Ian Barker

Americans see criminal hacking as the top threat to their health, safety and prosperity

laptop thief hacker

Hacking outranks other threats including climate change, nuclear power, hazardous waste, and government surveillance in Americans' perceptions according to a new survey.

The study by cyber security company ESET asked randomly selected adults to rate their risk perception of 15 different hazards. Six of the hazards were cyber-related while the rest were other forms of technology hazard.

Continue reading

New version of GitLab adds extra features for developers

developer laptop

Popular open source development platform GitLab is launching its latest release aimed at helping developers reap the full benefits of DevOps, in particular continuous integration (CI) and deployment (CD), and Kubernetes based application development.

GitLab 10.0 has been put together with input from enterprise customers as well as a worldwide community of over 1,800 developers.

Continue reading

Cloud migration is more difficult than cloud adoption

cloud migrate

Adopting the cloud is one thing, but migrating to it is a much harder task according to a new report.

The study by cloud company Virtustream and research firm Forrester reveals that moving to the cloud is often an application-by-application process, and only 32 percent of those surveyed rely on a single cloud vendor for migration, signaling a preference for multi-cloud.

Continue reading

Cyber Monday is the new Black Friday

Cyber Monday

New research shows that as we move towards the holiday season, shoppers are more excited about the prospect of Cyber Monday than that of Black Friday.

A study by retail analytics company Euclid finds that Cyber Monday leads the way in consumer excitement (72 percent) followed by Black Friday and the day after Christmas (62 percent and 55 percent, respectively).

Continue reading

New tool offers developers cross-platform cloud access

Cloud developer tablet

As businesses turn to the cloud they often find themselves adopting multiple different platforms to solve specific problems.

This creates a problem for developers who need to deal with multiple tools and systems. Developer services start-up Manifold is aiming to ease this issue with the launch of a new cross-platform tool.

Continue reading

New security platform uses live attacks to evaluate risk

Risk dial

One of the hardest things for security teams to do is accurately evaluate the level of risk that their organization is facing.

Cyber security firm Nehemiah Security is launching the latest version of its AtomicEye RQ (Risk Quantifier) platform that can calculate a system's exploitability and generate comprehensive risk reports.

Continue reading

New enterprise password management tool eases administrator workload

Dashlane_sharingcenter_items

Effective password management is essential in helping to control data breaches, but employees often use the same passwords for both work and personal use, leaving corporate data potentially exposed.

Password management company Dashlane is launching its new Dashlane Business 2.0 enterprise password solution.

Continue reading

Office workers fall victim to phishing attacks despite training

Phishing magnified

Despite training and other efforts to combat the problem, phishing is still proving a remarkably effective tactic for cyber criminals according to a new report.

The study by cloud business applications company Intermedia shows that while 70 percent of office workers say that their organization regularly communicates with employees about cyber threats as a means of prevention, there are significant gaps between confidence and effectiveness.

Continue reading

DigitalOcean launches developer-friendly object storage

cloud storage finger keyboard globe

Businesses are dealing with larger quantities of data than ever before, and this means an increase in the scale and complexity of storage required.

Developer cloud company DigitalOcean is launching a new storage product called Spaces which provides a scalable and cost-effective way to address complex storage needs within a developer-friendly and easy-to-use UI.

Continue reading

Twitter proves better than the Dark Web for assessing vulnerability risk

Skeleton with twitter label

The latest report from risk management and cyber security company Nopsec looks at the use of social media in risk analysis.

Twitter in particular seems to be becoming the go-to resource for security researchers and attackers looking to disseminate proof-of-concept exploits.

Continue reading

Open source tool aims to deliver more efficient web development

Web Development

Websites are essential for businesses in the modern world, which puts web development teams under pressure to deliver results.

Open source tool specialist DRUD Tech is launching a new tool called ddev which is designed to do away with the complicated steps and disparate components of website development.

Continue reading

'App mapping' gives enterprises improved visibility into systems

virus spreading network devices nodes connected Internet of Things malware hacked bot

The shift to containers and as-a-service delivery models introduces blind spots for many enterprises as they struggle to see the whole picture and can't determine the health of their apps and APIs.

Netsil, a new startup, is launching an innovative solution to this problem in the form of its Application Operations Center (AOC), a universal observation and monitoring platform for modern cloud applications.

Continue reading

Mobile network flaws could open Bitcoin wallets to hackers

Bitcoin phishing theft

An architecture flaw in mobile networks could allow hackers to intercept SMS one-time passwords and access Bitcoin wallets.

The vulnerability uncovered by enterprise security specialist Positive Technologies means that with just a person's first name, last name, and phone number, researchers were able learn the email address linked to the wallet, obtain control over it, and gain access to the wallet itself including withdrawing funds.

Continue reading

Majority of enterprise cloud services still not ready for GDPR

cloud-ladder

With the EU's General Data Protection Regulation set to come into force in May next year, companies are rushing to ensure that their systems will comply with its rules.

Yet a new report from cloud security company Netskope finds that almost three-quarters of cloud services still lack key capabilities needed to ensure compliance with the GDPR regulations.

Continue reading

First half of 2017 sees more mobile vulnerabilities than for the whole of 2016

Mobile app threats

A new report into mobile threats reveals that in the first half of 2017, there were more common vulnerabilities and exposures (CVEs) registered for Android and iOS than in all of 2016.

The study by mobile threat defense company Zimperium, based on data from its z3a app analysis tool, also shows that many devices aren't running the latest operating systems, leaving them vulnerable.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.