Businesses turn to low-code as demand for developers soars

software development

The global pandemic along with a surge in demand for developers has boosted the interest in and use of enterprise low-code, according to a new report.

The study from low-code development specialist Mendix shows that 77 percent of enterprises in six countries have already adopted low-code, and 72 percent of IT leaders say it's a trend they can't afford to miss.

Continue reading

New platform offers secure cloud data integration

Secure cloud

As enterprises continue to migrate data to the cloud they need to ensure that sensitive information is properly protected.

Automated data integration specialist Fivetran is launching a platform that offers a set of key security-related features, allowing companies to create a more secure modern data stack that meets internal and regulatory requirements.

Continue reading

Hybrid working is here to stay but security remains a challenge

home working security

A majority of companies are moving to a long-term hybrid workplace approach according to a new study from Entrust.

The survey of 1,500 business leaders and 1,500 general employees across 10 countries shows 80 percent of leaders and 75 percent of employees say their company is currently using a hybrid model, or is fully remote and considering a hybrid work approach.

Continue reading

How technical debt is harming API security [Q&A]

api

APIs allow the easy exchange of information between apps, microservices and containers. They've become an essential part of the way our digital infrastructure operates.

But the very ubiquity of APIs means developers are under pressure to produce them quickly and that can lead to 'technical debt' because corners are cut. We spoke to Tom Hudson, security research tech lead at app vulnerability scanner Detectify to find out more about why APIs are vulnerable in this way and how they can be secured.

Continue reading

How technology can cut the rise of voice fraud

call center

Coverage of fraud tends to focus on the online methods such as phishing, credential stuffing, opening fake accounts and so on.

But there's another side to the problem in the form of voice fraud via 'vishing' and the use of social engineering techniques, this is made simpler by the ease with which numbers can be spoofed so a call can appear to come from a legitimate number such as your bank.

Continue reading

SMEs make a rapid shift to hybrid working

Hybrid Cloud

According to new research 42 percent of SMEs have moved, or are planning to move, offices to facilitate hybrid working, with those downsizing reducing their office space requirements by an average of 38 percent.

The study from UK data center specialists ServerChoice shows that these office moves are causing SME business leaders to rethink their IT strategies and shift their server infrastructure away from on-premises to either co-location facilities or public/private cloud.

Continue reading

Why supply chain security blind spots put enterprises at risk [Q&A]

supply chain

Many recent cyberattacks have focused on the software supply chain, with SolarWinds being perhaps the most high profile example.

Businesses can often have a blind spot when it comes to the supply chain and this can have catastrophic consequences. We spoke to Todd Carroll, CISO of CybelAngel to learn more about the problem and what companies can do to keep themselves safe.

Continue reading

OnMail launches new feature to help with email fatigue

OnMail Inbox Break

We all know the feeling, you're happily working away when an email pings into your inbox, you look at it, you might even answer it, but then you have to refocus back to what you were doing before.

It can be a problem in your personal life too, when quality time with the family is interrupted by business emails. Annoying, isn't it? Well email service OnMail clearly thinks so because it's introducing a new feature that allows you to take designated 'inbox breaks'.

Continue reading

Cado offers enterprises a free cloud security investigation

magnifier

The rapid shift to cloud and remote working environments has raised security concerns for businesses and also meant hackers have increasingly turned their attention to cloud-native systems.

In response to this, digital forensics platform Cado Security is offering enterprises unlimited access to its Cado Response platform, including container and memory forensics, for 14-days, allowing them to carry out a free investigation.

Continue reading

Poor security practice leaves industry open to cyber threats

Threat concept

Despite a marked increase in concerns around malware attacks and third-party risk, only eight percent of organizations with web applications for file uploads have fully implemented the best practices for file upload security.

This is among the findings of the latest Web Application Security Report from critical infrastructure protection specialist OPSWAT.

Continue reading

UK unveils post-Brexit data plans to boost digital trade and end annoying cookie confirmation pop-ups

Brexit flags

In the first signs of UK data policy starting to diverge from the EU, the government has today announced a package of measures to help it seize the opportunities of data to boost growth, trade and improve public services.

Plans include 'data adequacy' partnerships with 10 countries including the US, Australia and Republic of Korea, and the appointment of a new Information Commissioner to oversee the changes.

Continue reading

Real-time analysis critical for detecting phishing threats

Phishing

The latest analysis of phishing data from the Cyren Incident and Response team shows that 88 percent of evasive threats were detected using real-time techniques like machine learning.

Of the remainder six percent were found with proprietary threat intelligence or readily matched patterns from previous attacks, and the remaining six percent were suspicious messages that required human analysis to confirm the detection.

Continue reading

Protecting Kubernetes from ransomware [Q&A]

Ransomware

Many organizations have been quick to adopt containerization and particularly Kubernetes. But while there are advantages in scale and flexibility, it also raises issues around cloud-native data protection practices.

So how can businesses adopt the technology but still protect their information? We spoke to Gaurav Rishi, VP product, at Kubernetes backup specialist Kasten by Veeam to find out.

Continue reading

98 percent of UK organizations plan to use zero trust architecture

Almost all UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations according to new research from Illumio.

The research also looks at the barriers that prevent organizations from adopting zero trust. The main technological barriers include legacy systems that can't be upgraded (29 percent) and cost constraints (22 percent).

Continue reading

IT leaders struggle to support unstructured data in the cloud

rain cloud

The majority of organizations are managing more than 1PB of data and spending more than 30 percent of their IT budgets on data storage and protection, according to a new report into unstructured data from data management company Komprise.

Based on responses from 300 IT storage decision makers at companies in the US and UK, it finds 65.5 percent of organizations spend more than 30 percent of their IT budgets on data storage and management.

Continue reading

Load More Articles