80 percent of CISOs will consider paying a ransom to recover data

Man with cash

A new survey of more than 250 CISO reveals that more than half have been hit by ransomware in the past year, with 69 percent saying it is likely they'll be successfully attacked at least once in the next year.

Those who were successfully hit by ransomware are more inclined to pay up, with 65 percent actually doing so. However, full recovery of data occurred only 55 percent of the time. When asked about willingness to pay, 13 percent say they definitely would, but only 20 percent say they definitely wouldn’t.

Continue reading

Dark web data is spreading faster than ever

Lit up keyboard

Stolen data on the dark web is spreading 11 times faster today than it was six years ago, according to the latest study from Bitglass.

Breach data received over 13,200 views in 2021 compared to 1,100 views in 2015 -- a 1,100 percent increase. In 2015, it took 12 days to reach 1,100 link views -- in 2021, it takes less than 24 hours to pass that milestone.

Continue reading

IBM launches open source cloud guide for developers

IBM logo clouds

Developers who want to build cloud applications should work on honing their open-source skills instead of only focusing on developing skills for a proprietary cloud, according to an O'Reilly survey commissioned by IBM last year.

Because every major cloud platform uses open-source software in its infrastructure, developing skills related to open technology makes developers more desirable to potential employers and helps them compete in hybrid environments.

Continue reading

Is it time to rethink data centralization to aid cybersecurity investigations? [Q&A]

Data security watch face

Security Information and Events Management (SIEM) has become the keystone of many organizations' security strategies in recent years.

But is it effective? And in the era of greater cloud and SaaS use, is the time right for the concept of SIEM to undergo a radical rethink? Andrew Maloney, COO and co-founder at security investigation specialist Query.AI thinks it is. We spoke to him to learn more.

Continue reading

Data strategy isn't understood in two-thirds of companies

Confused

Research from data science consultancy Mango Solutions shows that while 95 percent of companies questioned have a data strategy, less than a third of those (29 percent), claim their data strategy is clear and widely understood.

The survey, of over 100 data professionals at the Big Data LDN event in September, reveals companies are investing heavily in data capabilities, resulting in maturing data functions -- for example, 41 percent have established data science functions in the last two years.

Continue reading

A minute is a long time on the internet

clock timer

Former British prime minister Harold Wilson famously once said, "A week is a long time in politics." Of course in the age of the internet things move faster still.

Research from advertising company N.Rich shows that in the online world an awful lot happens in just one minute.

Continue reading

Why data quality is essential to business success [Q&A]

Laptop collecting data

Enterprises are increasingly reliant on data, but it's only really useful if its quality can be assured. With growing volumes though maintaining data quality and compliance is a big challenge.

We spoke to Rex Ahlstrom, chief strategy and technology officer at Syniti to find out how businesses can improve and maintain the quality of their data and how this can benefit them.

Continue reading

Tech industry has become more inclusive but women still face barriers

women in cybersecurity

The past decade has seen a concerted effort to improve opportunities for women in the technology sector, and 80 percent of female and 89 percent of male respondents to a new survey believe that it's now more welcoming.

However, a report out today from consulting company NTT DATA UK shows that 74 percent of women say they have had a negative experience at work because of their gender.

Continue reading

Enterprise asset management not keeping pace with pandemic changes

asset management

A new report from IT management specialist Flexera looks at how organizations have adapted their technology to meet the demands imposed by the pandemic.

It reveals information technology asset management (ITAM) trends relating to responsibilities and challenges introduced by the increased use of new IT environments such as software-as-a-service (SaaS), cloud and containers.

Continue reading

Hackers exploit zero day before enterprises can patch

Zero Day

Cybercriminals exploited the new CVE-2021-40444 remote code execution zero-day a week before the patch was issued on September 14, according to the latest report from HP Wolf Security.

Researchers also saw scripts that automated the creation of the exploit on Github on the 10th, making it easier for less-sophisticated attackers to use the exploit against vulnerable organisations.

Continue reading

Be part of a cybersecurity world record attempt

Victory Winner Free

It's Cybersecurity Awareness Month and also Serious Security Week. To mark these events, cybersecurity companies KnowBe4 and OneLogin are partnering with Security Serious in a bid to set a brand new Guinness World Record for the most views of a cyber security lesson video on YouTube in 24 hours.

The record attempt will take place starting today, October 14th at 11am EDT, (8am PDT, 4pm BST) and will see KnowBe4 and OneLogin provide a 45-minute training session that will be live-streamed via YouTube.

Continue reading

Industry leaders comment on Cybersecurity Awareness Month

cybersecurity

Most things have a day or a week or a month nowadays, and as you're reading a tech news site it probably hasn't escaped your attention that October is Cybersecurity Awareness Month.

But just in case you missed it in all of the Windows 11 excitement, here's a round up of what some leading industry figures have to say on cybersecurity, and why we need to be aware of it.

Continue reading

Crypto trading scam targets iPhone users looking for love

bitcoin-businessman

Researchers at Sophos have uncovered a cryptocurrency trading scam that targets iPhone users through popular dating apps, such as Bumble and Tinder.

Researchers have code-named the threat 'CryptoRom' and have discovered a Bitcoin wallet controlled by the attackers that contains nearly $1.4 million in cryptocurrency, allegedly collected from victims.

Continue reading

New software streamlines customer access management

Mobile login

As more customers use apps and online portals, businesses need to ensure that these day-to-day interactions that are both inviting and secure.

However, developers often lack the expertise to incorporate CIAM (Customer Identity and Access Management (CIAM) into their applications. WSO2 is addressing this challenge with today's introduction of its next-generation identity as a service (IDaaS) solution, Asgardeo.

Continue reading

IBM helps developers deploy AI and ML models on Kubernetes

machine learning AI

Responding to a user request from an AI model -- 'model serving' -- is a key part of making use of the technology. But as the number of models expands serving them all raises problems and can lead to many being rarely used or abandoned.

Which is why IBM is introducing ModelMesh, a model serving management layer for Watson products that is designed to cope with high-scale, high-density and frequently-changing model use cases. It intelligently loads and unloads AI models to and from memory to strike an optimized trade-off between responsiveness to users and computational footprint.

Continue reading

Load More Articles