The mission-critical Domain Name System (DNS) is increasingly a target of more creative cyber- attacks designed to cause downtime or damage, according to a new study. Attackers use the DNS to exfiltrate data or launch distributed-denial-of-service attac...read more
The majority of databases in the public cloud are not encrypted, exposing sensitive personally identifiable information (PII) and protected health information (PHI), according to a new survey. The report, "Cloud Infrastructure Security Trends," revie...read more
The internet of things (IoT), artificial intelligence (AI) and other emerging technologies dominate headlines today, but CIOs and their IT teams aren't neglecting mobility either. In fact, the vast majority consider mobility a...read more
Many ex-employees continue to have access to corporate applications and often contribute to data breaches, says a new study. Forty-eight percent of respondents in the study, "Curse of the Ex-Employees," are aware of the problem. Furthermore, 20 percent of r...read more
With many current systems failing to make data available in a timely manner, a significant share of companies are actively evaluating new forms of database management system (DBMS) technology, according to a recent survey from Int...read more
The vast majority of CIOs and other tech leaders said that they feel under pressure to constantly improve their organization's customer experience (CX) through digital innovation, according to a recent survey from Couchbase. Fortun...read more
Business leaders worldwide believe the success of their enterprise depends on successfully deploying intelligent automation (IA) during the next five years, according to a report from Avanade. However, while the majority of business leaders ...read more
As company culture and existing "organizational context" (attributes in the environment that can influence performance) keep CIOs from being as effective as they could be, many business executives said that IT is either sig...read more
Workers are hiding cyber-security incidents from their employers, according to a new study, thereby increasing overall damage. The consequences can be dire. Just one unreported incident may indicate a much larger breach, and security teams must be able...read more
With the majority of IT departments managing hundreds or thousands of custom apps and developing many of them in-house, a growing number of organizations are investing in automated continuous testing, according to a recent sur...read more
Instead of deferring any and all tech-related issues to the IT department, today's most successful C-suite leaders are diving deeply into technology challenges and solutions, according to a recent survey from ThoughtWorks...read more
In an effort to digitally transform their companies, the majority of enterprises are integrating their security teams into DevOps methodologies—or are trying to do so—a new survey finds. Faster app development can open a company to security r...read more
A combination of employee cultural shifts and the dominate role technology plays in our lives has resulted in organizations committing to a digital workplace, according to a recent survey from Dimension Data. The resulting report, "The D...read more
The lack of automation integration and workflow between security and response is hindering organizations' ability to prevent, detect and respond to threats, according to a new report from the SANS Institute, "Integrating Prevention, Detection and Re...read more
World-class IT organizations are significantly boosting the bottom-line performance of their companies, according to recent research from the Hackett Group. The accompanying report, "Beyond World-Class Service: IT's Digital Capability Imperat...read more
A commitment to emerging technology, when combined with a dedication to better user and customer experiences, is translating into significant revenue gains for companies, according to a recent survey from Alfresco. The resulting report, "The Gre...read more
A majority of IT departments are deploying data center infrastructure management (DCIM) solutions and are reaping significant savings, according to a recent survey from Intel Data Center Manager and Schneider Electric. The resulting report, "DCIM So...read more
Efforts to mitigate third-party risks in the internet of things ecosystem are lagging, despite recognition that the IoT introduces new security risks and vulnerabilities, according to a new study. Companies rely on technologies and practices that...read more
While relatively few companies are making extensive use of both cloud computing and DevOps, those that commit to both are achieving vastly improved key performance indicators (KPIs) as a result, according to a recent surv...read more
A new report claims that by the time a vulnerability is disclosed, 80 percent of exploits already exist, but only 70 percent of vendor-provided patches are available. The analysis, conducted by the Aberdeen Group, is based on data provided by Veriz...read more