So you want to set up an IT support business? Here's what's really involved [Q&A]

support key

With more businesses looking to outsource their support thanks to factors like skills shortages, there's clearly a demand for providing services like automation and remote monitoring and management tools.

But what does it take to set up an IT support business? And how does the idea live up to reality? We spoke to Dale Dawson, director of product at MSP platform Syncro to find out.

Continue reading

New solution makes it easier to manage machine learning models

machine learning AI

More than 80 percent of organizations do not have the necessary visibility and control over their machine learning models or how they're deployed throughout the ML model development lifecycle.

To deal with this problem, Iterative has built an open-source model registry solution that allows teams to easily manage models with full context around model lineage, version, production status, data used to train the model, and more.

Continue reading

Cybercriminals go phishing for data in the social media pool

Phishing

The latest quarterly report from NortonLifeLock's global research team, Norton Labs, looks at how cybercriminals are using social media phishing attacks to steal private information.

Based on analysis of a full year of phishing attacks on the top social media platforms, it finds plenty of fake login pages designed to trick victims into inputting their login credentials, but also a diversity and complexity of lures going far beyond that one technique.

Continue reading

60 percent of security pros say their strategy doesn't keep up with the threat landscape

Threat concept

A new survey reveals that 60 percent of respondents believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20 percent), treading water (13 percent), or merely running to keep up (27 percent).

The study from privileged access management specialist Delinea also shows that 84 percent of organizations experienced an identity-related security breach in the last 18 months, despite 40 percent of respondents believing they have the right strategy in place.

Continue reading

Cybercriminals use messaging apps to steal data and spread malware

Mobile phone malware

The shift to remote working has boosted the popularity of messaging apps, in particular those like Discord and Telegram which have underlying elements that allow users to create and share programs or other types of content that's used inside the platform.

But research from Intel471 shows cybercriminals are finding ways to use these platforms to host, distribute, and execute functions that ultimately allow them to steal credentials or other information from unsuspecting users.

Continue reading

A third of employees don't understand the importance of cybersecurity

Man shrugging shoulders

One in three employees doesn't understand the importance of cybersecurity at work according to new research from email security company Tessian.

In addition only 39 percent of employees say they're very likely to report a security incident, making investigation and remediation even more challenging and time-consuming for security teams. When asked why, 42 percent of employees say they wouldn't know if they had caused an incident in the first place, and 25 percent say they don't care enough about cybersecurity to mention it.

Continue reading

Addressing the cybersecurity talent shortage [Q&A]

talent

Cyber threats are growing in volume and sophistication, but efforts to combat them are being hampered by a shortage of cybersecurity skills.

One way of meeting that shortage is to look at upskilling and retraining within the current workforce. We spoke to Apratim Purakayastha, chief technology officer at Skillsoft, to find out more about how using innovative learning solutions can deliver the skills businesses need.

Continue reading

Banks choose to build their own tech solutions

bank

While banks are investing in technology solutions to meet increasing demands, a new study shows that 61 percent prefer to build their own technology stack, rather than buy technology solutions from a third party.

The study from IT services company NTT DATA surveyed 900 senior banking respondents across 12 countries and examines the state of corporate banking following the COVID-19 pandemic.

Continue reading

Successful AI deployment needs to be enterprise wide

Artificial intelligence

Businesses are keen to capitalize on AI, with 72 percent of business leaders in a new survey believing their competitors are using AI, and 63 percent concerned their competitors will use AI to gain an advantage over their own business.

But the study from SambaNova Systems, of over 2100 enterprise and IT leaders based in the US, UK, and Germany, shows just 18 percent of organizations with AI are rolling it out as a large-scale enterprise-class initiative. The majority -- 82 percent -- are rolling it out as multiple programs, creating disorganization and hindering successful deployment.

Continue reading

Do we need a cyber NATO to address the changing threat landscape? [Q&A]

security guards

The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves.

Is the best way to stay on top of the most pressing threats to harness the power of the global cybersecurity community for defense in a sort of cyber NATO? We talked to SOC Prime CEO Andrii Bezverkhyi to find out.

Continue reading

Honor among cyber thieves, the professional side of the dark web

smart professional hacker

Much like the legitimate eCommerce world, trust and reputation have become essential parts of the cybercriminal trade. New research by HP Wolf Security finds 77 percent of cybercriminal marketplaces analyzed require a vendor bond -- a license to sell -- which can cost up to $3,000.

In other evidence of a professional approach, 85 percent of these sites use escrow payments, and 92 percent have a third-party dispute resolution service. Every marketplace provides vendor feedback scores too. Cybercriminals also try to stay a step ahead of law enforcement by transferring reputations between websites -- as the average lifespan of a dark net website is only 55 days.

Continue reading

New process helps deliver Kubernetes observability

Kubernetes

As Kubernetes becomes increasingly widely adopted, monitoring these systems effectively becomes even more critical for businesses. But because Kubernetes is by nature ephemeral -- things can be created and destroyed quickly -- this represents a challenge.

As a Gartner report last year pointed out poor or manual monitoring procedures can introduce friction for developers and loss of visibility. To combat this problem, analytics platform Sumo Logic has unveiled a new process to deliver Kubernetes observability in just a few clicks.

Continue reading

IT and security leaders lack confidence in their ability to protect the cloud

Cloud data security

A new study from secure access specialist Appgate based on research by the Ponemon Institute finds 60 percent of IT and security leaders are not confident in their organization's ability to ensure secure cloud access.

The survey of nearly 1,500 IT decision makers and security professionals worldwide sets out to examine the pain points experienced in securing cloud environments and how zero trust security methods can enable digital transformation.

Continue reading

Almost half of organizations suffer voice network attacks

Male hand hanging up phone

A new survey shows that 47 percent of organizations have experienced a vishing (voice phishing) or social engineering attack via their voice networks in the past year.

The study by voice traffic protection specialist Mutare also finds most are unaware of the volume of unwanted phone calls traversing their network, or the significance of threats lurking in unwanted traffic, which includes robocalls, spoof calls, scam calls, spam calls, spam storms, vishing, smishing and social engineering.

Continue reading

Quantum computing and its impact on cybersecurity [Q&A]

quantum computing

Quantum computing with its vastly improved processing capability offers the chance of many positive developments in research and science. But it also represents a potential threat to our current encryption models.

How big is quantum's threat to cybersecurity? And should we be taking action on this now? We talked to Skip Sanzeri, QuSecure co-founder and COO, to find out.

Continue reading

Load More Articles