Enterprise cloud costs up over 90 percent in the past year

Cloud money

Cloud costs are a measure of the services businesses are using, but they also reflect the wider market and the pricing strategies of providers.

Cloud native service provider Civo has carried out a survey into what businesses are spending on cloud and finds that enterprise cloud costs have risen by 93 percent on average in the past year.

Continue reading

How you can take back control of your online data [Q&A]

Wiping data

If you use the internet then it's certain that some organization somewhere is storing data about you. Indeed research shows that people are happy to share information in exchange for a better consumer experience.

However, that data is still yours, so how can you understand what information you're giving away and how can you take better control?

Continue reading

Organizations not equipped to handle increasing third-party risks

web threats

A new study into third-party risk management shows that 45 percent of organizations experienced a third-party security incident in the last year.

But the report from Prevalent also also reveals that eight percent of companies don't have a third-party incident response program in place, while 23 percent take a passive approach to third-party incident response.

Continue reading

Google, Apple and Microsoft announce plans for a passwordless future

Google Chrome icon on mobile

As we mark World Password Day, three of the major technology players are announcing a significant step on the road to a passwordless future.

Over the next year Google plans to implement passwordless support in Android and Chrome. Apple and Microsoft have also announced that they will offer support in iOS, MacOS, Safari, Windows and Edge.

Continue reading

World Password Day helps to raise security awareness

Dog laptop password

The death of the password is something that has been predicted for a very long time. But the venerable means of securing our accounts still clings tenaciously to life.

Today's World Password Day is designed to raise awareness of the continued importance of passwords and the need -- where we do still use them -- to change them and to choose strong words that are not easy to hack.

Continue reading

New fund launched to support open source maintainers

Laptop money developer

Open source software provides much of the backbone of our digital society. Yet many of the developers and maintainers working on some of the most critical projects embedded across networks and products remain unpaid or underpaid.

To help address this, Backend-as-a-Service (BaaS) platform Appwrite is launching a new Open Source Software Fund (OSS Fund), which will award $50,000 in its first year to open source maintainers whose projects provide the very foundation for today's digital infrastructure but who aren't being compensated as such.

Continue reading

Three-quarters of companies focus development on cloud-native applications

Businessman working with a Cloud Computing diagram

More and more workloads are being shifted to the cloud and a new report from Tigera shows that 75 percent of companies are focusing development on cloud-native applications.

But this increased development and deployment of cloud-native applications also creates the need for more advanced observability and security capabilities.

Continue reading

How much does security software really slow down your PC?

Windows 10 delay

One of the frequent complaints people make about security software is that it slows the performance of your system.

But how much difference does it really make? Independent testing organization AV-Comparatives has been carrying out some research to find out.

Continue reading

Developing smart tools for Windows -- the man behind CCleaner and Tweakeze [Q&A]

code

Heitor Tome is the man behind a new tool called Tweakeze which is designed to prevent unwanted changes to your computer.

But he also has a long history as the chief architect and software engineer behind popular cleanup program CCleaner -- indeed for several years he was its sole developer.

Continue reading

Brits have more online accounts but stick with the same old passwords

Written passwords

Since the start of the pandemic, the number of online accounts Britons now have has almost doubled -- going up from 18 to 32, but their password habits haven't improved.

New research from F-Secure ahead of Thursday's World Password Day shows 75 percent of Brits could be putting their finances and savings at risk by using the same password for their online banking as for other online accounts.

Continue reading

New endpoint solution delivers real-time protection against vulnerabilities

endpoint protection

A new IT management and endpoint security solution from Syxsense promises to deliver real-time vulnerability monitoring and instant remediation for every endpoint across an organization’s entire network.

Syxsense Enterprise combines Syxsense Secure, Manage, and Mobile Device Manager to deliver a completely unified platform that scans and manages all endpoints, resolves problems in real-time, and reduces the risks associated with system misconfigurations.

Continue reading

Security professionals say attackers are better at using AI than defenders

AI security

Over 30 percent of cybersecurity professionals think that malicious actors are more adept at using AI to attack their organization than they are at leveraging AI in-house for defense.

A new survey carried out by Wakefield Research for Devo Technology also shows how organizations are struggling to effectively implement AI to aid and augment cybersecurity efforts, with more than 50 percent having to undertake major changes, or reset and start again.

Continue reading

Google SMTP service exploited to send spoof emails

Email attack

Most of us don't think too much about the 'From' address field on our emails, it's filled in by your mail program or web service. At the recipient's end security tools can check this against the sending server to verify that the mail is legitimate.

But hold on a second, an SMTP relay server between the server and the inbox allows messages through even though the addresses don't match. This is how organizations send out mass mailings without them getting blocked.

Continue reading

Why networking technologies remain at the heart of online security [Q&A]

Networked computers

Networks and the internet are reliant on domain name servers, dynamic host control protocol, and IP address management. These three technologies -- grouped together as DDI (DNS, DHCP, IPAM) -- are central to the way things work but that also makes them a tempting target.

We spoke to Ronan David, chief of strategy at EfficientIP to find out why DDI is so vital to online security and how automation can help with defense.

Continue reading

The changing role of the CISO [Q&A]

CISO

Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.

CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.

Continue reading

Load More Articles