SAP remains one of the most commonly used enterprise resource planning tools and many businesses are looking to migrate their SAP to the cloud from on-premise systems. But this is being held back by a shortage of skills.
New research from Ensono shows just four percent of UK IT leaders say they have completed their SAP to public cloud migration strategy. 80 percent of those who haven't completed projects say they have postponed or canceled their migration of SAP applications to the public cloud due to the SAP skills shortage and 74 percent have taken a similar decision due to a lack of public cloud skills.
Ubuntu Linux maker Canonical publishes curated container images to help secure software supply chains
A good deal of software development now relies on open source images, but it can be hard for businesses to know if they're introducing security flaws by using them.
Canonical -- the company behind Ubuntu Linux -- is addressing this by publishing the LTS (Long Term Support) Docker Image Portfolio, a curated set of secure container application images, on Docker Hub.
Individual behavior is an important factor in security, but according to the Information Security Forum there's a growing recognition that security awareness in isolation rarely leads to sustained behavior change.
The ISF argues that organizations need to proactively develop a robust human-centred security program to reduce the number of security incidents associated with poor security behavior and is releasing a new digest to help.
Although 59 percent of consumers have accessed more online services than usual this year, they still have worries about the security and privacy of their data.
A new report from identity verification and authentication provider Onfido shows the top concerns are that data will be passed on to third parties (53 percent), the security of the information (50 percent), and asking for too much information (37 percent).
With more people working remotely, plus high numbers of IoT devices accessing corporate and cloud networks, traditional network security solutions struggle to cope and are blind to activity and data in cloud applications.
Network threat detection and response company Vectra has launched a new range of cloud services with broader and deeper cloud capabilities to track and link accounts and data in hybrid environments.
A new threat intelligence report from Imperva Research Labs looks at the varying cybersecurity attack risks facing the retail industry.
The findings suggest peak levels of traffic will be seen throughout the holiday shopping season as large numbers of consumers turn to online channels to purchase goods. Shortly after stay-at-home orders were issued, web traffic to retail sites spiked by as much as 28 percent over the weekly average.
A new report from Guardicore and the Ponemon Institute reveals that more than 60 percent of organizations believe that legacy firewalls are ineffective in preventing damaging cyberattacks against applications, data centers, and data in the cloud.
We spoke to Dave Burton, VP marketing at Guardicore to find out more.
Since March, use of devices with newer generation chips has increased by 13.7 percent according to a new study from digital experience management company Aternity.
The use of machines with newer (8th, 9th, and 10th generation CPUs) corresponds with a 10.8 percent decline in use of 6th or earlier generation devices, and a small 2.9 percent drop in usage of 7th generation CPU-based machines.
Software suppliers are showing an ongoing interest in collecting and understanding usage data to help with both change management and use-based pricing models.
A new report from Revenera reveals that 60 percent collect usage data today and more than 75 percent will do so in the next two years.
The Computer Misuse Act (1990) is the law that governs the activities of cyber security professionals in the UK and the survey finds a near-unanimous (93 percent) belief that the Act -- written before the advent of modern cyber security -- does not represent a piece of legislation fit for this century.
According to new research 72 percent of enterprises believe data governance is an enabler of business value rather than a cost center.
However, the study from enterprise search specialist Sinequa also shows that data privacy concerns are ranked as a top barrier to being more data-driven as an organization.
Most of us have been turning to technology for help during the pandemic, and that's true of baby boomers according to new research from digital consultancy Mobiquity, though they may not be as keen as other groups.
According to the findings, 88 percent of baby boomers agree that technology has helped them during the COVID-19 pandemic -- only three percent lower than for younger generations. However, when asked if they feel safe and secure using new technologies, only 78 percent of baby boomers agree compared to 86 percent of non-boomers.
Hybrid cloud is seen as the ideal infrastructure model according to 86 percent of respondents to a new survey by Nutanix.
It also reveals that the pandemic has shifted the way IT leaders think about their future plans. The majority of respondents (nearly 76 percent) report the pandemic has made them think more strategically about IT, and nearly half (46 percent) say their investments in hybrid cloud have increased as a direct result of the pandemic, including public and private clouds.
Only 31 percent of organizations use cloud DLP, despite 66 percent citing data leakage as their top cloud security concern, according to a new report from Bitglass.
In addition organizations say they are unable to maintain visibility into file downloads (45 percent), file uploads (50 percent), DLP policy violations (50 percent), and external sharing (55 percent) in the cloud.
The roll out of 5G will open up fast connections to millions of devices, bringing with it opportunities to transform industries and allowing for massive adoption of the IoT. But with this connectivity also comes extra risk.
To address this Palo Alto Networks is launching the industry's first 5G-native security offering combining mobile expertise with its experience in securing highly-distributed cloud architectures and software-defined networks.