Windows 11 could save you millions*

computer piggy bank and cash

As the latest update to Windows 11 rolls out with new features focusing on productivity and collaboration, IT management efficiency and security, Microsoft is understandably keen for businesses to adopt the OS.

To that end it's commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Windows 11 and Microsoft 365.

Continue reading

Firms act to beef up software supply chain security

supply chain

New data reveals a significant increase in activities to secure open source components and integrate security into developer toolchains in order to protect the software supply chain.

The 13th edition of the Building Security In Maturity Model (BSIMM) report from Synopsys analyzes the software security practices of 130 organizations -- including Adobe, PayPal and Lenovo -- in their efforts to secure more than 145,000 applications built and maintained by nearly 410,000 developers.

Continue reading

Why anomalies in network traffic are key to cybersecurity [Q&A]

Networked computers

Major cyberattacks invariably make the headlines, but it seems that rather than take a proactive approach, many CISOs wait for a new threat to emerge before protecting their business. They simply hope they won't be caught up in the first wave of a new attack.

Dave Mitchell, CTO of cybersecurity investigation specialist HYAS Infosec, believes there is a better approach, one that detects threats by monitoring the communications that form the foundations of internet architecture. We recently talked to him to learn more.

Continue reading

New solution enhances facial recognition technology

Onfido Motion

Identity fraud is on the rise, with cybercriminals employing increasingly sophisticated techniques including realistic 2D/3D masks and deploying display attacks (e.g. showing a picture of a person on a screen) to try to spoof biometric verification systems.

Identity verification specialist Onfido is launching a new 'biometric liveness solution' called Motion which is aimed at increasing verification speed and ensuring that it’s seeing a real person.

Continue reading

Half of IT pros believe quantum computing could put their data at risk

quantum computing

A new study from Deloitte shows 50.2 percent of professionals at organizations considering quantum computing benefits believe that their organizations are at risk from 'harvest now, decrypt later' (HNDL) cybersecurity attacks.

In HNDL attacks, threat actors harvest data from unsuspecting organizations, anticipating that data can be decrypted later when quantum computing gets sufficiently mature to render some existing cryptographic algorithms obsolete.

Continue reading

Think your business is ready for ransomware? Think again

Business man with suitcase full of money

Although business leaders think they're fully prepared to deal with ransomware, actual outcomes suggest otherwise, according to a new report.

Druva has commissioned IDC to conduct independent research into ransomware preparedness, challenges, and threats to find out how approaches to ransomware are changing and whether common recovery efforts are effective.

Continue reading

Data center sector unprepared for expanding sustainability requirements

Data center

The latest Annual Global Data Center survey from the Uptime Institute shows an industry that remains strong but is working to address increasing pressure for sustainability progress and reporting.

The sector is also grappling with continuing staffing shortages, supply chain delays, costly outages and other complex challenges.

Continue reading

Ransomware affects 90 percent of companies in the past year

Ransomware,Cyber,Attack,Showing,Personal,Files,Encrypted,Screen

Despite increased spending on cybersecurity, a new report reveals that 90 percent of organizations were affected by ransomware in some way over the past 12 months, up from last year's 72.5 percent.

The study from SpyCloud shows that security efforts are being stepped up, the number of organizations that have implemented or plan to implement multi-factor authentication jumped 71 percent, from 56 percent the previous year to 96 percent. Monitoring for compromised employee credentials also increased from 44 percent to 73 percent.

Continue reading

How AI and computer vision can help retailers to compete [Q&A]

shopping-mall

The rise of online retail coupled with the pandemic have brought about some unprecedented changes to the retail landscape in recent years.

But as consumers now start to venture back into stores, how can retailers make use of technology to effectively compete with their online counterparts and with other brick-and-mortar businesses?

Continue reading

Security and compliance issues hold back innovation

Compliance gauge

Three quarters of C-suite executives responding to a new survey say that compliance challenges and security challenges limit their company's ability to innovate.

The study from software delivery platform CloudBees also shows executives overwhelmingly favor a shift left approach, a strategy of moving software testing and evaluation to earlier in the development lifecycle, placing the burden of compliance on development teams.

Continue reading

Three-quarters of organizations have suffered an API security incident in the last year

api

Over three-quarters (76 percent) of respondents in a new survey have suffered an API security incident in the last 12 months, primarily caused by dormant/zombie APIs, authorization vulnerabilities, and web application firewalls.

The research from Noname Security also shows that 74 percent of cybersecurity professionals don’t have a complete API inventory or know which APIs return sensitive data.

Continue reading

Why virtualization is making enterprise data warehouses obsolete [Q&A]

Virtualization

For many years the database has been at the heart of enterprise IT. But the shift to the cloud has led to massive challenges with migrations proving both slow and expensive.

A different way to approach this is to use virtualization, allowing existing applications to run on any modern cloud platform without being rewritten or replaced. We spoke to Mike Waas founder and CEO of Datometry, a SaaS database virtualization platform, to find out more.

Continue reading

Employees take risks to avoid login hassles

laptop password login

A new report from 1Password reveals that 43 percent of employees admit to risky online behaviors such as sharing logins, offloading tasks to others, or even abandoning certain tasks altogether to circumvent complicated login procedures.

Having to remember multiple logins heightens stress levels and strains mental health according to 41 percent of respondents. While 37 percent say that the onboarding process at their current job was time-consuming, confusing or challenging when it came to logging into work-related accounts.

Continue reading

US businesses unprepared for rise in cyberattacks

Relaxed man

The average US business faces around three successful cyberattacks each year, and while most agree that attacks are set to increase, 32 percent still lack a management platform for IT secrets, like API keys, database passwords and privileged credentials, posing a significant risk to organizational security.

A new US Cybersecurity Census Report from Keeper Security shows most organizations think they're prepared to fend off cyberattacks, with 64 percent of respondents rating their preparedness at least an eight on a 10-point scale and 28 percent rating themselves as a 10/10.

Continue reading

Organizations are being overwhelmed by cloud complexity

cloud confusion

As the move toward cloud-native architectures accelerates, the data generated outstrips the ability of current solutions to produce meaningful analytics, according to a new study.

The survey, from software intelligence company Dynatrace, of 1,300 CIOs and senior cloud and IT operations managers in large organizations, shows 71 percent of CIOs say the explosion of data produced by cloud-native technology stacks is beyond human ability to manage.

Continue reading

Load More Articles