article thumbnail

Does the Future of Work include Network as a Service (NaaS)?

CIO

The Future of Work and the Workplace is a 2023 Leesman survey report co-authored by HPE Aruba. The opportunity is timely for organizations to re-evaluate their network infrastructure as the shift occurs to address a new work paradigm. What is the future of work and the workplace? How must organizations adapt?

Network 254
article thumbnail

Making the shift from computation to cognition

CIO

Key challenges for AI innovation An eBook by Dell Technologies 2 reveals that the common barriers to entry for AI include 1) skills shortages in data science; 2) the increasing volume and complexities of data work; and 3) lack of processing power and skills that lead to delays in recognizing value from data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

The report, now in its 12th year and based on a survey of 2,712 risk management experts from 94 countries and territories, found that cyber risk also ranks first among small business worries. It’s the first time the same risk has topped this annual report from insurer Allianz Global Corporate & Specialty in consecutive years.

IoT 52
article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

This is deeply concerning at a time when the sudden, widespread embrace of work-from-home models in response to the pandemic is unleashing a plethora of end-user devices upon corporate networks. On a personal level, I find the survey results oddly validating: They confirm I’m not the only security leader worried about these trends.

article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

Cyber asset attack surface management (CAASM) solutions enable such organizations to identify all their assets — including those that are unauthorized and unmanaged — so they can be secured, managed or even removed from the enterprise network. 4: Implement network segmentation and microsegmentation.

article thumbnail

5 Steps for Becoming a Business-Aligned Cybersecurity Leader

Tenable

According to the study, which is based on a survey of 416 security and 425 business executives, just 54% of security leaders and 42% of business executives say their cybersecurity strategies are completely or closely aligned with business goals. Read the eBook, How to Become a Business-Aligned Security Leader.

Security 101
article thumbnail

How Public Sector Organizations Can Overcome Today’s Cyber Risks

Tenable

Commissioned by Tenable, the report was developed by Ponemon Institute, based on survey responses from 244 public sector infosec professionals from the United States, United Kingdom, Germany, Australia, Mexico and Japan. Only 23 percent of survey respondents report having sufficient visibility into their organization’s attack surface.