Please turn on your JavaScript for this page to function normally.
circle
Rapid SaaS adoption compounds visibility concerns

The stakes are higher than ever to ensure that their organizations are protected from a security and compliance perspective, but new survey data from Blissfully shows that IT …

complex
How much organizations are investing in analytics and why

Despite 94% of organizations believing data and analytics is important to their digital transformation and business growth, most are not enabling a data-driven culture, …

tools
AI and ML will become important for how organizations run their digital systems

Global organizations are making significant progress with digital transformation projects despite obstacles, however technology leaders are finding that running their …

IoT
Security still top priority as more enterprises scale IoT solutions company-wide

A record 61 percent of enterprises worldwide are on the path to becoming “intelligent,” compared to only 49 percent in 2018. The Zebra Technologies Corporation global survey …

files
Do digital architects have the tools to make the most of transformative technologies?

Digital architects are struggling to satisfy their organizations’ digital transformation ambitions, research from Couchbase has found. In a survey of 450 heads of digital …

DevSecOps
DevSecOps role expansion has changed how companies address their security posture

While organizations shift their applications to microservices environments, the responsibility for securing these environments shifts as well, Radware reveals. The rapid …

cloud complexity
Security capabilities are lagging behind cloud adoption

Security professionals regard their existing tools inadequate for securing critical cloud data, even as their organizations invest heavily, with increasing speed, in cloud …

Facepalm
Only 15% of organizations can recover from a severe data loss within an hour

There’s a global concern about the business impact and risk from rampant and unrestricted data growth, StorageCraft research reveals. It also shows that the IT …

Twitter
While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts

Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks …

architecture
100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in

99% of IT execs report challenges with architecture modernization and 98% report challenges with their corporate data architectures (data silos), a DataStax survey reveals. …

servers
Enterprises adopt edge workloads, yet still use unsuitable legacy storage solutions

By 2025 organizations will churn out 175 zetta-bytes of data, IDC predicts. However bottlenecks and compute problems continue to plague IT pros as they struggle to support …

data
How understanding and trust in data informs business decisions

There is a disconnect around understanding and trust in the data and how it informs business decisions, a Syncsort survey reveals, though most respondents rated their …

Don't miss

Cybersecurity news