IT STRATEGY

Subscribe
 

The High Risk of Third-Party Apps

The cloud, combined with an explosion of third-party cloud apps, is posing major security issues for enterprises, according to a new study. The report, "The Explosion of Apps: 27% Are Risky," was conducted by the cyber-lab of CloudLock, a security vendor. "The shift to... Read More »

Why Data Pros Have a Need for Speed

As a means of achieving what's called "fast data/big data," a majority of organizations are deploying tech tools which enable near real-time data pipelines, according to a recent survey from OpsClarity. The resulting report, titled "Read More »

How Custom Tech Boosts Sales Team Performance

While companies are spending trillions on digital sales tools, the vast majority of sales teams aren’t taking full advantage of these investments, according to a recent survey from Accenture Interactive. The report, titled “Empowering Your Sales Force: It’s Not Just Automation,... Read More »

Cloud Apps Rise Despite Cloud Security Concerns

Cloud computing spend grew 20 percent last year, but security of critical data and systems remain key issues and barriers to adopting cloud services. As a result, cloud security concerns are rising as investment in it grows, according to a new report by Crowd Research Partners, but that's not stopping companies from using the cloud. The study, "2016 Cloud Security Spotlight Report," was... Read More »

How More Cloud Services Put the Business at Risk

By now, CIOs and their IT teams must think that they've spent countless hours talking to their organization's employees about the inherent dangers of the Internet age. But risky user behavior is still alive and well, according to a recent survey from Softchoice. The report, titled Read More »

Outdated Security Creates an IoT Danger

The IT community must immediately address Internet of things security because there is a dire need for advanced security for agentless devices, a study revealed. IoT devices are often not addressed in companies' security policies, if indeed any policy exists. In addition, the perceived penetration by respondents of IoT devices is low and they are not confident that their perception is... Read More »

How Business Benefits From Self-Service Analytics

CIOs and their tech teams could better support line-of-business units by enabling what's called "self-service" data analytics, according to a recent survey from Alteryx and Harvard Business Review. The accompanying report, titled "Read More »

How Remote Workers Impact Enterprise Collaboration

This decade has seen the rise of a more open, collaborative workplace—along with a wealth of both personal and company-provided tech tools to enable employees to thrive in these spaces. That said, many organizations still struggle to ensure that both their space and tech support best contribute to positive productivity, according to a recent survey from Oxford Economics and... Read More »

Super Bug Hunters Collect Millions in Bounties

More organizations are adopting bug bounties—incentivized programs that encourage security researchers to report security issues to a sponsoring organization. Bug bounties are moving from novelties to best practices, helping to strengthen the security of products. "2015 was the year companies realized that when it comes to cyber-security, the pain of staying the same is exceeding the... Read More »

Why Security Execs Lack Confidence in Security

A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively about security metrics and posture to senior management. These executives continue to rely mainly on quantitative metrics aimed at preventing breaches.... Read More »

Read More From Our IT Strategy Archive »