Ian Barker

Enterprise IT continues to move to the cloud

Cloud growth arrow

Cloud adoption in enterprises is already very high and growth is likely to continue in 2019 according to the latest cloud adoption survey from NetEnrich.

The study of IT decision makers in businesses with 500 or more employees shows 85 percent of respondents report either moderate or extensive production use of cloud infrastructure, while 80 percent say their companies have moved at least a quarter of all their applications and workloads to the public cloud.

Continue reading

Poor information management harms productivity

frustrated

Poor information management processes are making jobs harder for staff and reducing their productivity and effectiveness in the workplace, according to new research from information management specialist M-Files Corporation.

Navigating different systems and locations to find the correct version of a file they are looking for negatively affects productivity according to 82 percent of respondents.

Continue reading

Compliance fears inhibit cloud adoption

cloud worry

According to a new survey, 88 percent of IT decision makers at mid- to large-sized companies think having to meet compliance standards in the cloud inhibits further cloud adoption within their company.

The study from Wakefield Research and Logicworks, finds that among senior management -- those most close to and responsible for cloud execution and performance -- the figure is even higher, with 97 percent agreeing that compliance inhibits cloud adoption.

Continue reading

MSSP program helps smaller businesses defend against phishing

Phishing lock

Cybercriminals are increasingly recognizing that smaller businesses can be be lucrative targets as they are able to devote less resources to security.

Phishing defense specialist Cofense is launching a new Managed Security Service Provider (MSSP) program aimed at providing SMBs with human-driven solutions designed to stop active phishing attacks.

Continue reading

New Fortnite vulnerabilities put users' privacy at risk

Fortnite logo

Researchers at security firm Check Point have uncovered vulnerabilities in the popular online game Fortnite that would allow attackers to intercept and steal Fortnite users’ login credentials without them being aware of the theft.

The attack manipulates Fortnite's login process to capture usernames and passwords. Armed with these details attackers could view any data stored in the game, buy more V-Bucks in-game currency at users' expense, and access all the user’s in-game contacts as well as listen in on and record conversations taking place during game play.

Continue reading

SIEM helps enterprises cut number of breaches and detect them sooner

Red and blue security padlock

Security Information and Event Management (SIEM) lets security teams collect and analyze log data from across their IT infrastructure to help detect and combat threats and suspicious activity.

A new report for AlienVault produced by Cybersecurity Insiders reveals three-quarters of cybersecurity professionals believe SIEM is very or extremely important to their organization's security postures.

Continue reading

Average cost of a cyberattack passes $1 million

Cyber attack

The average cost of a cyberattack is now estimated at $1.1 million, according to a new report from cybersecurity company Radware. For organizations that calculate rather than estimate the cost of an attack, that number increases to $1.67M.

The main impact of cyberattacks, as reported by respondents, is operational/productivity loss (54 percent), followed by negative customer experience (43 percent). What’s more, almost half (45 percent) report that the goal of the attacks they suffered was service disruption. Another third (35 percent) say the goal was data theft.

Continue reading

Cryptominers still dominate the malware charts

cryptocurrency mining

The latest Global Threat Index from Check Point shows that at the end of last year cryptominers still took the top three places in the malware charts, despite an overall drop in value across all cryptocurrencies in 2018.

Coinhive retained its number one position for the 13th month in a row, impacting 12 percent of organizations worldwide. XMRig was the second most prevalent malware with a global reach of eight percent, closely followed by the JSEcoin miner in third with a global impact of seven percent.

Continue reading

Organizations suffer breaches despite confidence in their security measures

business security

According to a new survey, 85 percent of respondents are either very or somewhat confident in their organization's security program, yet 41 percent say their company has experienced a security breach and 20 percent more are unsure.

The study from big data specialist Syncsort finds the most common type of breaches are virus/malware attacks (76 percent) and phishing (72 percent). Interestingly, virus attacks came from internal sources roughly half the time while phishing usually came from external sources (78 percent).

Continue reading

Video sensors, medical devices and security worries -- IoT predictions for 2019

Internet of things

More and more devices in our homes and workplaces are gaining smart capabilities as the Internet of Things starts to move from niche to mainstream.

But greater adoption also means an expanded threat surface. So what can we expect to see from the IoT in 2019? We’ve rounded up the opinions of some industry experts.

Continue reading

Faster innovation, increased competition and repatriation -- cloud predictions for 2019

Cloud growth arrow

Use of the cloud is now well established in many businesses. But that's not to say that it isn’t still a fast moving sector of the industry.

With greater competition than ever and the pace of innovation showing little sign of slowing down, we’ve put together some expert views on what might be in store for cloud users in 2019

Continue reading

IoT malware up over 200 percent in 2018

Network security

New malware targeting IoT devices grew 72 percent, with total malware growing 203 percent in the last four quarters according to McAfee's third quarter threat report.

This growth has been partly due to devices being harnessed for cryptomining. IoT devices such as cameras or video recorders have not typically been used for this because they lack the CPU power of desktop and laptop computers.

Continue reading

One in three networks has exposed passwords

Stealing password from code

Passwords are exposed in Group Policy Preferences in 32.2 percent of networks, according to new research, leaving them open to the risk of hackers traveling laterally through the network.

The study from identity and access specialist Preempt also shows organizations lack visibility and control when it comes to their passwords and privileged users.

Continue reading

AI security solutions are popular with executives -- but are they really working?

AI security

According to a new study released by ProtectWise, AI has already established a strong foothold in the security space, with 73 percent of respondents reporting that they have implemented security solutions that incorporate at least some aspect of AI.

Most organizations cite AI's ability to improve the efficiency of security staff members and make investigation of alerts faster as top priorities.

Continue reading

Addressing the skills gap, cyber wars and a new wave of immersive intelligence -- AI predictions for 2019

AI

Artificial intelligence has been 'the future' for quite a long time, but it seems that the potential of the technology is at last starting to have an impact on the real world.

What do industry experts think will be the things we'll see from AI in 2019? We've put together some of their opinions below.

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.