Java retains its popularity in a changing landscape

Java code

The Java programming language dates back to 1996, released by Sun Microsystems as a way of developing multimedia applications in a portable and interactive way.

That Java is still immensely popular almost 30 years on suggests that it must have got something right. New Relic's 2023 State of the Java Ecosystem report takes an in-depth look at the use of one of the most popular programming languages.

Continue reading

Versa delivers zero trust access across the enterprise

zero trust

Hybrid cloud and hybrid work have changed where and how we access systems, challenging organizations to find ways to secure the enterprise while delivering the best user experience.

While cloud-delivered Zero Trust Network Access (ZTNA) solutions are now widely adopted to secure remote work, they don't deliver the application performance and inline policy enforcement needed for workers at the office.

Continue reading

How analytics can boost the supply chain [Q&A]

Analyzing data on computer

Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.

We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.

Continue reading

Behavioral AI platform defends against multi-channel attacks

Cyber Security lock icon Information Privacy Data Protection internet and Technology

While email remains the most common path to target an organization, we're increasingly using other tools like Slack, Teams and Zoom too, so cybercriminals are steadily shifting their tactics and targeting these additional entry points across the enterprise.

AI-based email security platform Abnormal Security is launching a range of new additions to its product focused on expanding security detection for these collaboration tools.

Continue reading

86 percent of developers knowingly deploy vulnerable code

code

According to a new study, 86 percent of software developers and AppSec managers surveyed have or know someone who has knowingly deployed vulnerable code.

What's more the study from Checkmarx shows 88 percent of AppSec managers surveyed have experienced at least one breach in the last year as a direct result of vulnerable application code.

Continue reading

71 percent of businesses hit with insider attacks from malicious employees

identity individual crowd

Insider attacks including fraud, sabotage, and data theft, plague nearly three quarters (71 percent) of US businesses, according to Capterra's 2023 Insider Threats Survey.

Perhaps unsurprisingly companies that allow excessive data access are much more likely to report falling victim to insider attacks. However, only 57 percent of companies limit data appropriately while 31 percent allow employees access to more data than necessary and 12 percent allow employees access to all company data.

Continue reading

Integration is a top priority for enterprises

integration jigsaw

A new report finds that 71 percent of enterprises are actively planning to implement integration technology this year.

The study from enterprise integration platform as a service (iPaaS) company Digibee surveyed over 1,000 US and Canada-based CIOs, CTOs, developers, and enterprise architects, and finds integration strategies being hampered by technology that isn't cloud-native and lack the agility to respond quickly.

Continue reading

New hyperautomation tool aims to improve enterprise security workflows

Automation

In today's complex cybersecurity landscape, keeping track of all the processes and workflows involved can be a difficult task.

Today sees Torq launch an enterprise-grade security 'hyperautomation' platform that is capable of automating the most complex security infrastructures. It also offers a GPT AI-based analytics capability for auto-analyzing cybersecurity incidents, making strategic responses, and informing immediate and long-term defensive measures.

Continue reading

Business and tech leaders collaborate to exploit the edge

Edge computing

Business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business decisions.

A new report from AT&T Cybersecurity finds that collaboration among leaders, as well as external partners in the ecosystem, will be critical for the edge journey ahead. But while the report finds organization's silos are beginning to erode and converge, more progress needs to be made.

Continue reading

Meeting the challenge of protecting data in a changing world [Q&A]

data protection

As a report last year showed, the change to working habits over the last few years has gone hand-in-hand with a rise in the theft of data.

We spoke to Cyberhaven CSO, Chris Hodson, to find out how enterprise CISOs can meet this challenge and keep their data safe.

Continue reading

Only 18 percent of staff think hybrid working has improved productivity

Home worker in pajamas

New research, from UK-based IT consultancy and services provider Doherty Associates, finds that only 18 percent of workers in two key sectors think that hybrid working has substantially improved productivity.

The survey of 889 employees working in the UK capital markets and legal industries looked to uncover how the working-from-home revolution and subsequent technological adoption have impacted productivity.

Continue reading

Smart communities and how they're changing the world [Q&A]

smart city

Smart communities and smart cities are set to deliver a number of benefits, including environmental sustainability, reducing the digital divide, and improving people's lives with smarter, personalized and more intuitive services and experiences.

But making them work involves a good deal of technology such as 5G, small cells and distributed antenna systems (DAS), as well as needing partnerships between governments and businesses. We spoke to Brendan O'Reilly, group chief technology officer at BAI Communications to find out more about smart communities and what makes them work.

Continue reading

New product helps find threats hidden in graymail

Email overload

'Graymail' refers to those emails that aren't quite spam but which aren't necessarily all that helpful either. Think things like newsletters, announcements, or advertisements that you may have opted into in the past but which have outlived their usefulness.

It presents a headache for security teams as it can be hard to distinguish from malicious content like reconnaissance attacks. Armorblox is launching a new product aimed at cutting the time security teams spend managing graymail and mitigating the security risks from malicious recon attacks.

Continue reading

Vulnerability management made harder by complex supply chains

Complex Maze

New research reveals that CISOs are finding it increasingly difficult to keep their software secure as hybrid and multicloud environments become more complex, and teams continue to rely on manual processes that make it easier for vulnerabilities to slip into production.

The study from Dynatrace shows 68 percent of CISOs say vulnerability management is more difficult because the complexity of their software supply chain and cloud ecosystem has increased.

Continue reading

Ubuntu 23.04 Lunar Lobster makes for easier enterprise deployment

Ubuntu Lunar Lobster

From today, Ubuntu 23.04 (Lunar Lobster) will be available for download, publisher Canonical has announced. The release marks a significant step forward for enterprise deployment and customization.

A unified Ubuntu server and desktop installation engine, Subiquity, supports the same autoinstall configuration workflows for both desktops and servers, making life easier for admins. The Ubuntu 23.04 installer has a refreshed user interface with a modern but familiar first-time user experience, along with new enterprise management capabilities.

Continue reading

Load More Articles