moving target. Unfortunately, your mobile spend capacity and business requirements are not as dynamic, so creating a mobility program for those needs is no small feat. Does that mean that the speed of mobility will always outpace your capacity to engage and harness it for your enterprise?

By Ross Homans, 24 June 2019, 0 comments. Categories: Applications, Employees, Enterprise Mobility.

The changing role of the CIO: Evolution and embracing agile management

Since the dawn of the digital age, expectations of the chief information officer (CIO) continue to change. As the pace of digitisation continues to accelerate and new technologies are introduced, CIOs are becoming increasingly responsible for the variety of data sources that proliferate and impact every department in an organisation.

It is expected that the CIO will plan and develop a computing infrastructure that supports all business and product lines in heterogeneous computing environments both...

By Oded Blatman, 19 June 2019, 0 comments. Categories: CIO, Employees.

How the top PAM-mature enterprises are thwarting privileged credential breaches

  • Energy, technology and finance are the most mature industries when it comes to privileged access management (PAM) adoption and uses, outscoring peer industries by a wide margin
  • 58% of organisations do not use multi-factor authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged access abuse
  • 52% of organisations are using shared accounts for controlling privileged access, increasing the probability of privileged credential...

By Louis Columbus, 18 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

The 2019 CIO strategy analysed: Leaders needed combining CIO knowledge and CEO flair

The role of the CIO in 2019 remains a fascinating one. Where do companies invest in their technology initiatives? What position does the CIO hold? What emerging technologies need to be explored?

According to the 2019 CIO survey from Harvey Nash and KPMG, which polled more than 3,600 IT leaders, almost two thirds (63%) of organisations are now allowing technology to be managed outside the IT department.

By James Bourne, 14 June 2019, 0 comments. Categories: CIO, Development, Employees, Enterprise Mobility, Research.

The seven mistakes CIOs can make with blockchain – and how to overcome them

Gartner appears to really have it in for blockchain – or at least, wants to make sure organisations don’t dive in head first and make a serious mistake.

The analyst firm has put together a list of seven mistakes to avoid in blockchain projects as part of its latest research, including misunderstanding use cases, wrongly assuming key standards, and ignoring governance issues.

By James Bourne, 12 June 2019, 0 comments. Categories: Applications, Big Data, CIO, Research.

Global enterprise storage systems market saw decline in Q119, says IDC

The global enterprise storage systems market recorded $13.4b in revenues in the first quarter of 2019 (1Q19), which is a decline of 0.6% on year-over-year (YOY) basis.

According to International Data Corporation’s (IDC) latest study, titled Worldwide Quarterly Enterprise Storage Systems Tracker, the total capacity shipments increased 14.1% to 114.2 exabytes on a YOY basis during the quarter.

By Enterprise CIO, 11 June 2019, 0 comments. Categories: Big Data, Cloud , Data & Analytics, Research.

SentinelOne raises $120 million in Series D funding to automate enterprise endpoint security

California-based endpoint security software provider SentinelOne has raised $120 million (£94m) in a recently conducted Series D round led by Insight Partners.

Samsung Venture Investment Corporation, Third Point Ventures, Redpoint Ventures, NextEquity, Data Collective, and other firms also participated in the funding round.

SentinelOne offers security services to companies...

By Enterprise CIO, 07 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

Is the speed of mobile technology too fast and too furious for the enterprise?

Opinion If you think of technological advancement for the enterprise as a highway, there seem to be two distinct lanes with very different speeds.

The first lane is where “traditional” technology such as monitors, laptops, and desktops live. While OEMs refresh this technology every year (usually timed to chipset refreshes from Intel and their...

By Ross Homans, 03 June 2019, 0 comments. Categories: Applications, Employees, Enterprise Mobility, Tablet, Wearables.

Australian enterprise 5G market likely to generate billions – and be critical for business applications

The Australian enterprise 5G market is predicted to generate nearly $45 billion AUD (£24.5bn) on an annual basis by the mid-2020s, including next generation application development, IT services, platforms and connectivity, according to Telsyte.

The market researcher’s latest report found more than two-thirds (68%) of IT and business leaders already perceive 5G as an important technology for their business strategy...

By Enterprise CIO, 30 May 2019, 0 comments. Categories: Applications, Enterprise Mobility, Productivity.

Why getting better connected could lead to a better world

Amid uncertainty, there’s one certainty; business is more global than it has ever been, and trading with partners, customers and suppliers across the world is set to characterise business in the future. Connectivity lies at the heart of collaboration and is central to knowledge, idea and information sharing which are essential for businesses to become more productive and efficient as they make their digital transformation journeys.

There’s no room for isolation in the digital economy. Even on a...

By Daniel Creigh, 22 May 2019, 0 comments. Categories: BYOD, Collaboration, Enterprise Mobility, Productivity, UX.

Report: Two in three industrial firms are accelerating AR deployment to improve productivity

Two thirds of industrial companies polled by PTC say they are accelerating deployment of augmented reality (AR) to improve worker productivity.

In a newly released ‘State of Industrial Innovation’ report series, PTC has analysed the industrial AR and IIoT markets. Among the findings included in the latest AR report are those focused on delivering enhanced methods of training for frontline workers, enabling the workforce optimisation necessary to address the growing skilled labour shortage the...

By Enterprise CIO, 21 May 2019, 0 comments. Categories: Applications, App Platforms, Employees, Productivity, Wearables.

Does your organisation need a chatbot or a digital agent? Three important distinctions

Conventional ITSM solutions are finding it difficult to cope up with today’s business needs. Complex public, private and hybrid cloud infrastructures add hundreds of thousands of endpoints to the network, and they all must be managed. More is being demanded of IT professionals at the same time that IT talent is hard to find. Organisations are in search of new ways to provide excellent customer service and meet their service level agreements (SLAs).

AI is being touted as the answer for many of...

By Dr. Akhil Sahai, 21 May 2019, 0 comments. Categories: Applications, Employees, Productivity, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.