Research Blogs

Work from home is attractive to some, but not all. Here are some tips to create a work strategy that offers flexibility to support different desires. In my recent client conversations, work from home (WFH) is the primary topic, along with if, or how, a return...

According to Nemertes' Cloud and Cybersecurity 2019-2020 Research Study, 2019 was the year the average enterprise for the first time found more than half its IT workloads running outside the data center. This ongoing shift of enterprise IT work into cloud environments -- whether SaaS,...

The ultimate end state of software-defined network security is what we at Nemertes Research call deep segmentation. The term refers to the ability to finely control what entities can see, who they communicate with and how they do this, end to end across the enterprise network. With...

There are no shortages of application options -- and, with them, technology costs -- in the contact center. But the key focus for any spending should be to improve the customer experience.There are a variety of contact center technology options, including contact center software, customer...

The coronavirus pandemic of 2020 has resulted in unprecedented changes in where and how people work.  Nemertes’ recent Visual Communications and Collaboration 2020-21 global study of more than 525 organizations found that 91% now support work-from-home, up from 63% prior to the pandemic.  Of the...

UC management needs have dramatically shifted as employees have moved from the office to the home, but core requirements remain.  To ensure availability and performance, as well as to measure utilization and business impact of UC investment, IT and business leaders must focus on the...

' IoT can be game-changing for organizations -- in more ways than one. In fact, organizations that successfully implemented IoT generated an average of $8.36 million in new revenue, $5 million in savings and 41.8% improvement in business process efficiency, according to our Nemertes Research IoT...

When the COVID-19 pandemic caused work-from-home orders around the world, IT leaders and their teams acquired mounting responsibility to ensure millions of home workers have the hardware, apps and secure, high-performance connectivity they need to do their jobs.But in order to do that effectively, CIOs...

In my previous post, I pointed out that the Twitter hack was just an example of a phishing scam--the same old scam that's been around since the dawn of the Internet. The basic flaw is gullible (if smart) humans trusting people they shouldn't, for stupid...

  "Water, water, every where, nor any drop to drink." This line from Samuel Taylor Coleridge's The Rime of the Ancient Mariner could just as easily apply to CIOs seeking to fill crucial spots in their IT organizations. The world may seem full of systems engineers, network specialists...

The big news tonight is that Twitter was hacked, and the accounts of various celebrities (Elon Musk, President Obama, Warren Buffett, Kanye West, and many others) sent out bogus requests for Bitcoin to their followers. As of right now the damage is $10 million and...

As described in Security Magazine, "In recognition of the growing convergence of cyber and traditional financial crimes, the U.S. Secret Service is formally merging its Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs) into a single unified network, which will be known...