Ian Barker

The rising importance of big data to big business

Big data

Analysis of large volumes of information is increasingly used by businesses to gain an advantage. A new infographic produced by big data specialist Datameer looks at how it’s being used to gain a competitive edge.

Among the highlights are that the global Hadoop Market is projected to be worth $50.2 billion by the year 2020, a huge increase from the $1.5 billion it was worth in 2012.

Continue reading

Cloud-based software is a major revenue source for service providers

cloud money dollars

Communication service providers (CSPs) have spent the last few years investing heavily in cloud software provision to expand their business.

A new report by Israel-based Allot Communications shows that this is paying off as software as a service is now a major revenue source for CSPs.

Continue reading

Personalized marketing is the key to consumer's wallets

Personalized mail

Sending out generic marketing emails and scatter-gun coupon offers is no longer enough to attract the attention of consumers and can in fact have the opposite effect.

Predictive marketing company AgilOne has released the results of a survey which shows that online shoppers appreciate personalized communication -- as long as it's done right.

Continue reading

The security challenge of business mobile devices

photo by Slavoljub Pantelic, Shutterstock

The trend towards mobile devices and BYOD is great for productivity but it creates new challenges in terms of keeping information secure.

Identity and access management specialist Ping Identity has produced an infographic looking at the vulnerabilities introduced by letting employees use mobile devices.

Continue reading

XSS vulnerabilities open the door to drive-by downloads

Web script

Cross-site scripting (XSS) vulnerabilities allow attackers to inject script into web pages in order to infect client computers.

Security company High-Tech Bridge has released a report revealing that 95 percent of XSS vulnerabilities can be used to perform sophisticated drive-by-download attacks, which infect users who open harmless-looking URLs that they trust. More worrying is that 90 percent of vulnerabilities can be exploited in such a way that even advanced users and IT professionals won't suspect anything. The structure and architecture of more than 70 percent of web applications allows the creation of a sophisticated XSS exploit that can perform several fully-automated actions, ultimately giving full administrative access to the attacker. This access can then be used by hackers to compromise the entire website and even the web server.

Continue reading

New venture aims to completely rethink enterprise security

business-security

Up to now cyber security has generally taken a defensive approach to protecting data and intellectual property.

That’s set to change as a team of industry experts has got together to create a system that's aimed at dramatically improving the reliability and security of enterprise data and applications running in both cloud and conventional environments.

Continue reading

Splice Machine reduces the cost and complexity of building database applications

Database design

Databases are important to enterprises of all sizes, but building applications to exploit data effectively can be time consuming and expensive.

Now Splice Machine, maker of the only Hadoop RDBMS (relational database management system), is making its product publicly available for the first time. It will allow database architects and app developers to build real-time, scalable applications without the burden or cost of a traditional RDBMS.

Continue reading

Celebrating 60 years of software

birthday cake balloons

There's an old computing joke that says the difference between software and hardware is that hardware is the bit you can kick.

To celebrate software's 60th birthday business package selection specialist Capterra has produced an infographic charting the history of the bit you can't kick. It'll provide a trip down memory lane for anyone involved in computing.

Continue reading

Build your own 3D printer in 90 weekly parts

3D Printer_4834_v04

We've all seen those adverts for partworks allowing you to build a scale model of the Titanic at a cost not far off that of raising the real thing.

Now though UK publisher Eaglemoss Collections is producing a partwork that allows you to produce something a bit more useful. In 90 weekly parts it lets you make your own working 3D printer.

Continue reading

DGA malware evolves to get past security solutions

Malware spy

Malware developers are constantly shifting the goal posts in order to evade detection mechanisms. Part of this involves changing the domain names used to communicate with command and control servers and spread infections.

The latest trick identified by security company Seculert is the increasing use of Domain Generating Algorithms (DGAs).

Continue reading

DDoS attacks fall as defenses improve

DDoS attack

New research from DDoS protection specialist Black Lotus shows that cyber attack incidents have continued to decline throughout this year.

There were 201,721 incidents in the third quarter of this year (down from 462,621 in Q1 2014 and 276,447 in Q2). This can be attributed to the security industry's increased knowledge and filtering against NTP DrDoS types of attacks, as well as more proactive activity to stop malicious attacks before or as soon as they're detected.

Continue reading

One third of retail security breaches come from third-party vulnerabilities

cloud commerce shopping

The past year has seen a number of high profile security breaches involving retail businesses and there’s no sign of the trend slowing down.

Security ratings company BitSight Technologies has released some new research looking at the performance of 300 major US retailers over the past 12 months. It shows that 75 percent of retailers that suffered a data breach have improved their security effectiveness.

Continue reading

When to find the best cyber shopping deals

Mobile shopping

'Tis the season to go and spend lots of money, as we approach Thanksgiving (in the US), Christmas, Black Friday, Cyber Monday and other shopping opportunities.

With November and December sales expected to top $616 billion dollars, payment processing specialist Merchant Warehouse has produced an infographic looking at what to expect from the holiday shopping season.

Continue reading

87 percent of the top 100 paid iOS apps available as hacked versions

mobile security

According to the third annual State of Mobile App Security report from application protection company Arxan Technologies, 87 percent of the top 100 paid iOS apps have been hacked.

Don’t feel smug if you're an Android user though as the report reveals 97 percent of the top 100 paid Android apps have been too. But whilst the Android figure is in line with previous years, the iOS percentage represents a jump from 2013 when 56 percent were found to have been hacked.

Continue reading

Uncovering the real value of online reviews

customer service online review

We've become used to the fact that for pretty much any product or service we want to buy there will be reviews available online to help us with our purchase decision.

These reviews matter to businesses as they can have an impact on sales. Open review community Trustpilot has carried out a survey looking at how online reviews can influence the bottom line.

Continue reading

Ian's Latest Tweets

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.