BetaNews Staff

Companies turn to communities to bolster in-house test automation

Under increasing pressure to release new digital services, apps, and features faster, many companies are resorting to automating their entire quality assurance process. While this approach is by no means new, not many companies can claim that their test automation keeps pace with the rate of development of new features. This is because software testing by nature is reactive. Despite development methodologies like test-driven development (TDD), testing still hinges on the readiness of products and components. This has made the life of automation engineers quite difficult. Often pressed for time, components are often only ready towards the end of the sprint.

In-house engineers have become so overwhelmed that organizations are turning to a community-based model to access qualified test automation engineers. Fully qualified professionals can quickly supplement the work of in-house teams to ensure that releases stay on track. It is a way of ensuring quality is assured at speed that the market demands.

Continue reading

Five ways AI can boost your data backups

In the event of a data emergency -- say, a cyber attack or a natural disaster shutting down a data center -- no organization wants to worry about whether they have secure, up-to-date backups, and whether they can be easily recovered.

But without the help of artificial intelligence (AI) or machine learning (ML), fewer organizations are able to protect their backups against attacks, meet the necessary backup workload, or meet the defined service level agreements (SLAs) for the availability of information, applications, and infrastructures (or do so quickly and recover efficiently). 

Continue reading

Through green IT, businesses can do their part

Green-IT

Whether at an individual level or enterprise scale, we now know that it’s important for us all to make an effort when it comes to protecting our planet. When we think of effective sustainability measures, we likely think of practices like recycling, reducing plastic consumption, and minimizing food waste.

One potentially overlooked area for sustainability improvements is the world of technology -- which, as we know, continues to expand and advance at a breathtaking rate. In the United States alone, data centers are responsible for 0.3 percent of our planet’s carbon dioxide emissions, a bigger carbon footprint than some countries. While there do exist programs for responsible recycling of technology materials like old laptops and dead batteries, there are still far too many of these items taking up valuable space in landfills.

Continue reading

Security vendor consolidation or best of breed? Why you must do both

Trends in cybersecurity (like many areas of technology and life) tend to make pendulum-like swings over time. One such shifting debate is around security tool philosophy: is it best to use an array of best-in-class tools or consolidate to a single, “do it all” security platform?

I argue that it is essential to planfully and strategically implement a hybrid approach. By combining some best-of-class tools with integrated platforms, you can eliminate the chaos of countless single tools and embrace the advanced benefits of today’s platforms, while still having some high-value, niche solutions to provide the necessary layers of protection for the security armor. It’s important to avoid dependence on a single vendor to also avoid implementing that vendor’s weaknesses/blind spots across the enterprise; yet these solutions offer many advantages.

Continue reading

Shielding the lifelines: Protecting energy and infrastructure from cyber threats

The energy and infrastructure sectors serve as the backbone of global stability and economic health, underpinning nearly all facets of modern society. As such, the integrity and reliability of these systems are paramount, and failure to maintain their uptime could lead to unprecedented disruptions in daily life. This reality underscores the pressing need to safeguard these sectors from evolving cybersecurity threats.

However, the very importance of energy and infrastructure makes them prime targets for cybercriminals. The surge in sophisticated email-based attacks, such as business email compromise (BEC) and vendor email compromise (VEC), poses a significant risk. These cyber tactics, often characterized by deceptive social engineering and the absence of traditional threat indicators, allow attackers to bypass conventional security measures easily. Understanding these attacks is the first step towards developing robust defenses against them.

Continue reading

Microsoft is great, but not enough for email security

Microsoft-Email

Microsoft 365 is the default software in SMEs, and understandably. The software offers a comprehensive set of productivity tools; flexible, scalable, and affordable licensing options, and compliance and security capabilities. However, given the ever-growing and persistent threat of cyberattacks, for email security, the standard security safeguards offered are insufficient.

Analysis of over 1 billion emails worldwide shows that emails are the preferred vehicle of cybercriminals. Email-delivered malware remains a favorite, increasing by 276 percent between January and December of last year. Additionally, attachments are growing as a threat. In Q4 of 2023, EML attachments increased 10-fold. Criminals are sending malicious payloads via EML files because they get overlooked when attached to the actual phishing email, which comes out clean.

Continue reading

World Backup Day -- We need to change the name

It remains essential to make copies of the most important data, World Backup Day has rightly been calling for this for years. But today the biggest risk to our data isn’t the traditional business continuity and disaster recovery scenarios for which World Backup Day was originally envisioned to cater for. The biggest threat to data today is destructive cyber attacks in the form of ransomware and wipers.

Tackling these threats by simply making copies and recovering the data after an incident is not enough, instead we need a World Resilience Day, where cyber incidents are investigated, the threats mitigated and systems hardened before being recovered to prevent recurrence and further impact.

Continue reading

Why deploying infrastructure without backup is always a risky gamble

Risk dial

In today's digital landscape, where data is omnipresent across various platforms and devices, maintaining efficient backup processes has become increasingly critical. Yet, despite the inherent risks, a surprising number of organizations continue to deploy their infrastructure without adequate backup measures in place.

According to a poll conducted among IT professionals, only a mere 25 percent of them adhere to industry best practices concerning data backup, creating potentially dangerous data gaps in production and employee risk management. Initially enticed by the allure of cost-saving, many companies overlook the necessity of investing in backup solutions, only to face dire consequences in the long run.

Continue reading

Beyond monitoring: How observability fuels security, sustainability and employee satisfaction

As cloud-based networks, mobility and the rise of hybrid work have spiked ongoing CIOs’ interest in observability, companies are forced to consider how observability factors into their daily systems and routines. To understand what’s happening between their applications, devices, and infrastructure – and how these affect employees -- companies must consider how monitoring and observability go hand in hand to improve their IT operations.

As any good CIO knows, observability is not just about where something is happening but why it’s happening, which helps them resolve network issues. By doing this, companies can better maintain a seamless digital experience that assists in some of their most critical initiatives, namely in heightening security, lowering their carbon footprint and improving overall employee morale.  

Continue reading

AI-powered tools: Boosting efficiency in content creation for marketers and creators

Artificial-intelligence

As the year draws to a close, it is of great value to reflect upon the last 12 months, particularly in assessing what has proven effective in light of newly introduced tools like generative AI-powered solutions. Gen AI has been a prominent theme this year, and organizations across industries are actively exploring its potential. Numerous companies are not only using popular gen AI tools, but also many are creating their own custom gen AI tools. In fact, the latest reports suggest that the gen AI market is poised for remarkable growth, with projections indicating it could reach an astounding $1.3 trillion by 2032.

McKinsey's findings reveal that commercial leaders are allocating more than 20 percent of digital budgets to gen AI, underscoring their pioneering role in pushing for adoption as a tool for company-wide implementation. This push can be good news for marketing teams. Marketers in particular find themselves at the threshold of transformative possibilities with AI tools for content creation. These AI-powered solutions offer the promise of streamlining content creation, making it faster and more precise. Marketers can harness the capabilities of AI to generate compelling visuals, craft persuasive messaging, and tailor content to specific audiences with unprecedented precision. Let’s dive into specific areas where gen AI has benefited the role of marketers and creatives.

Continue reading

Preparing for potential regulations around AI in electronic bill payment and presentment

The speed with which enterprise-level artificial intelligence has moved from the realm of theoretical -- if not outright science fiction -- to a widely adopted business tool has been nothing short of astonishing. The mad dash to find and implement applications for new, AI-based solutions is reminiscent of the rapid ascension of cloud technology in both fervor and consistency: the race to the cutting edge is taking place across industries.

Where sectors differ is in the level of caution they’re bound by their respective norms and requirements to apply in the process. While those in all industries ought to approach new technologies and tools with healthy prudence, in my personal opinion (and I am not an attorney), those of us in the electronic bill payment and presentment (EBPP) space must additionally consider the regulations that govern individuals’ privacy and the security of their data when it comes to something as private as their finances.

Continue reading

Embracing cloud repatriation: Strategies for successful workload migration

A recent study by Citrix revealed that 25 percent of UK organizations have chosen to migrate more than half of their cloud-based workloads back to on-premises infrastructures. This phenomenon, known as cloud repatriation, is gathering significant momentum and forcing enterprises to re-evaluate their cloud strategies.

While the cloud once promised cost savings, scalability, and flexibility, many organizations have found themselves grappling with unforeseen expenses, security concerns, performance issues, compatibility problems, and service downtime.

Continue reading

Five questions to ask before you choose a cloud provider

The cloud landscape has never been more complex. Research reveals that the majority of EMEA IT decision makers (ITDMs) have hybrid cloud strategies (68 Percent) and even more (72 Percent) have relationships with multiple public cloud providers (72 Percent). Every provider offers different services each with their own pros and cons, and this complexity can be challenging to manage without the right underlying data architecture.

Given the cost, compliance and business risk implications of cloud, due diligence is increasingly important. But for organizations to work out what they need from their cloud service providers (CSPs), they must understand their own data first.

Continue reading

Zero Trust: Moving beyond the chewy centre of cybersecurity

Zero-Trust

As modern technology becomes increasingly complex, so does the task of securing it. Adding to the complexity is the proliferation of decentralised technology such as cloud adoption and IoT (Internet of Things), and the move to remote working which have changed how cybersecurity experts craft the defences for their systems.

 In simpler days, IT systems were comparatively easy to ring-fence, as there was a solidly defined corporate security perimeter, or “trust boundary.” This formed the basis of the classic, trust-based security strategy, where any user inside the boundary was implicitly trusted by default, and anyone outside the boundary was denied access. Being connected to the private network was the only verifiable credential needed to access the system and all its data.

Continue reading

Harnessing the value of data with data monetization

dollar keyboard

Businesses around the globe are using new technologies to change the world. But this wouldn’t be possible without the use of sensitive data such as Personal Identifiable Information (PII) and Protected Health Information (PHI) to drive advancements in personalization and sophistication. However, if companies are using data that typically is associated with medical records and insurance claims, this bodes the question, is personal data secure?

It is possible to balance data privacy with gleaning the value of the information through a data modernization strategy that enhances and accelerates digital transformation efforts.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.