Ian Barker

IBM and AWS extend their collaboration to drive innovation

IBM logo

IBM and AWS are launching a new set of capabilities, including access to new SaaS offerings and consulting capabilities for clients modernizing on AWS as part of their hybrid cloud approach, and expanded mainframe application modernization.

Earlier this year, the two companies announced the availability of IBM Software products as Software-as-a-Service (SaaS) on the AWS Marketplace, making IBM solutions more accessible.

Continue reading

Fueling the Apple BYOD revolution [Q&A]

It's no secret that BYOD provides incredible benefits on paper -- from increased productivity to more flexibility and streamlined output. But unfortunately, many initiatives fail to take off due to security and privacy concerns.

Mosyle CEO Alcyr Araujo believes this doesn't always have to be the case, and that Apple devices are primed to offer the best balance for BYOD. We spoke to him to find out more.

Continue reading

Identity fraud doubles in crypto and banking sectors

identity theft mask

The crypto and banking sectors both experienced a nearly two-fold increase in identity fraud in 2022, according to a new report from verification platform Sumsub.

The report also finds that over half of all fraud cases happened in just five countries: Bangladesh (22 percent), Pakistan (15.2 percent), Vietnam (8.1 percent), Nigeria (5.4 percent) and the USA (5.1 percent).

Continue reading

Archive files overtake Office docs as a malware delivery method

Archive file formats -- like ZIP and RAR files -- are the most common file type for delivering malware, overtaking Office files for the first time in three years.

A new report from HP Wolf Security, based on on data from millions of endpoints, finds that between July and September this year 44 percent of malware was delivered inside archive files -- an 11 percent rise over the previous quarter -- compared to 32 percent delivered through Office files such as Microsoft Word, Excel, and PowerPoint.

Continue reading

Cyber extortion dominates the threat landscape

Cyber extortion is impacting businesses of all sizes across the world, and 82 percent of observed are small businesses, an increase from 78 percent last year.

The latest Security Navigator report from Orange Cyberdefense shows a marked slow-down in cybercrime at the onset of the Ukraine war, but intensity soon increasing again.

Continue reading

Three out of four organizations are still vulnerable to Log4Shell

Security breach lock

The Log4j or Log4Shell vulnerability first hit the news in December 2021 sending ripples through the cybersecurity world. So you might be forgiven for thinking that it's safe to assume it's no longer a threat. However, one year on it seems that this is a vulnerability that keeps on being, well… vulnerable.

New research from Tenable, based on data collected from over 500 million tests, shows that 72 percent of organizations remain vulnerable to Log4Shell as of October this year.

Continue reading

Cybersecurity budgets are up but aren't being well spent

New research from cloud platform Fastly shows that while enterprises are increasing their cybersecurity spending they're not making the most of their investments.

While 73 percent of organizations worldwide are increasing their cybersecurity spending to protect themselves against future risks, IT leaders are investing poorly with only 61 percent of their cybersecurity tools fully active or deployed.

Continue reading

Ensuring compliance through network automation [Q&A]

Compliance gauge

Cyber threats are on the rise across every industry and business size, highlighting the importance of maintaining network compliance for organizations and especially for IT and security teams.

But that's easier said than done, with many industry-specific compliance regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI) each with their own set of standards and processes.

Continue reading

CISOs look to balance transformation and cybersecurity

CISO

A new survey reveals that while CISOs are still experiencing challenges around visibility, intelligence and control, nearly half (47 percent) are proactively focused on digital transformation and cloud migration.

The study of 600 UK CISOs from BlueFort Security finds most have moved beyond the challenges of a widespread shift to remote working and are now focused on digital transformation and migration to the cloud, despite an uncertain world picture and bleak economic environment.

Continue reading

Pressure on developers puts digital transformation efforts at risk

One of the side effects of the pandemic has been a boost to digital transformation efforts. But in the rush to innovate businesses are struggling to find developer talent.

New research shows 72 percent of tech teams have a skills shortage with two million vacancies for tech jobs advertised between May 2021 and 2022 in the UK alone, and tech salaries almost 80 percent higher than those for non-IT roles.

Continue reading

Data privacy and the changes enterprises need to be ready for [Q&A]

privacy key

It has been estimated that there are some 43 zetabytes of data stored by enterprises today that are inaccessible and not commercialized due to privacy concerns, operational complexity and regulations.

With the California Consumer Privacy Act (CCPA) becoming fully operational on January 1 2023 and other legislation in place or coming around the world, the need for businesses to find new data accessibility methods that are compliance-friendly is very real.

Continue reading

Digital transformation needs culture change as well as tech

Digital transformation

Prioritizing culture, alongside technology change, can lead to significant increases in revenue according to new research from Telstra.

The study finds that 85 percent of senior technology decision-makers in the UK believe that technology implementation is an empowering force when it comes to employees delivering value for their organizations. But it can be used as a tool to both reinforce (77 percent) and change (82 percent) culture within the organization too.

Continue reading

All you need to know about SASE and SSE but never dared ask [Q&A]

The cybersecurity industry loves a good acronym and in recent times SASE and SSE have been among the ones to grab popular attention.

But in many cases a number of disparate technologies have been patched together to fulfill the promise of a unified solution for securing and accessing the service edge. Often this has occurred through company acquisitions.

Continue reading

Encrypted attacks breach 70 percent of organizations

New research from Vectra AI finds 70 percent of organizations have fallen victim to an attack that used encrypted traffic to avoid detection, and 45 percent admit they've been victims more than once.

It's concerning that 66 percent say they don't have visibility into all their encrypted traffic, leaving them highly vulnerable to further encrypted attacks.

Continue reading

More than half of organizations are using Kubernetes in their day-to-day operations

New research into the adoption of Kubernetes finds 51 percent of cloud developers are using Kubernetes and containers in their daily operations, and 57 percent have seen an increase in the number of Kubernetes clusters running within their organization over the last year.

The survey of 1,000 cloud developers by Civo finds the most common benefits cited for Kubernetes are its ease for scaling of work and for management of containers, named by 36 percent and 35 percent of respondents citing respectively.

Continue reading

© 1998-2022 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.