Ian Barker

Why we need to make data integration obsolete [Q&A]

folder stack

Nowadays there are apps for almost everything. As users they clutter up our phones and tablets, but they present problems for businesses too, in particular the storing and analysis of the data they create.

Data is often tied to a specific app and each app needs its own copy, so enterprises can end up with lots of copies of the same information leading to issues with control, compliance and more.

Continue reading

Ransomware variants almost double in six months

ransomware laptop

In the past six months, FortiGuard Labs has seen a total of 10,666 ransomware variants, compared to just 5,400 in the previous half year.

In addition ransomware-as-a-service (RaaS), with its popularity on the dark web, continues to fuel an industry of criminals forcing organizations to consider ransomware settlements.

Continue reading

Pssstt... Wanna buy an identity? The price of data on the dark web

identity theft hacker

We all know that stolen information is traded on the dark web, and new research by Trustwave looks at what is available and how much it costs. It also uncovers the additional services that are being offered to make it easier to commit fraud.

Details of a stolen credit card can be bought for as little as $8. Much more valuable though is a card with 'fullz' -- extra information on the victim that makes the card more usable. These can cost up to $70.

Continue reading

Real time data is a must-have for enterprises

real-time data

Real-time data is a 'must-have' not just a 'nice-to have' according to 78 percent of respondents to a new survey into the data strategies of more than 500 IT leaders.

The study from DataStax finds real-time data pays off in two ways: it leads to increased revenue growth and improved developer productivity. For example, 71 percent of all respondents say that they can tie their revenue growth directly to having real-time data.

Continue reading

Almost half of businesses are struggling with cloud costs

cloud dollars

A new report published today by business monitoring firm Anodot reveals 49 percent of businesses find it difficult to get cloud costs under control, and 54 percent believe their primary source of cloud waste is a lack of visibility into cloud usage.

The report, based on a survey of over 130 US-based IT directors and executives, shows 91 percent of respondents report they currently have IT infrastructure in the cloud, while 60 percent say that migrating more workloads to the cloud is their top cloud initiative in the coming year.

Continue reading

Improved data privacy equals improved revenues

privacy key

According to a new survey, 94 percent of chief data officers (CDOs) from healthcare organizations and financial services firms say that deploying data privacy technology that enforces existing privacy regulations would result in increased revenues for their organizations.

The study from privacy technology specialist TripleBlind finds 37 percent of respondents estimate improved collaboration would increase revenues as much as 20 percent. In addition, 46 percent say increased data collaboration would give their organization a competitive advantage over others.

Continue reading

Native .NET comes to Ubuntu hosts and containers

code

Microsoft and Canonical have announced that the .NET development platform is available as a native experience on Ubuntu hosts and container images, starting in Ubuntu 22.04 LTS.

This means .NET developers will be able to start their Linux journey with Ubuntu and will benefit from timely security patches and new releases as the two companies work together to deliver them.

Continue reading

DevSecOps delivers significant results but take up remains low

Only 22 percent of organizations have developed a formal DevSecOps strategy integrating security into software development lifecycle processes, according to a new report.

But the study from Mezmo shows an overwhelming percentage of those that do have a strategy report a positive impact on accelerating incident detection (95 percent) and response (96 percent) efforts.

Continue reading

New, free tool to help enterprises assess financial risk of cyberattacks

Risk dial

A successful cyberattack can have significant costs for a business, in terms of both reputation and finances. But what's the actual cost of an attack? And if you're looking at insurance how much should you be covered for?

To help answer those questions Safe Security is announcing two industry-first assessment tools to empower organizations to make financial decisions based on their actual cyber risk.

Continue reading

Cybercriminals attack the wrong water company in bungled extortion attempt

On Monday, hacker group ClOp claimed to have gained access to 5TB of data from UK water supplier Thames Water and said it could change the chemical composition of the company's water supply.

Thames Water denied the reports and said it hadn't faced a cyber attack. Today it emerges that an attack has taken place but on a different company, South Staffordshire plc, the parent company of South Staffs Water and Cambridge Water.

Continue reading

Monitoring and management of backups becomes more challenging

Disk backup

Monitoring of backups has long been a necessary chore for IT professionals, but a report out today shows that new issues are also impacting the category and creating greater challenges.

The study from Bocada, a company which specializes in the automation of backup reporting and monitoring, is based on a survey of over 260 IT professionals. Varied environments and growing data volumes are revealed as a major concern, with securing data across backup applications the most-cited backup management challenge, followed by protecting growing data volume.

Continue reading

Cloud hyperscalers get more involved in open source

open source

Amazon, Microsoft, and Google are getting more employees involved in open source than ever before according to new analysis.

A study from Aiven of GitHub, the repository hosting service, finds the total number of active contributors to GitHub from Amazon, Microsoft, and Google has increased by 300 percent in six years -- from 2,654 contributors in May 2016 to 10,549 in May 2022.

Continue reading

The changing role of the CISO [Q&A]

The IT infrastructure of a modern enterprise is made up of a complex architecture of dynamic networks, cloud deployments, software applications, and endpoint devices.

Each of these has its own set of security controls, which form a critical part of the technology ecosystem, but managing these systems can hinder efficient threat detection and response, which in turn compromises visibility, allowing vulnerabilities and gaps to flourish.

Continue reading

Attacks on healthcare organizations increase 90 percent

There has been a 90 percent increase in the number of healthcare organizations targeted by cyber-attacks, in comparison with the first quarter of 2022.

The latest cyber threat Landscape report from Kroll finds that while phishing continues to be the vector used for initial access, there has been a vast increase in external remote services (such as VPNs and RDP environments) being compromised, up 700 percent.

Continue reading

Why run your database in Kubernetes? [Q&A]

Business database

Kubernetes is one of the most widely used platforms for running containerized applications. Many businesses though still run their databases in a more traditional environment.

Of course there's no reason why you can't run a database in Kubernetes and there are many advantages to doing so. We spoke to Karthik Ranganathan, founder and CTO of cloud-native database specialist Yugabyte, to discuss the pros and cons.

Continue reading

© 1998-2022 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.