Ian Barker

The need for change in combating ransomware and other threats [Q&A]

skull death security malware hack threat

The security landscape is one that is constantly changing and old-style signature-based detection systems are struggling to keep up.

But what are the main threats today and how can companies and individuals combat them? We spoke to Tomer Weingarten CEO of next-generation security specialist SentinelOne about ransomware and what the LinkedIn hack means for the future of password security.

Continue reading

Control of usage and costs is biggest challenge to public cloud

cloud costs

A new survey by cloud analytics company Cloud Cruiser and Dimensional Research shows that the top challenge with public cloud consumption is the ability to proactively manage usage and costs across the business.

The survey among almost 200 professionals who attended the Amazon Web Services (AWS) Global Summit in April also reveals that nearly one third of organizations are doing nothing to track, manage and allocate cloud consumption costs.

Continue reading

Better online security or faster internet, which would you choose?

choose compass

Your answer probably depends on how old you are. According to a new survey 57 percent of Americans would take the better security. However, where millennials are concerned 54 percent would rather improve their internet speed.

This is among the findings of a new survey by adaptive access control company SecureAuth Corporation and Wakefield Research. Gender and education make a difference too, while men are split fairly evenly between personal online security (51 percent) and speed (49 percent) significantly more women care about online security (62 percent). When it comes to education, 63 percent of college graduates care about security, as against 47 percent of high school graduates.

Continue reading

Brazil a major cyber security risk ahead of Olympics

Brazil flag keyboard

There have been plenty of concerns in the news over Brazil's readiness to host this year's summer Olympics, ranging from the Zika virus and political unrest to poor ticket sales.

A new report from BitSight Technologies highlights cyber security concerns too with security performance of companies in Brazil among the worst in the developed nations, meaning business dealings in this region could come with serious risk.

Continue reading

Malwarebytes extends enterprise endpoint detection system to include Macs

Apple security

Although Macs have been relatively immune to malware, they have faced nuisance apps like adware and PUPs for years, and new threats are appearing, including ransomware like KeRanger. Experts believe it's only a matter of time before the next big attacks against Macs surface.

With more companies turning to Macs and a rising number of new threats, concern about the possibility of widespread Mac vulnerabilities is on the rise. Malware protection specialist Malwarebytes is responding to this by extending its Breach Remediation platform to cover Mac systems.

Continue reading

The container market is about more than just Docker

Container software box

When containers are mentioned, Docker is probably the system that comes to mind. But in fact the container market is much bigger than that with over 100 products that use containers to amplify the benefits of agile development for their users.

Of those, 20 come from public companies and over 70 from private companies, which collectively represent $1.7 billion in venture capital funding. 88 percent of enterprises say they're shifting to a DevOps strategy, and containers are changing the nature of DevOps and transforming infrastructure.

Continue reading

Ransomwhat? 43 percent don't know what ransomware is

ransomware_keyboard_button_dollar

A new report shows that 43 percent of consumers in the US and Canada don't know what ransomware is. A similar number (44 percent) say they don’t know what data or information could be stolen in a ransomware attack.

The study by Kaspersky Lab surveyed 4,000 US and 1,000 Canadian consumers aged over 16 and found that only 16 percent mentioned ransomware as a cyber threat they were worried about, compared to their concerns about viruses, spyware and Trojans.

Continue reading

People want safer alternatives to passwords and they want them now

password_security_hole

As the recent leak of LinkedIn data shows, passwords are an increasingly vulnerable and flawed way of securing systems.

A new survey from identity management specialist Gigya reveals that consumers are beginning to recognize this and that 52 percent would choose anything but a traditional username and password account registration when given the option.

Continue reading

Putting the 'twit' in Twitter? Will changes flood your feed with unwanted messages?

twitter_sticker

Over the decade since it launched, Twitter has evolved from simple 140 character text messages to incorporate photos, videos and more. It can also justifiably lay claim to introducing and popularizing the hashtag.

In an effort to keep the service up to date the company is rolling out some changes in the coming months. While some of these are useful, others are set to prove unpopular, especially for those who follow business accounts.

Continue reading

Druva releases pay-as-you-go disaster recovery

disaster recovery plan

Disaster recovery solutions have usually been a fixed cost for business, involving paying for a fixed amount of storage whether you actually used it or not.

Data protection specialist Druva is launching new usage-based pricing for its Phoenix public cloud solution for backup, archive and disaster recovery. There are no additional hardware or software costs and enterprises will now pay only for the actual storage they consume.

Continue reading

Brits are willing to compromise their online security to get fit for the beach

man beach summer

With the approach of summer, many people are looking for diet and fitness solutions to get themselves ready for the beach.

But research into the practices of 1,000 British internet users by Intel Security finds a willingness to compromise online security to achieve a dream body.

Continue reading

New healthcare platform addresses communications compliance challenges

Healthcare data

The healthcare and pharmaceutical industries are highly regulated and need to constantly keep up with changing demands and regulations.

California-based Actiance, specialists in communications compliance, analytics and archiving, has launched a new cloud-based platform aimed at the health sector which addresses new and existing regulatory retention, security and privacy requirements, while reducing the risk and expense of costly eDiscovery and compliance activities.

Continue reading

Medical devices targeted by cyber attacks

Medical data risk

Hacking and cyber attacks are no longer confined to computers. Thanks to the Internet of Things they affect a whole lot of other equipment too and that includes medical devices.

Application protection specialist Arxan has produced an infographic looking at the growing threat landscape surrounding connected medical devices.

Continue reading

How can enterprises streamline the migration of data? [Q&A]

files folders pc transfer move

Businesses are under increasing pressure to replace legacy storage with cloud and hybrid options in order to modernize their infrastructure and cut costs.

Migrating data presents a number of challenges and IT teams are turning to automation in order to address them. We spoke to Jonathan Huberman, CEO of specialist in the hybrid enterprise file sync and share market, Syncplicity, to find out more about how enterprises can move their data smoothly and make it available across a number of devices.

Continue reading

Brands fail to meet mobile communication expectations

mobile frustration error

Brands aren't doing enough to meet their customers' expectations for mobile communication, according to a new survey.

The study, by web convergence company tyntec and technology research specialist Ovum, of 1000 people in the US and Germany finds that customers prefer to interact with customer service agents using different communication channels depending on where they are in the transaction process, and that they expect service providers to be effective using mobile.

Continue reading

Ian's Latest Tweets

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.