Organizations invest more in site reliability engineering but challenges still persist

process automation

Businesses are investing more in site reliability engineering but are being held back by outdated and manual processes, according to a new report.

A study of 450 site reliability engineers carried out by software intelligence company Dynatrace finds 88 percent say there is now more understanding of the strategic importance of their role than there was three years ago.

Continue reading

88 percent of enterprises plan to boost IT automation investment

Automation

New research from service orchestration and automation solutions company Stonebranch finds 88 percent of enterprises intend to grow their investment in these technologies this year.

The report is based on a survey of respondents from companies with over 1000 employees to find their views about automation and orchestration as it relates to cloud, data pipelines, IT operations, self-service enablement, and more.

Continue reading

B2B software companies go virtual for sales and training

Virtual training

New research from CloudShare finds a significant shift in the way B2B software companies are connecting with customers and the potential for increased revenue that comes from a shift to virtual software experiences.

The amount of virtual proof of concepts (POCs) and self-paced virtual learning experiences has increased by nearly 400 percent in 2021 according to the study.

Continue reading

Cybercriminals impersonate Ukraine aid organizations in crypto phishing scams

Bitcoin phishing theft

It never takes long for threat actors to jump on a bandwagon and the Ukraine conflict is the latest event to prompt a wave of cryptocurrency phishing emails.

A new report of February's attack vectors from managed detection and response company Expel shows attempts to impersonate legitimate aid organizations to exploit people's desire to support refugees and victims with donations.

Continue reading

Enterprises look to unlock the power of data through full-stack observability

Analyzing data on computer

Following two years of rapid digital transformation and firefighting in response to the pandemic, enterprises are primed to drive the next critical wave of innovation according to a new report from Cisco AppDynamics.

The study of 1,200 technologists worldwide finds that appetite for full-stack observability has markedly increased over the past year, with 85 percent saying 2022 will be pivotal for their organization on the journey to unlock the power of data in an application-driven world.

Continue reading

Chameleon phishing attack brings bad karma to email users

Chameleon

New research by Trustwave SpiderLabs has uncovered a phishing attack that is able to adapt itself to the user's email service in order to trick them into revealing their login credentials.

The attack acts like a chameleon, putting up a fake login page tailored for whatever email service the victim is using. So Gmail users for example will see a different page from Apple, Outlook or Yahoo! Mail users.

Continue reading

All you need to get started with wireless microphones -- Maono WM820 (2-person) [Review]

Maono1

If you're just recording audio at home or making video calls then a wired microphone that sits on your desk, or even the one built into your laptop, is probably quite adequate.

If you want to take your recordings and calls out and about though, or if you want to conduct interviews with another person, then wireless mics offer a more practical solution. The Maono WM820 2-person kit provides all you need to get started with wireless microphones in one box.

Continue reading

Linux and Raspberry Pi machines become top targets for credential hacking

Credentials on sticky note

New research shows that hackers are regularly gaining access to servers with the same commonly used -- often default -- passwords.

The data from Bulletproof also reveals that default Raspberry Pi usernames and logins feature prominently on the list of top default credentials used by hackers.

Continue reading

1Password launches new tools to help developers build secure software

DevSecOps

Generating, managing and accessing secrets within development workflows can be a complex process and lead to the inadvertent introduction of risks.

Security and privacy specialist 1Password is launching a new set of developer tools that aim to simplify complex processes and improve security practices to ensure data is protected, without slowing down the development pipeline. This will also provide developers with secure access to the secrets they need wherever they are.

Continue reading

Cloud security tool sprawl leads to missed issues, false positives, burnout and more

cloud worry

A new survey of more than 800 IT professionals finds that 55 percent of respondents are using three or more cloud providers and 57 percent have five or more cloud security tools.

But the study from Orca Security shows this combination of multi-cloud adoption and disparate tooling is overwhelming security teams with inaccurate alerts. For example, 59 percent of respondents receive more than 500 public cloud security alerts a day, and 38 percent receive more than 1,000 a day.

Continue reading

Cyberwarfare plays growing role in the Russia-Ukraine conflict

Cyber war

As we reported last week, cyberattacks are being used on both sides of the Russia-Ukraine conflict. Two new reports out today take a deeper look at how the cyber aspect of the conflict is developing.

Accenture's Cyber Threat Intelligence team has been looking at how threat actors have been dividing along ideological lines. Meanwhile Aqua Security's Team Nautilus has been analyzing the cloud technologies used in the conflict.

Continue reading

Do traditional antivirus solutions still have a role in the age of AI? [Q&A]

Lurking virus

Antivirus software was one of the earliest cybersecurity solutions, with the first commercial programs appearing in the 1980s, and it remains at the core of protecting computer systems today.

But as threats evolve and become more sophisticated, does traditional antivirus still have a role to play or will it be overtaken by technologies like artificial intelligence?

Continue reading

No-code development gets its own day

No code banner. Vector concept illustration.

Creating apps and automating processes without having to write code has a number of benefits that have become even more attractive during the pandemic. So it's no surprise that Gartner estimates 65 percent of all application development by 2024 will be using low-code or no-code tools.

Of course in the modern world anything important -- and quite a few things that aren't -- needs to have a day. So, in order to raise awareness of the benefits of no-code, today has been declared National No-Code Day -- an initiative started by no-code and AI programming platform Zapier.

Continue reading

How data storage demands will drive edge computing growth [Q&A]

Edge computing

Enterprises are producing larger and larger amounts of data and as they deploy more IoT, edge and 5G devices the volume is only likely to increase.

This puts more pressure on storage capacity which has the potential to be an inhibiting factor in digital transformation. We spoke to Dr Tong Zhang, co-founder and chief scientist at ScaleFlux, to learn more about the importance of storage to enterprise IT plans and infrastructure.

Continue reading

Web application attacks soar as attackers get more professional

Attack button

The number of malicious web application requests grew 88 percent between 2020 and 2021, with broken access control and injection attacks making up over 75 percent of them.

The latest threat analysis report from Radware shows the most attacked industries were banking and finance, along with SaaS providers, together accounting for more than 28 percent of web application attacks.

Continue reading

Load More Articles