7.4 C
London
Friday, November 24, 2017
Home Tags New Order

Tag: New Order

The official word is the Model 3 will have 50kWh and 75kWh battery packs.
Hands-on: Every bit as weird and wonderful as its predecessor.

The shooting's good too.
72% see a digital business model as critical for success 15% view their organisations as nimble enough for full digital business 55% of apps are already in the cloud 88% cite cloud security as top priority, but only 32% cite significant progress 24% cite progress in creating scalable IT for digital business London, UK, August 30, 2016 – A recent survey sponsored by Unisys Corporation (NYSE: UIS) shows a strong commitment among executives to adopting a digital business model, with the cloud as the key enabler. However, the study also indicates that security concerns and tepid execution complicate the ability of the executives’ organisations to deliver on that commitment.Conducted for Unisys by IDG Research, the study polled 175 IT and business executives in the United States and Europe on the initiatives their organisations are undertaking to capitalise on the convergence of social, cloud, mobility, data analytics, internet of things (IoT) and security to drive new business models and engage, enable and support an increasingly tech-savvy workforce and customer base. Nearly three quarters (72 percent) of the respondents agree that it is critical or very important for an organisation to modify IT processes and resources to support a digital business model.

That represents an increase of 7 percentage points (up from 65 percent) from the response to a similar question in a Unisys-IDG study conducted in October 2015. The respondents clearly see the value of the cloud as the linchpin in an IT infrastructure that enables digital business: they report that more than half (55 percent) of their organisations’ applications are already deployed in a cloud environment. Moreover, the respondents indicate that their organisations are seeing positive results from initial cloud and digital initiatives, with improvements over the last 12 months in multiple areas, including data security (56 percent), user experience with applications and services (44 percent), IT efficiency (42 percent) and infrastructure performance/availability (41 percent). However, the executives show greater trepidation about their organisations’ ability to build quickly on that initial success.

For example, fewer than 1 in 5 (15 percent) of respondents indicate that their organisations currently have the “extremely flexible/nimble” attributes required to implement a digital model that enables them to capitalise fully on future business opportunities. Gap between Aspiration and Execution Could Impede ProgressThose insufficiently robust capabilities could pose a challenge in areas the respondents see as priorities over the next 12 months.

For example, 88 percent cite data security in the cloud as a top priority for competitiveness in the digital world while only 32 percent cite significant progress, creating a gap between aspiration and execution of 56 percentage points. Similarly, less than a third of respondents report significant progress in other areas key to digital business, from creating scalable/predictable IT environments (24 percent) to gaining a high level of visibility into IT environments (32 percent).

These shortfalls may slow progress at a time when it should be accelerating. On the plus side, the study shows that the respondents who consider their organisations extremely flexible and nimble, and more aggressive in adopting the cloud, more frequently report benefits from use of cloud apps than the aggregate population of respondents. Nearly three-fifths (59 percent) of respondents who identify their organisations as extremely nimble say they have seen improved data security (vs. 56 percent of those who do not), while 56 percent of the same group say they are seeing improved speed of business decision-making.

By contrast, only 18 percent of those who identified their organisations as less nimble have seen improved speed of decision-making.

There is also a significant disparity between those reporting improved user experience with applications and services. More than half (52 percent) of the extremely nimble group reports this benefit, while only 38 percent of the less nimble group can say the same. Respondents in extremely nimble organisations are also more likely to report improved customer experience through integration of infrastructure and applications with IoT. “This research points the way for organisations to become more nimble and successful in capitalising on present and future business challenges,” said Steve Nunn, vice president, Cloud and Infrastructure Services, Unisys. “Digital business is all about finding innovative ways to empower workers and customers.

The organisations that will prosper in the new order are those that most quickly become focused, proficient and flexible in integrating and securing the cloud, IoT and other key digital technologies to drive new levels of service.” Unisys provides a range of cloud-enabled enterprise computing and application services that help clients transform their IT architecture into a software-defined environment that enables digital business. Unisys Stealth® can provide an extra layer of security, using identity-based micro-segmentation techniques and encryption to help organisations mitigate attacks and hacker incidents by rendering devices, data and end users undetectable on networks. Learn more about the Unisys digital-business survey results. About the ResearchIDG Research surveyed 175 IT and business executives in U.S. (125) and Europe (17 UK, 17 Germany and 16 France) on Unisys behalf in June 2016.

The executives were affiliated with organisations of 1,000 employees and above.About UnisysUnisys is a global information technology company that works with many of the world's largest companies and government organisations to solve their most pressing IT and business challenges. Unisys specialises in providing integrated, leading-edge solutions to clients in government, financial services and commercial markets. With more than 20,000 employees serving clients around the world, Unisys offerings include cloud and infrastructure services, application services, security solutions, and high-end server technology.

For more information, visit www.unisys.com. Follow Unisys on Twitter and LinkedIn. ### Unisys and other Unisys products and services mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation.

Any other brand or product referenced herein is acknowledged to be a trademark or registered trademark of its respective holder.
Contacts:EMEANick Miles, Unisys EMEA, +44(0)7808 391543nick.miles@unisys.com Jay Jay Merrall-Wyre, Unisys, +44 (0) 20 3837 3729unisys@weareoctopusgroup.net
"This lawsuit has severely damaged our reputation," Bitcoin miner maker says.
The need to evolve IT security strategies to match new and emerging threats has come clearly to the fore in the past year as attackers become increasingly adept at evading traditional security controls and stealing data without being detected. Attackers have quickly adapted to new technologies, exploiting a range of security vulnerabilities in mobile, virtualised and cloud environments to target sensitive data, but social engineering mainly in the form of email phishing continues to be a key factor in most targeted attacks. The need to defend against disruption has also increased in the past year with a growing number of disruptive cyber attacks by hackers with political agendas, with denial of service attacks becoming more powerful and more common. The past year has seen a sharp shift in focus from traditional perimeter defences to more data-centric security controls, intelligence-based security systems and building a capability to detect, respond and mitigate the effects of data breaches once they occur. There has also been an increasing emphasis on the need for information security professionals to be aligned with the business to enable new opportunities and information sharing in secure ways. As a growing number of devices become internet enabled, security experts expect the so-called internet of things to present a whole new order of security challenges. Read our top 10 IT security stories of 2013 here: 1. White hat Wi-Fi hacking shows vulnerability of business data White hat hackers have shown that usernames, passwords, contact lists, details of e-commerce accounts and banking details can be sniffed easily from public Wi-Fi hotspots. To illustrate one of the many ways people can have their data compromised, the white hat hackers from First Base Technologies conducted two tests in partnership with security firm Trend Micro. 2. Digitally signed malware a fast-growing threat, say researchers Digitally signed malware is a fast-growing threat that is aimed at bypassing whitelisting and sandboxing security controls, say security researchers. “We found 1.2 million pieces of new signed malware in the last quarter alone,” said David Marcus, director of advanced research and threat intelligence at McAfee.

This is malware that is signed using legitimate digital certificates that have not been stolen or forged, but acquired from certificate authorities (CAs) or their sub-contractors, he said. 3. FBI warns of increased spear phishing attacks In July, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors. Spear phishing – a highly targeted phishing email – is one of the tools used by attackers to compromise endpoints and gain a foothold in the enterprise network.

According to the FBI, victims are selected because of their involvement in an industry or organisation the attackers wish to compromise. 4. SQLi has long been unsolved, but has that finally changed? The Open Web Application Security Project (Owasp) continues to rank SQL injection attacks at the top of its 10 most critical web application risks. But what is an SQL injection (SQLi) attack, why are they important, and why have they remained unsolved more than 15 years since they first appeared – and has that changed?  5. RSA says security needs to change, but what does that mean? RSA executive chairman Art Coviello ended his opening keynote speech at RSA Europe 2013 with a call to the IT security industry to show the same spirit as Europe in setting up a common market after the Second World War. But what exactly does he have in mind? 6. Security finally able to enable business, says Voltage New security technologies are finally making it easier for security to enable the business and drive value, according to Dave Anderson, senior director at Voltage Security. Many of the largest organisations in the world are beginning to use information security as a strategic advantage and to re-establish the value of data. “Although we have been talking about this for years, it has become much easier to achieve in the past year to two years,” he told Computer Weekly. 7. Security incident response below par at most firms, says Guidance Software Most firms are not as prepared as they should be for responding to cyber attacks, says e-discovery firm Guidance Software. But with sensible reviews of processes and communications strategies, up to 70% of firms could put themselves on a much better footing, said Nick Pollard, the firm’s senior director of professional services. 8. DDoS attacks more than treble in the past year, report reveals The number of distributed denial of service (DDoS) attacks monitored at over 20Gbps this year is more than three times greater than for the whole of 2012, according Arbor Networks. Despite the business risks of DDoS attacks, a survey by communications firm Neustar, published in July, found that 20% of UK respondents admitted that their companies have no DDoS protection in place. 9. NYT hacktivist attack shows need for registry locking The Syrian hacktivist attack on the New York Times website highlights urgent need for registry locking, says communications and analysis firm Neustar.

The site was unavailable after the Syrian Electronic Army (SEA) that supports Syrian president Bashar al-Assad was able to access the domain name system (DNS) settings for the site.

The SEA breached the NYT’s domain name registrar Melbourne IT and changed the DNS record to point to systems in Syria and Russia. 10. Internet of things to pose 'huge security and privacy risks' The internet of things will pose enormous security and privacy challenges, a CW500 Club meeting heard. By 2020, trillions of sensors will be feeding data across the internet, recording everything from people’s movements to what they have just bought. Such data may prove invaluable for city planning or alerting consumers to special offers on their favourite products in a nearby shop, but it also poses unprecedented risks to individuals' privacy and security, a meeting of senior IT leaders heard. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners.

If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com