Wednesday, December 6, 2023
Can we restore trust in the idea of privileged access? (Image Credit: Alex Kotliarskyi on Unsplash)

Can we restore trust in the idea of privileged access?

0
Privileged access management (PAM) has been a talking point for decades in the IT industry. The risks of getting it wrong have been disastrous for many companies. So why are we...
Future Technology Image by Gerd Altmann from Pixabay

The Future of Infrastructure in the Enterprise.

0
What is the future of infrastructure in the Enterprise? What does the future look like for the IT function? These are two of the issues that Enterprise Times discussed with Brett...
How do we improve quality and trust in data? (Image Credit: David Becker on Unsplash)

How do we improve quality and trust in data?

0
As the quantity of data that organisations have continues to grow, so does the need for quality and trust in that data. But how do organisations get that quality and trust?...
Can AI get you from network monitoring to proactive observability? (Image Credit: Jordan Harrison on Unsplash)

Can AI get you from network monitoring to proactive observability?

0
How do we move from network observability to proactive monitoring? It has been a challenge for most network teams for decades. One of the problems network teams face is the vast...
What is the future of SIEM and SOAR? (Image Crfedit: Roman Synkevych on Unsplash)

What is the future of SIEM and SOAR?

0
SIEM and SOAR are two of the key technologies in use across cybersecurity. Both have been around for a while now, so what can we expect as they evolve? That is...
Do you have the right data framework for your application platforms? (Image Credit: Nick Fewings on Unsplash)

Do you have the right data framework for your application platforms?

0
Organisations are overwhelmed with data, but many of them struggle to get the best from it. The problem is not just about the volume of data they have. There is a...
Applying crime theory to cyber extortion (Image Credit: pexels-tima-miroshnichenko-6266301)

Applying crime theory to cyber extortion

0
What is crime theory? Why does it matter to cybersecurity? In particular, what can it teach us about reducing crime and how we rethink what we do as an industry? To...
What is a HEAT attack? (Image Credit: Photo by Tima Miroshnichenko)

What is a HEAT attack?

0
What is a HEAT attack? To get the answer to that, Enterprise Times talked with Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security. Guntrip started by saying, "HEAT, because...
Securing Active Directory continues to be a challenge (Image Credit: Photo by cottonbro on Pexels)

Securing Active Directory continues to be a challenge

0
Launched with Windows 2000, Active Directory has become the most deployed directory service around. Yet despite its 22-years of use, many organisations are worried about security. So where do you start...
Is your data compliance ready? (Image Credit: Federico Orlandi from Pexels)

Is your data compliance ready?

0
Compliance requirements regularly change. For data teams, that creates significant challenges in making sure data is compliance-ready. It's a non-trivial task. To understand more about the challenge, Enterprise Times spoke with...

LATEST NEWS

Francisco Partners completes Blancco acquisition (Image Credit: Christopher Bill on Unsplash)

Francisco Partners completes Blancco acquisition

0
Francisco Partners has completed its all-cash acquisition of Blancco Technology Group. The acquisition saw Blancco shares priced at 223 pence per share, costing Francisco Partners...
MIne Funding Image by TheDigitalWay from Pixabay

Mine takes $30 million in Series B funding to grow US business

0
Mine, the data privacy platform that enables people to discover and control their personal data online, has announced a $30 million Series B funding...
Inteligent Automation- Image by Freepik

Are organisations ready for Automation, as deployments ramp up

0
Digitate has published a new report that studies IT leaders' automation goals and roadmaps. AI and Automation: Laying the foundation for the autonomous enterprise...
BMC Adds Generative AI to its Service Management solution (Image Credit: getty-images-gxaXZfDDrGA-unsplash)

BMC adds Generative AI to its Service Management solution

0
At BMC Connect, 2023 in London, BMC has added generative AI, low code/no code development and contextual tooling to its BMC Helix Service Management...
Business Tip Image by Pete Linforth from Pixabay

The importance of Why in starting a new venture

0
This is the 63rd in a series of business tips from industry leaders that Enterprise Times has interviewed. Enterprise Times recently spoke to Dmitry Bagrov,...
Codeless Platform (credit image/Pexels/Christina Morillo)

Codeless Platforms releases Amazon Connector v1.0 for Amazon Seller Central integration

0
Codeless Platforms has released its Amazon Connector v1.0 providing a straightforward way of connecting Amazon Seller Central with third-party systems. The solution is managed...
Distil.ai (Image credit/PIxabay/HutchRock)

Consumer trends data reveals UK shoppers go harder for Black Friday than US buyers

0
Distil.ai has crunched Black Friday/Cyber Monday (BFCM) weekend data and shared its findings for the UK and US markets. The data gives an insight...
Orange Cyberdefense reports cyber extortion up by 46% worldwide in 2023 (Image Credit: Nikita Pavlov on Unsplash)

Orange Cyberdefense reports cyber extortion up by 46% worldwide in 2023

0
Orange Cyberdefense has released its Security Navigator 2024 report (registration required). At 91 pages, it is not a quick or easy read. It delivers...
Egress adds advanced graymail detection to its cloud security offering (Image Credit: Brett Jordan on Unsplash)

Egress adds advanced graymail detection to its cloud security offering

0
Egress has added advanced graymail detection capabilities to its cloud security offering.  It is part of Egress Defend, and integrates into customers’ Microsoft 365...
Austal USA suffers ransomware attack (Image Credit: Austal USA)

Austal USA suffers ransomware attack

0
Austal USA has become the latest victim of the newly emerged Hunters International cybercrime gang. News of the attack first broke on the dark...
IBM mainframe Image credit pixabay/skeeze

BMC announces zAdviser Enterprise to confirm commitment to mainframe

0
BMC has announced the release of two new products to support mainframe customers on their mainframe modernisation journey. They are the BMC AMI zAdviser Enterprise solution...
NOYB hits Meta with GDPR complaint over Pay or Okay (Image Credit: Georg Molterer)

NOYB hits Meta with GDPR complaint over Pay or Okay

0
Privacy group NOYB has hit Meta with yet another GDPR complaint. This time, it has highlighted the social media giant's latest attempt to get...
MangoApps TinyTake platform

Not so Tiny any more, as MangoApps relaunches TinyTake

0
MangoApps has relaunched TinyTake. Once a screen capture & video recording software for Microsoft Windows & Mac, it has now re-emerged as a complete...
Bulk email using mail merge in Word - Image by Gerd Altmann from Pixabay

Personalised Bulk emails using Mail Merge in Word

0
Use Mail merge to email for bulk contact lists with extra items specific to each.