Cloud adoption continues to rise but costs still a concern

Cloud growth arrow

Cloud adoption is still rising across all industries but managing costs and regulatory requirements remain top concerns for organizations worldwide.

A new report from O'Reilly finds that 30 percent of all respondents in almost every industry cite managing cost as the most important initiative their company is undertaking related to public cloud adoption.

Continue reading

How enterprises can ensure sustainability in their IT supply chains [Q&A]

Scrap computers bin

We recently reported on a study showing that IT leaders are willing to pay more for systems and providers that have a commitment to sustainability. And with the COP26 climate conference in full swing there's increased focus on reducing our impact on the planet.

But how can enterprises properly vet their supply chain to ensure the businesses they’re dealing with are adhering to the appropriate standards? We spoke with Martin Thompson, founder of the ITAM Forum -- a body that promotes the IT asset management industry -- to find out.

Continue reading

Most businesses feel they can't fully prevent ransomware attacks

ransomware key

Only 45 percent of respondents to a recent survey believe it is currently possible to prevent all malware threats from infiltrating their organization's network.

The survey from Deep Instinct does show some longer term optimism though. 66 percent of respondents believe it may be possible to prevent all malware threats from infiltrating their organization's network in the next two to five years.

Continue reading

The importance of a modern approach to information management [Q&A]

folder stack

Information is now a critical asset for businesses, but it's only of real value if you can manage and access it efficiently.

More and more data now is in an unstructured form too, so has the way we manage information changed, and what do businesses need to do to make the most of it to inform their day-to-day decisions? We spoke to Antti Nivala, founder and CEO of M-Files to find out.

Continue reading

More than a third of consumers don't trust brands with their data

Displeased suspicious young woman

New research from digital experience company Acquia shows that 39 percent of UK consumers don't trust all brands to handle their data correctly.

The study also suggests wide scale breaches of GDPR rules, with a huge 87 percent of UK consumers receiving marketing communications from brands which they don't recall opting in for.

Continue reading

Tackling the problem of Active Directory misconfigurations [Q&A]

Laptop security

Microsoft's Active Directory is used by many businesses as a way of managing identity services and controlling access.

But if it's not configured correctly it can lead to security risks. But how dangerous is this and what can enterprises do to keep themselves safe? We spoke to Andy Robbins, technical product architect at SpecterOps to find out.

Continue reading

New solution protects open banking against fraud

online banking

Open banking, connecting banks, third parties and service providers, allowing them to exchange information quickly and securely, has been rolling out since 2018 and delivers a great deal of convenience for consumers.

However, while it doesn't introduce new fraud risks in itself, open banking does create opportunities for fraudsters to attempt account takeovers, for example, or to target banks' own PSD2 (Payment Services Directive 2) implementations for Payment Initiation Service Providers (PISP).

Continue reading

Younger generations have worse cybersecurity habits

Security breach

According to a new report 59 percent of all workers are using corporate email for personal use, but Gen Zs are the biggest offenders at 93 percent.

The study from SailPoint also finds that Gen Z (77 percent) and Millennials (55 percent) are using corporate emails for their social media logins, compared to just 15 percent of Gen X and seven percent of Boomers.

Continue reading

The evolution of rootkits and why they're here to stay

Faceless hacker rootkit

Rootkits, those sneaky bits of software that lurk deep inside a system in order to give access to hackers, have been around since the late 1980s.

A new study from Positive Technologies takes a close look at how they have evolved in recent years and just how much of a threat they present.

Continue reading

Red Hat Enterprise Linux 9 Beta -- more features for users, fewer headaches for admins

Red Hat Linux logo

The launch of Red Hat Enterprise Linux (RHEL) 9 Beta today marks a bit of a change from previous releases. While it has many improvements and enhancements that customers have asked for, there are fewer changes that require admins and IT Ops to learn new ways of doing things.

This means anyone already familiar with RHEL 8 should feel at home. Among new features are enhanced web console performance metrics, kernel live patching via the web console, and streamlined image building.

Continue reading

Holiday shopping season set to be disrupted by cybercrime

holiday shopping

A new report from Imperva suggests that the 2021 holiday shopping season faces disruption by cybercriminals looking to create chaos and take advantage of the global supply chain crisis.

Bot attacks against retail sites have risen by 13 percent in 2021, with 57 percent of attacks recorded on eCommerce websites this year carried out by bots. In comparison, bad bots made up just 33 percent of the total attacks on websites in all other industries in 2021.

Continue reading

New project aims to make open data more accessible

Analyzing data on computer

Project OpenBytes, announced today by The Linux Foundation, is dedicated to making open data more available and accessible through the creation of new standards and formats.

It will enable a community of developers and data scientists, led by Graviti, to create data standards and formats that enable contributions by anyone.

Continue reading

APIs give enterprises a security headache

api

Over the last year at least 44 percent of respondents to a new survey faced substantial issues concerning privacy, data leakage, and object property exposure with internal or external-facing APIs.

The study for Cloudentity, based on research carried out by PulseQA, shows that as a result of these issues, 97 percent of enterprises have experienced delays in releases of new applications and service enhancements due to identity and authorization issues with APIs and services.

Continue reading

Poor identity management makes it easier for cybercriminals to launch attacks

identity theft mask

New research from identity security specialist One Identity shows that 95 percent of companies report challenges managing identities.

In addition 84 percent say that the number of identities they're managing has more than doubled, which means they have too many identities and credentials to keep track of, leaving holes within their network, evidenced by only 12 percent of security professionals being fully confident they can prevent a credential-based attack.

Continue reading

Energy industry hit by surge in mobile phishing threats

wind-solar-energy

Energy organizations provide infrastructure that's essential for the safety and well being of society, but recent events like the Colonial Pipeline breach demonstrate that the industry is particularly vulnerable to cyberattacks.

A new report on energy industry threats finds that 20 percent of energy employees have been exposed to a mobile phishing attack in the first half of 2021, a 161 percent increase from the second half of 2020.

Continue reading

Load More Articles