How prepared are organizations for the challenges of the changing SAP landscape

The Tricentis, Capgemini and Sogeti report explores current SAP adoption and implementation trends, and organizations’ preparedness to deal with the challenges emerging from the changing SAP landscape. “SAP’s ERP system acts as the backbone of business… Continue reading How prepared are organizations for the challenges of the changing SAP landscape

DDoS attacks are up, with ever-greater network impact

Telia Carrier has announced the findings of a report with a perspective on today’s cyber threats from traffic data. The report investigates changes in attack vector, size and frequency, and reveals a staggering 50% increase in peak attack traffic compa… Continue reading DDoS attacks are up, with ever-greater network impact

Worldwide AIOps market size to grow steadily by 2027

The global AIOps market size is projected to reach $23.9 billion by 2027, from $4.0 billion in 2020, at a CAGR of 30% during 2021-2027, according to Valuates Reports. Major factors driving the growth of AIOps market size are: Increasing infrastructure … Continue reading Worldwide AIOps market size to grow steadily by 2027

Threat Modeling in the Age of Automation

Cybersecurity threats are rising fast, leading enterprises that build applications to look more closely at security measures built on precautionary principles, including threat modeling, which has become core to ensuring applications can withstand fut… Continue reading Threat Modeling in the Age of Automation

Move to all-flash object storage to occur within five years

Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry towards flash-based object storage to fuel AI, ML, automation, and big data analy… Continue reading Move to all-flash object storage to occur within five years

Dealing with security vulnerabilities on data center servers requires more skilled staff

There is a lot of attention being paid to continuously updating servers to patch security vulnerabilities on Linux servers running in data centers – a basic step underpinning technology infrastructure in every industry. Yet, staff resources to de… Continue reading Dealing with security vulnerabilities on data center servers requires more skilled staff

It takes more than MFA to beat human hacking

While multi-factor authentication (MFA) is a much-needed addition to an effective cyber defense strategy, it is by no means foolproof. In fact, no single security effort can ever be considered entirely effective when facing off against threat actors th… Continue reading It takes more than MFA to beat human hacking

79% of organizations identify threat modeling as a top priority in 2021

Security Compass published the results of a report designed to provide a better understanding of the current state of threat modeling in mid-sized, $100M to $999M and large sized, $1B + enterprises, with a specific focus on the challenges organizations… Continue reading 79% of organizations identify threat modeling as a top priority in 2021

85% of organizations are yet to hit the cloud native technologies adoption milestone

Despite high adoption rates of cloud native technologies in recent years, enterprises have yet to cross the chasm to full adoption, but they’re quickly moving in that direction, according to initial results of a survey released by Canonical. The report… Continue reading 85% of organizations are yet to hit the cloud native technologies adoption milestone

Achieving digital transformation through RPA and process mining

For your transformation journey to be successful, you need to develop a deep understanding of your goals, people and the process. Continue reading Achieving digital transformation through RPA and process mining