Date | Title | Description |
01.11.2024 | The Rise of Intelligent Security: Ghost Security's Reaper and the Future of Application Protection | In the fast-paced world of cybersecurity, innovation is the name of the game. Ghost Security has stepped into the spotlight with its groundbreaking open-source application security testing framework, Reaper. This tool is not just another ad... |
01.11.2024 | AI governance & data intelligence pivotal for 2024 | The 2024 State of Data Intelligence Report identifies AI governance as a key challenge for organizations adapting to AI demands while emphasising the critical role of data intelligence in business operations.
Quest Software, in collaboratio... |
31.10.2024 | Proofpoint to acquire Normalyze, enhancing AI-powered DSPM | Proofpoint has announced a definitive agreement to acquire Normalyze, a company specialising in Data Security Posture Management (DSPM), with the transaction anticipated to conclude in November 2024.
The acquisition is set to enhance Proofp... |
31.10.2024 | Introducing Reaper: Ghost Security’s Open-Source Application Security Testing Framework – Built by Humans, for AI | AUSTIN, Texas–(BUSINESS WIRE)–October 31, 2024–
Ghost Security announces the release of Reaper, the first open-source Application Security Testing framework powered by Agentic AI. Reaper combines human expertise with AI driven decision-maki... |
30.10.2024 | Navigating the Digital Frontier: Data Governance and Cybersecurity in an AI-Driven World | In the vast expanse of the digital landscape, data governance and cybersecurity are the twin sentinels guarding our virtual lives. As we march deeper into the age of artificial intelligence (AI), the need for robust data governance has neve... |
29.10.2024 | Data governance needs to be made ready for AI | Improving data quality (42 percent), security (40 percent), and analytics (40 percent) remain top data governance drivers, but in 2024 ensuring data readiness and quality for AI (34 percent) has made the list as the fourth most cited driver... |
09.10.2024 | Commvault launches Cloud Rewind for enhanced resilience | Commvault has introduced its new Cloud Rewind offering designed to enhance cyber resilience for organisations prioritising cloud-based operations.
The new Cloud Rewind integrates cloud-native distributed application recovery and rebuild cap... |
03.10.2024 | HCLTech Study: Emerging Tech and Security Shaping Cloud Strategies for GenAI | 87% of enterprises are choosing multiple cloud partners;
81% see hybrid environments persisting
HCLTech, a leading global technology company, released its report, ‘Cloud Evolution: Mandate to Modernize,’ offering a comprehensive analysis of... |
02.10.2024 | HCLTech report reveals cloud's pivotal role in business modernisation | New research from HCLTech reveals that Cloud is not just a technology investment, but is fundamental to how businesses modernise.
HCLTech, a leading global technology company, has released its report, 'Cloud Evolution: Mandate to Modernize,... |
05.09.2024 | The Rise of AI Solutions: Transforming Data Management and Security | In the ever-evolving landscape of technology, artificial intelligence (AI) is not just a buzzword; it’s a revolution. Companies are harnessing AI to streamline operations, enhance security, and optimize data management. This shift is not me... |
04.09.2024 | Revefi Introduces Raden – The World’s First AI Data Engineer | Raden augments data engineers with distinguished engineer expertise
Revefi today announced the launch of Raden, the world’s first AI data engineer. Raden augments traditional data engineers with data architecture, system performance, optimi... |
30.08.2024 | NetApp unveils new features to enhance VMware Cloud Foundation | NetApp has announced new capabilities to support VMware Cloud Foundation deployments. These advancements are designed to enable mutual customers to efficiently run VMware workloads at scale. For over a decade, NetApp and VMware, now under B... |
16.08.2024 | Enterprises need to update application security practices | Organizations urgently need to modernize their application security practices so that they can support growth and mitigate risks according to a new report.
Thew study from Legit Security and TechTarget's Enterprise Strategy Group (ESG) find... |
26.06.2024 | Sisense announced Beta Launch of its conversational analytics tools | Sisense, the leader in API-first embedded analytics that transforms enterprise data into a competitive edge, announced the beta launch of the Sisense Analytics Chatbot and enhanced natural language narration. These embeddable conversational... |
25.06.2024 | Sisense Launches GenAI Analytics Chatbot and Enhanced Narration to Democratize Data Insights | Creators can quickly embed capabilities giving end users the ability to make faster decisions achieving greater operational efficiency with Sisense’s embedded natural language interface within apps
Related Posts
Teradata Partners with Googl... |
08.05.2024 | Trend Micro Expands AI-powered Cybersecurity Platform to Combat Accidental AI Misuse and External Abuse | Eva Chen, CEO: “The promise of the AI era is only powerful if protected”
HONG KONG SAR – Media OutReach Newswire – 8 May 2024 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today launched significant addit... |
29.04.2024 | Commvault Turns the Concept of Cleanrooms on Its Head: Democratizing the Technology and Giving CISOs / CIOs Confidence They Can Recover When Attacked | Under Constant Threat of Attack, CXOs Can Affordably Test their Cyber Recovery Plans On-Demand and Orchestrate Rapid Recovery to a Clean Location in the Cloud
TINTON FALLS, N.J., April 29, 2024 /PRNewswire/ -- Commvault, a leading provider ... |
22.03.2024 | Veritas Backup Exec Strengthens Resilience Against Ransomware for SMBs | Latest release of all-in-one data protection solution features new malware detection, role-based access control and faster backup and recovery
SINGAPORE, March 22, 2024 /PRNewswire/ -- Veritas Technologies, the leader in secure multi-cloud ... |
11.10.2023 | Гиперконвергенция: темпы распространения, сценарии применения и перспективы развития | Гиперконвергентная инфраструктура, или HCI, представляет собой программно-определяемую инфраструктуру, в которой вычислительные мощности, хранилища данных и сетевые ресурсы объединены в единый кластер.
Чтобы масштабировать систему, достаточ... |
11.10.2023 | The 10 Biggest Cyber Security Trends In 2024 Everyone Must Be Ready For Now | The 10 Biggest Cyber Security Trends In 2024 Everyone Must Be Ready For NowAdobe Stock |
14.09.2023 | Only 14 percent get back all their data after a ransomware attack | New research shows that only 14 percent of businesses get back 100 percent of their data following a ransomware attack -- even if they agree to the ransom demand.
The study sponsored by Zerto and conducted by Enterprise Strategy Group also ... |
06.09.2023 | Lack of cybersecurity staff affects over 70 percent of organizations | The cybersecurity skills crisis has impacted 71 percent of organizations and left two-thirds of cybersecurity professionals saying that the job itself has become more difficult over the past two years.
New research carried out by Enterprise... |
24.08.2023 | Three Ways To Manage Security Risks In Cloud-Native Applications | CEO and cofounder of Ermetic, a provider of public cloud security technology. |
09.08.2023 | Hammerspace CEO David Flynn to Host “State of Data Architectures in the Next Data Cycle” Event | Hammerspace - Orchestrating the Next Data Cycle for Enterprises
SAN MATEO, Calif. (PRWEB) August 09, 2023
Hammerspace, the company orchestrating the Next Data Cycle for enterprises, today announced Founder and Chief Executive Officer David ... |
07.07.2023 | 10 ways SecOps can strengthen cybersecurity with ChatGPT | Join top executives in San Francisco on July 11-12 and learn how business leaders are getting ahead of the generative AI revolution. Learn More
Security operations teams are seeing first-hand how fast attackers re-invent their attack strate... |
21.06.2023 | Cutting Cloud Costs: How IP Leasing Services Can Help Businesses Save | IP leasing offers a flexible and cost-effective solution for reducing cloud costs, whether it's businesses transitioning to digital operations, ISPs experiencing increased demand, or cloud service providers optimizing their infrastructure.
... |
19.05.2023 | Email is seen as the enterprise channel most vulnerable to attacks | The majority of organizations use six or more communication tools, across channels, with email being the single channel seen as the most vulnerable to attacks.
Of those responding to a new survey by Enterprise Strategy Group (ESG) and Armor... |
17.05.2023 | Enterprise Strategy Group Launches New International Product Offerings, Expanding into Europe, Middle East, and Africa (EMEA) and Asia Pacific (APAC) | TechTarget’s Enterprise Strategy Group, a leading IT analyst, research, and strategy firm, today announced its expansion into Europe, Middle East, and Africa (EMEA) and Asia Pacific (APAC). Enterprise Strategy Group has been helping technol... |
01.05.2023 | Report shows 92% of orgs experienced an API security incident last year | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Today, application security provider Data Theorem, announced the release of a new report in partne... |
13.04.2023 | Strong data protection can deliver economic benefits for enterprises | As enterprises move to cloud and hybrid models they face a range of new challenges in protecting their data.
A new study from Enterprise Strategy Group (ESG), released by Commvault and Microsoft, finds that 53 percent of respondents say the... |
13.04.2023 | Otterize raises $11.5M to help developers securely connect software services | Tomer Greenwald, Uri Sarid and Ori Shoshan, software developers by trade, found themselves building and configuring software authentication and authorization mechanisms repeatedly — each time with a different tech stack. Frustrated with the... |
03.04.2023 | Zero trust for web and application access: Developing a cybersecurity playbook for BYOD and beyond | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
One compromised browser session on a remote device connected to an organization’s network can shut... |
16.03.2023 | Enterprise Strategy Group Expands Market Coverage with New Business Applications & End-user Computing Analyst Team | TechTarget’s Enterprise Strategy Group today announced that it has launched a new Business Applications and End-user Computing (EUC) practice. As revealed in Enterprise Strategy Group's annual technology spending intentions research, CX is ... |
10.02.2023 | Why threat modeling can reduce your cybersecurity risk | Check out all the on-demand sessions from the Intelligent Security Summit here.
Each new multi-million-dollar breach or devious, sophisticated hack triggers countless organizations to gravitate toward new cybersecurity tools they think are ... |
19.01.2023 | A brief history of 5G | Image: Sikov/Adobe Stock
When the fifth generation of mobile communications known as 5G debuted in 2019, it was like catching the proverbial lightning in the bottle. The technology promised faster data speeds, better response times, higher ... |
06.01.2023 | Why cloud observability will be critical in 2023 | To further strengthen our commitment to providing industry-leading coverage of data technology, VentureBeat is excited to welcome Andrew Brust and as a regular contributor. Watch for his articles in the Data Pipeline.
The cloud is an ever-g... |
09.12.2022 | Why deepfake phishing is a disaster waiting to happen | Check out all the on-demand sessions from the Intelligent Security Summit here.
Everything isn’t always as it seems. As artificial intelligence (AI) technology has advanced, individuals have exploited it to distort reality. They’ve created ... |
07.12.2022 | Enterprise Strategy Group Research Finds Ongoing Digital Transformation Investments Will Mitigate the Impact of Technology Spending Caution in 2023 | TechTarget’s Enterprise Strategy Group, a leading IT analyst, research, and strategy firm, today announced availability of its 15th annual technology spending intentions research. “These findings indicate that even in times of uncertainty, ... |
06.10.2022 | Research from Enterprise Strategy Group Reveals IT Supplier Environmental, Social, and Governance (ESG) Program Status Is a New and Important Evaluation Factor for Buyers | Enterprise Strategy Group, a division of TechTarget, Inc., today announced new research into the relevance of environmental, social, and governance (ESG) programs in IT purchase decisions. IT suppliers have little time left to work on the i... |
16.08.2022 | DevSecOps delivers significant results but take up remains low | Only 22 percent of organizations have developed a formal DevSecOps strategy integrating security into software development lifecycle processes, according to a new report.
But the study from Mezmo shows an overwhelming percentage of those th... |
29.06.2022 | Top 20 cybersecurity interview questions to know in 2022 | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Table of contents
Cybersecurity jobs: A seller’s ... |
15.06.2022 | Enterprise Strategy Group Research Finds Businesses Have Mission-critical Gaps in the Fight Against Ransomware | ESG today announced new research into ransomware preparedness revealing alarming facts about the frequency and pervasiveness of successful ransomware attacks. According the ESG research, 79% of organizations have experienced at least one at... |
17.05.2022 | State of observability 2022 report: More enterprises are adopting observability tools | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Being efficient at work – whether as an individua... |
19.04.2022 | Good backups are critical to recovering from ransomware | A new report from Enterprise Strategy Group (ESG), sponsored by Keepit, shows that granular and air-gapped backup are critical to data recovery when businesses are hit by ransomware.
Of more than 600 respondents to the survey, 79 percent ha... |
10.04.2022 | Healthcare Leads in Data Innovation, Lags in Talent Retention | What You Should Know:
Splunk Inc. helps organizations around the world turn data into doing. Splunk technology is designed to investigate, monitor, analyze and act on data at any scale. The global survey was conducted from May through June ... |
26.02.2022 | The role of threat intelligence platforms in implementing extended detection and response | As the new year continues to unfold, cybersecurity budget holders will be deep into the process of identifying where to allocate funds to best enhance protection against cyberthreats. The good news is that budgets are rising, with industry ... |
23.02.2022 | Enterprise Strategy Group Research Finds Businesses Are at Significant Risk of Cybersecurity Breaches Due to Immature Security Hygiene and Posture Management Practices | ESG today announced new research into security hygiene and posture management – a foundational part of a strong security program. While security hygiene and posture management is critical, this research reveals that organizations don’t have... |
24.01.2022 | The Great Resignation: 4 Ways Cybersecurity Can Win | Pandemics change everything.
In the Middle Ages, the Black Death killed half of Europe's population. It also killed off the feudal system of landowning lords exploiting laborer serfs. Rampant death caused an extreme labor shortage and force... |
06.01.2022 | Almost half of IT security leaders believe they won't be breached | A new study shows 47 percent of security leaders do not believe they will be breached despite the increasing sophistication and frequency of attacks.
The survey of 1,000 IT and security professionals across eight countries, conducted by The... |
07.12.2021 | Enterprise Strategy Group Bolsters Analyst Team with Cloud Experts | ESG today announced the addition of new analysts to fortify its coverage of key technology markets. These additions to our team are great news for the IT professionals and vendors who look to ESG for data-driven perspectives in markets.
NEW... |
30.11.2021 | New Enterprise Strategy Group Research Finds Corporate Technology Spending Boom to Continue as Firms Invest More in Cybersecurity, Artificial Intelligence, and Cloud | ESG today released its 14th annual technology spending intentions survey analyzing private- and public-sector technology spending expectations for the coming year. Nearly 7 out of 10 technology decision-makers (69%) report that their organi... |
23.11.2021 | Enterprise Strategy Group Research Finds Organizations Must Adjust to the Reality that the Internet Is the New Corporate Network | Enterprise Strategy Group (ESG) today announced new research into network modernization efforts among businesses. The highly distributed nature of modern IT environments is creating more network complexity and placing more reliance on the n... |
23.11.2021 | Enterprise Strategy Group Research Finds Organizations Are Using Data in Active Archives to Boost Business Results | Enterprise Strategy Group (ESG), a leading IT analyst, research, and strategy firm, and a division of TechTarget, Inc., today announced new research into the transformational use of active archives. In the fast-paced, highly competitive mar... |
22.11.2021 | Rapid7 : The End of the Cybersecurity Skills Crisis (Maybe?) | In just 4 years, you can learn to be fluent in Mandarin.
In 2 years, NASA can get you through astronaut training.
But the cybersecurity skills gap? It's dire and dead-stuck in its fifth straight year of zero progress.
Globally, 3.5 million ... |
18.11.2021 | So you think you're following best security practice? Think again | A new report shows that 86 percent of organizations believe they follow best practices for security hygiene and posture management, though they may not actually be doing so.
The report, created for asset management and governance company Ju... |
16.11.2021 | Lag between detection and investigation of cloud attacks harms businesses | New research carried out by ESG for digital forensics platform Cado Security finds that 89 percent of companies have experienced a negative outcome in the time between detection and investigation of a cyber-attack on their cloud environment... |
03.08.2021 | Enterprise Strategy Group Research Finds Organizations Embracing Embedded Analytics Maximize Investments and Outcompete Rival Businesses | Enterprise Strategy Group today announced new research into modern data analytics use. Organizations without embedded analytics are getting left in the dust by competitors who use the technology pervasively. The pressure is on.
MILFORD, Mas... |
28.07.2021 | Cybersecurity skills crisis impacts more than half of organizations | The cybersecurity skills crisis has impacted 57 percent of organizations, according to the fifth annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and industry analyst firm Enterprise ... |
29.06.2021 | Assessing Cyber Resiliency: A Conversation with ESG's Christophe Bertrand | Protecting your organization starts with protecting your data against ransomware and other sophisticated cyber threats. Regardless of the industry, geography or size, every organization, company, government and even our individual lives, ar... |
24.06.2021 | New Enterprise Strategy Group Research Finds Cloud-based Data Protection Is the New Norm | Enterprise Strategy Group today released new research examining how IT organizations utilize cloud services as part of their data protection strategy. Cost-effectiveness, as well as advanced security features, top the list of key capabiliti... |
15.06.2021 | Observability investments begin to pay off, Splunk says | Elevate your enterprise data technology and strategy at Transform 2021.
A survey of 525 organizations that have embraced some level of observability suggests IT organizations’ early investments are starting to pay off. In fact, organization... |
15.06.2021 | Observability investments begin to pay off, Splunk says | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
A survey of 525 organizations that have embraced ... |
27.05.2021 | New Enterprise Strategy Group Research Finds Businesses Have Embraced the Value of Hosted Desktops for Remote Work | Enterprise Strategy Group (ESG) recently released new research into digital workspace strategies for the remote worker world. The outbreak of the pandemic showed a lot of us what the important things are in our personal lives, like health t... |
13.05.2021 | Enterprise Strategy Group to Present Zero Trust, XDR, and SASE Research Insights at RSA Conference 2021 | Enterprise Strategy Group (ESG) will present research findings on seminal cybersecurity topics at several sessions next week at RSA Conference 2021. These sessions aim to bring clarity to critical and rapidly changing cybersecurity areas, h... |
27.04.2021 | Enterprise Strategy Group Study Finds Strong Interest in Zero-trust Strategies and New Funding to Support These Initiatives | ESG today released new research that found, despite the challenges posed by the pandemic, most organizations have either pressed forward as planned or accelerated their zero-trust initiatives. Zero-trust concepts have never been more applic... |
27.04.2021 | Lack of asset visibility leads to more security incidents | Widening visibility gaps in cloud infrastructure, end-user devices and Internet of Things (IoT) device initiatives are leading to increased risk and security incidents according to a study carried out by Enterprise Strategy Group (ESG) for ... |
20.04.2021 | ZSCALER, INC.
Zscaler : Advances Zero Trust Security for the Digital Business Disrupting Decades of Legacy IT Security and Networking Models | SAN JOSE, Calif., April 20, 2021 (GLOBE NEWSWIRE) -- Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced innovations for the Zscaler Zero Trust Exchange™ platform and new programs designed to secure digital businesses.... |
08.04.2021 | Cybersecurity Industry Expert Carla Roncato Joins Enterprise Strategy Group | Enterprise Strategy Group (ESG) today announced the addition of Carla Roncato, who joins the firm as senior analyst in the organization’s cybersecurity practice. Identity has been overshadowed by traditional security coverage for too long a... |
19.01.2021 | New Enterprise Strategy Group Research Finds Technology Spending Will Rebound in 2021 as Firms Retool Business Processes, Protect Against Mounting Cybersecurity Threats | Enterprise Strategy Group (ESG), a leading technology analyst, research, and strategy firm, today released its 13th annual technology spending intentions survey. This is truly a fascinating time in technology and business history. Companies... |
20.10.2020 | Play Ball! LA Dodgers sign hyper-converged infrastructure to build a winning off-field game | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
This article is part of the Technology Insight series, made possible with funding from Intel.
As the 2020 Major League Baseball season ... |
20.10.2020 | Play Ball! LA Dodgers sign hyper-converged infrastructure to build a winning off-field game | This article is part of the Technology Insight series, made possible with funding from Intel.
As the 2020 Major League Baseball season draws to a close with the Los Angeles Dodgers and Tampa Bay Rays squaring off in the World Series, nothin... |
02.10.2020 | Businesses face identity and security challenges due to COVID-19 | The rise of remote working and the growing complexity of securely managing multiple types of end user devices has seen 77 percent of businesses intending to increase spending on identity and access management solutions.
A study by ESG Resea... |
30.07.2020 | Cybersecurity skills crisis is affecting 70 percent of organizations | We've been talking about the cybersecurity skills gap for more than a decade, but new research from the Information Systems Security Association (ISSA) and independent industry analyst firm Enterprise Strategy Group (ESG) reveals it's not g... |
23.07.2020 | Cloud-Native Data Protection Provider Trilio Achieves 300%+ Growth in 1H 2020 | FRAMINGHAM, Mass. — July 23, 2020 — Trilio, a leading provider of data protection for cloud-native environments, today announced strong business growth in the first half of 2020 despite the economic slowdown spurred by the COVID-19 pandemic... |
15.07.2020 | COVID-19 is “the digital accelerant of the decade,” forcing businesses to adapt quickly | Image: asiandelight, Getty Images/iStockphoto Must-read CXO coverage
Power BI vs. Tableau
ATS: The best applicant tracking systems
Apple, Microsoft top list of most ethical tech companies
How to hire an IoT Architect (TechRepublic Premium)
... |
21.05.2020 | Securing the cloud for healthcare | The Cloud is a $200 billion business that analyst firm IDC expects to nearly double in valuation by 2022. It enables collaborative productivity apps, on-demand entertainment, and promises much needed advances in telemedicine. But all this p... |
21.05.2020 | Game On: How Gamification Pragmatically Impacts The Future Of Cybersecurity Training | Photo:Getty |
10.03.2020 | IT teams struggle with asset visibility and management | Even though there are many different tools now available, IT and security teams are increasingly losing touch with their asset base.
A new study from Enterprise Strategy Group, commissioned by asset management platform Axonius reveals that ... |
08.01.2020 | 5 reasons why supply chain security must be on your agenda | Presented by Intel
How do you know that the critical parts inside your servers and devices are not poor quality, ready to fail at a crucial moment? Or, worse, hide malware with nefarious intentions like key-stroke logging, data theft, or sa... |
12.12.2019 | How to keep your employees happy: Give them good tech | https://d1rytvr7gmk1sx.cloudfront.net/wp-content/uploads/2017/05/05-02-why-people-quit-tech-jobs.MP4
A report from IT research firm Enterprise Strategy Group examines how technology affects the work professionals do, what it does to their w... |
29.11.2019 | 63% Of Executives Say AI Leads To Increased Revenues And 44% Report Reduced Costs | Recent surveys, studies, forecasts and other quantitative assessments of the progress of AI found that |
10.11.2019 | As cloud security improves, a weak link emerges: people
To err is human
Perception shift
Eager coders
What to do
Since you’re here …
Send us a News Tip
EXTRACT THE SIGNAL FROM THE NOISE
Cookie... | Last summer Capital One Financial Corp. was the victim of a massive data breach encompassing more than 100 million credit card applications and revealing 140,000 Social Security numbers. The cause: a misconfigured web application firewall, ... |
07.11.2019 | AI Stats News: Humans Plus AI 20X More Effective In Cybersecurity Defense Than Traditional Methods | Recent surveys, studies, forecasts and other quantitative assessments of the progress of AI highlighted the role of augmented intelligence, combining human intelligence with artificial intelligence to produce better results in cybersecurity... |
26.08.2019 | How cloud-based training can help address the cybersecurity skills gap [Q&A] | It's widely acknowledged that there's a skills shortage in the cybersecurity field. Many businesses are looking to address this by training their own security talent, but this in itself can be a challenge.
We spoke to Zvi Guterman, founder ... |
26.06.2019 | Vectra introduces the industry's first network threat detection and response solution in Amazon Web Services | Vectra today announced that its Cognito platform now features Amazon Virtual Private Cloud (VPC) traffic mirroring and integration with the Amazon Web Services (AWS) Security Hub. Enterprises can now natively run the Cognito platform in AWS... |
28.03.2019 | Large enterprises face problems with unsecured applications | A new survey of more than 200 CISOs in the US and Canada finds that large enterprises typically operate 1,300 or more complex applications but only protect 60 percent of them, leaving more than 500 applications unprotected at a time where a... |
16.03.2019 | CISOs: You need to manage by ‘walking around’ | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Chief information security officers (CISOs) today... |
16.03.2019 | CISOs: You need to manage by ‘walking around’ | Chief information security officers (CISOs) today have replaced chief information officers (CIOs) as the most under-valued C-level executives. In fact, according to research from the Enterprise Strategy Group (ESG) and the Information Syste... |
28.08.2018 | Lacework raises $24 million for AI-based cloud security platform | Lacework wants to bring automation, speed, and scale to cloud security, and for that it has raised $24 million in a second round of funding.
Sutter Hill Ventures led the round, which Lacework will use to beef up its global sales and marketi... |
28.08.2018 | Lacework raises $24 million for AI-based cloud security platform | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Lacework wants to bring automation, speed, and sc... |
08.05.2018 | Younger generations lack understanding of cybersecurity careers | It's been accepted wisdom for some time that an injection of extra talent is needed to solve the cybersecurity skills shortage.
Further confirmation of this comes in the form of a report from ProtectWise looking at the survey responses of 5... |
28.02.2018 | TechVets launches to offer UK military veterans a route into cyber and startups | There’s a problem in the UK tech industry and it’s staring us in the face.
The tech industry is growing at twice the rate of the wider economy and now contributes around £97bn a year, up 30pc in five years.
And yet only 4% of military veter... |
11.11.2017 | Why cybersecurity workers are some of the hardest to retain | Cybersecurity workers are in high demand, and the security industry may face a shortage of close to two million qualified personnel by 2022. That’s concerning giving the increasing number of cyber attacks we’re witnessing. But what’s more c... |
11.11.2017 | Why cybersecurity workers are some of the hardest to retain | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Cybersecurity workers are in high demand, and the... |
26.10.2017 | 82 percent of security professionals worry about nation-state attacks | Nation-state attacks and hacktivists are among the biggest worries for IT security professionals according to a new study.
The report by AI security company Cylance and the Enterprise Strategy Group shows that 82 percent of respondents are ... |
25.10.2017 | Virtual reality could attract new talent to security careers | The cyber security industry continues to face a skills crisis, but a new study from security vendor ProtectWise and analyst ESG suggests that the adoption of new technologies could be instrumental in attracting new talent.
The survey of ove... |
10.05.2017 | IGEL Upgrades Universal Desktop™ UD5 and UD6 Thin Clients; Adds Support for Windows 10 IoT Enterprise | The high-performance endpoints combined with IGEL’s industry-leading software enable IT organisations to leverage Windows 10 IoT Enterprise to simplify the management of IoT-connected devices
Reading, UK. May 10th, 2017 – IGEL, a world lead... |
18.10.2016 | Network security is getting more difficult to implement | Network security operations are evolving and becoming more difficult to implement according to a new survey by Enterprise Strategy Group (ESG), sponsored by network visibility specialist Gigamon.
The complexity of network security operation... |
21.11.2014 | ESG Lab Achieves Impressive Testing Results for Enterprise-Ready VDI Solution Based on EMC VSPEX Proven Infrastructure and Brocade Networking | Bangalore, Karnataka, India
Brocade (NASDAQ: BRCD), the leader in data center fabric networking solutions, today announced impressive results based on testing performed by ESG Lab. The results validated a 3,500-virtualized desktop reference... |
23.01.2014 | Emulex Optimises Performance and Scalability for Virtualisation and the Cloud with New Ethernet and Converged Network Adapters | New Adapters Increase Server Virtualisation Density, Connect Hybrid Clouds with Virtual Networks Fabrics, Enable SDN with Open APIs and Optimise Application Delivery
COSTA MESA, Calif, January 23, 2014 – Emulex Corporation (NYSE:ELX), a lea... |