Connected device industry faces severe skills shortage

cyber crisis

Demand for connected devices is causing a severe developer skills shortage and a crisis in wellbeing as developers come under increasing pressure.

New research for the Qt Company, carried out by Forrester Consulting, finds 75 percent of connected device manufacturers say that demand is outstripping supply. At the same time 65 percent are worried about the wellbeing of their developers.

Continue reading

AI will be used to unleash a global cyber incident in the next 12 months

AI security

New research from Deep Instinct finds that 78 percent of SecOps professionals are concerned that cyber adversaries will develop and deploy AI to cause a global cyber incident in the next 12 months.

The study of 600 IT and cybersecurity professionals finds more than half of respondents believe ransomware or zero-day attacks are the biggest threats to their organization.

Continue reading

Linux Foundation launches Open Voice Network

Speech recognition

Many organizations are now relying on voice assistant systems to handle enquiries, but just as with other forms of information it's important to protect the consumer and the proprietary data that flows through voice.

The Linux Foundation is launching an Open Voice Network, an open source association dedicated to advancing open standards that support the adoption of AI-enabled voice assistance systems.

Continue reading

Only seven percent of IT security leaders report direct to the CEO

Boardroom

New research from SOC specialist LogRhythm finds that just seven percent of security leaders are reporting to the CEO, and only 37 percent say they or someone in their security function reports to the board of directors.

In addition 53 percent of security leaders claim their senior leadership doesn't understand their role, and 51 percent believe they lack executive support.

Continue reading

Sophisticated new attacks target container supply chains and infrastructure

Insider threat

New research reveals a continued rise in cyberattacks targeting container infrastructure and supply chains, and shows that it can take less than an hour to exploit vulnerable container infrastructure.

The latest threat report from cloud-native security company Aqua Security offers a detailed analysis of how bad actors are getting better at hiding their increasingly sophisticated attacks.

Continue reading

Facing the business challenge of open data [Q&A]

Digital data

We're all familiar with the term 'big data' but not perhaps with 'open data'. Open data is information that can be freely reused and distributed, it's often linked with mixing datasets too.

But what challenges does dealing with open data present for enterprises? We spoke to Mo Ladha, product manager at content services platform Hyland, to find out.

Continue reading

Why open banking apps must stay secure to earn consumer trust [Q&A]

online banking

Traditional banks are realizing that they must develop more user-friendly open banking apps if they're not to lose customers to fintech startups.

But it's critical that these apps gain the trust of consumers if open banking is to succeed. We spoke to Jasen Meece, CEO of Cloudentity to discuss how financial services companies can ensure their open banking apps and partners adhere to compliance standards and protect consumer’s personal data.

Continue reading

Five percent of VPN solutions remain unpatched and vulnerable

VPN tiles

In 2020 we saw a huge shift to remote working, with VPN often the technology of choice for keeping connections secure.

But a new Network Security Report from SpiderLabs at Trustwave reveals that this trend didn't go unnoticed by cybercriminals, with malicious actors targeting unpatched VPN vulnerabilities more frequently.

Continue reading

Why service mesh adopters are moving from Istio to Linkerd [Q&A]

futuristic_dark_web_mesh

Service mesh, in case you're unfamiliar with it, is an infrastructure layer that facilitates service-to-service communications between services or microservices via the use of a proxy.

This offers a number of benefits including secure connections and visibility of communications. The two main competitors in the service mesh space are Istio and Linkerd, and the market has recently seen a shift towards the latter. We spoke to William Morgan, CEO of Buoyant and co-creator of Linkerd, to find out more about service mesh and why the shift is happening.

Continue reading

Unsuccessful tech projects get axed during the pandemic

Scrap computers bin

Research from London-based digital agency Studio Graphene shows that digital transformation during the pandemic hasn't been all success stories.

The survey of 750 decision-makers within UK businesses finds the majority (56 percent) have successfully adopted one or more new technologies since the beginning of the pandemic, with 54 percent saying that using new tech has been key in enabling them to overcome challenges posed by COVID-19.

Continue reading

Three-quarters of IT leaders think organizations are more vulnerable to mobile attacks

cellphone security

A survey of over 600 IT decision makers across the US, UK and Australia finds that 76 percent believe end users are more at risk from attacks on mobile devices than they were a year ago.

The study from Menlo Security also shows 53 percent admit that it's not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices. And, more than a third (38 percent) claim that it's impossible to keep up with the pace of these attacks.

Continue reading

Open source platform aims to boost cloud-native deployments

cloud data cable

Many digital transformation initiatives have been boosted by the pandemic, but they are still too often held back by a shortage of the technical skills needed to deliver them.

Now though open source company WSO2 is launching Choreo, a new integration platform as a service (iPaaS) for cloud native engineering.

Continue reading

New platform lets businesses assess their ransomware attack readiness

Checklist

Automated security validation company Pentera has launched a new module for its platform that emulates the world's most destructive ransomware strains.

It shows CISOs exactly how attackers and ransomware threats will exploit their network and infrastructure, safely automating real adversary tactics and techniques inside the network.

Continue reading

Businesses are confused about SASE -- but want to adopt it anyway

SASE Secure Access Service Edge

The adoption of Secure Access Service Edge (SASE) has increased during the pandemic, with 34 percent of businesses claiming to have adopted SASE in the past year, and an additional 30 percent planning to do so in the next six to 12 months.

But despite this rapid uptake the majority (69 percent) of IT and security professionals surveyed by Versa Networks remain confused about what SASE actually is.

Continue reading

Businesses that pay ransoms are more likely to suffer second attacks

Ransomware sign

A new study shows that 80 percent of businesses that chose to pay a ransom demand have suffered a second ransomware attack, often at the hands of the same threat actor group.

The research from Cybereason also reveals that of those that opted to pay a ransom demand in order to regain access to their encrypted systems, 46 percent report that some or all of the data was corrupted during the recovery process.

Continue reading

Load More Articles