The death of the mainframe is something that's been widely predicted since the 1990s, but these big guns of the computing world stubbornly refuse to succumb.
New research carried out by Forrester for hybrid services provider Ensono and IT consultancy Wipro shows that 50 percent of organizations will continue with and increase mainframe use in the next two years versus just five percent planning to decrease or remove mainframe activity.
Exchange 2010 end of support: How IT pros can leverage Microsoft’s impending deadline into new business
For businesses that still rely on Microsoft Exchange 2010, the time to upgrade is now.
That’s because on Oct. 13, 2020, Microsoft will discontinue support for Exchange 2010. This end-of-support deadline raises a host of potentially disastrous implications for organizations still using this software. There will be no more technical assistance from Microsoft regarding documentation, phone support or general troubleshooting. There will be no more updates for bug fixes or security patches to protect users and data within Exchange 2010, increasing the risk of ransomware and malicious cyberattacks. Finally, running outdated or unsupported software poses risk for being out of compliance, which can present legal issues for certain businesses depending on their industry’s regulation standards.
Most Commented Stories
All Linux users are the same, right? Oh, hell no! Linux users are a diverse bunch, with differing opinions, tastes, and personalities. In fact, that is probably a contributing factor to the fragmentation of the Linux community. Linux users have lots of options between distributions, desktop environments, and more -- they are not stuck in a box like Windows 10 users.
To highlight how different Linux users can be, Canonical has released some data about the installation of snaps, categorized by distro. It chose six of the most popular Linux-based operating systems for its analysis -- Ubuntu, Debian, Fedora, CentOS, Arch Linux, and Manjaro. It then shared the top five most popular snaps for each distribution.
According to a new study 90 percent of IT professionals believe disclosing vulnerabilities serves a broader purpose of improving how software is developed, used and fixed.
The survey from application security testing specialist Veracode finds more than a third of companies received an unsolicited vulnerability disclosure report in the past 12 months, representing an opportunity to work together with the reporting party to fix the vulnerability and then disclose it, improving overall security.
This is why we can’t have nice things! Just as Switzerland is on the cusp of becoming a leader in 5G adoption, out pop the crazies to rain on the tiny nation’s wireless parade.
The land of Chalets and Saint Bernards has been aggressively pursuing 5G adoption, with major carriers promising coverage for 90 percent of the population by the end of the year. This includes nearly every city and town, as well as remote locations, like ski slopes and mountaintop resorts. Just this past July, operators finished installing or converting over 300 antenna stations for 5G transmission -- no mean feat given the rugged terrain of the Swiss Alps.
The sophistication level of bots attacking eCommerce sites is on the rise according to a new report from cybersecurity company Imperva.
Traffic to eCommerce sites is made up of 17.7 percent bad bots, 13.1 percent good bots and 69.2 percent humans, the findings show, and the bad bots are getting better -- but not in a good way.
The rise of cyber-attacks in the last few years is stunning. The list of targeted organizations includes big name retailers like Macy’s, social sites like Twitter, banks, hospitals, utility companies, governments, military installations… no organization is exempt from this growing threat.
It’s a massive -- and expensive -- problem to fix. The cyber security market is predicted to grow from $150 billion in 2018 to $250 billion by 2023, to help protect apps and businesses from these risks. One of the most common, yet potentially highly dangerous, risks is known as Cross-Site Request Forgery or CSRF.
Ransomware attacks are a major problem and they often gain access to systems via brute-force attacks against open and exposed remote access points such as Remote Desktop Protocol.
Cloud-native virtual application delivery platform Cameyo is launching its new RDP Port Shield security technology, along with a free, open source monitoring tool that any organization can use to identify attacks taking place over RDP in their environment.
Human error has become one of the biggest contributors to data breaches. Organizations have traditionally relied on the effectiveness of technology controls but haven't addressed the fundamental reasons why humans make mistakes and are susceptible to manipulation.
A new report from the Information Security Forum finds that by helping staff understand how these vulnerabilities can lead to poor decision making and errors, organizations can better manage risk.
5G, the latest in mobile technology, strives to make mobile communication better and faster than ever before. However, a challenge 5G has that its predecessors did not, is the amount of devices, not just mobile phones, looking to benefit from the new technology. From smartwatches to internet-connected doorbells to even impending autonomous trucks, each of these devices will be looking to connect to the 5G network.
5G is already in use by several cities across the US with other countries not far behind. In fact, a recently released Ericcson Mobility Report predicted that by the end of 2024, there will be 1.9 billion 5G subscriptions, 35 percent of traffic will be carried by 5G networks and up to 65 percent of the global population could be covered by the technology. So the current questions are not when or what, but who will have access and how secure is it?
Researchers at cybersecurity company Symantec have uncovered a new threat group dubbed 'Tortoiseshell' that is attacking IT providers.
The research has identified 11 targets, most of them in Saudi Arabia. In two cases hundreds of hosts were infected, probably because the attackers were hunting for machines that were of particular interest.
The healthcare sector collects a lot of detailed information about its clients and that makes it a prime target for cybercriminals.
A new report from SecurityScorecard confirms this, aggregating data from a number of different sources it reveals that healthcare remains the most breached industry.
IObit has released Driver Booster 7.0.2, a major new release of its free and paid-for driver updater tool for Windows PCs.
Highlights of this new release include support for over 3,500,000 drivers, twice the scanning speed of previous versions, a silent mode feature and an enhanced toolbox that promises fixes for a wider range of driver-related issues such as sound, networking and low-resolution problems.
If you're the impatient type, the current six to eight weeks between major new builds of Firefox may have been agonizing. Mozilla feels your pain, and it is stepping things up a notch.
Eager to get new features out to users faster, Firefox's release schedule is being accelerated significantly. The change isn't happening immediately, but from the first quarter of next year, you can expect to see a major new build of Firefox every four weeks.
Security researchers at TrendMicro have discovered a rootkit-like strain of malware that is striking Linux users. Called Skidmap, the malware is a cryptocurrency miner, but there is much more to it than that.
Skidmap is clever. Very clever. It goes out of its way to disguise itself, going as far as faking system statistics to hide the tell-tale high CPU usage that might give it away. More than this, the Monero-mining malware can also give attackers unlimited access to an infected system.