Ian Barker

Jamstack -- what is it and how is it changing edge computing? [Q&A]

Edge computing

Some of technology's biggest changes come in the form of new abstractions. Kubernetes raised the unit of abstraction from individual servers, to clusters, and completely redefined the winners and losers in backend infrastructure.

While Jamstack might sound like a particularly messy dessert -- it's actually short for Javascript, APIs, Markup stack -- this is the latest wave of abstraction, emphasizing how frontend teams call on APIs for backend services, instead of having to configure and maintain that infrastructure directly.

Continue reading

Which IT assets present the most risk?

Risk dial

New research from vulnerability management specialist Kenna Security seeks to quantify the comparative risk of using assets based on Microsoft, Apple, Linux, or Unix platforms, as well as network devices.

The study finds that asset mix plays a key role in determining the number of security vulnerabilities an organization has to contend with every month along with its ability to minimize cyber risk.

Continue reading

Three quarters of companies still rely on legacy security technology

open digital lock

A new survey reveals that 75 percent of respondent companies rely on legacy network security technologies from big-name vendors such as Cisco, Palo Alto Networks and Fortinet.

The study from secure network provider Tempered also shows 70 percent would opt to make their networks invisible to bad actors if that was possible, but these older technologies don't allow it.

Continue reading

Enterprise IT spending remains strong despite coronavirus

Workplace

Despite facing the challenges of supporting remote workforces and meeting the online needs of customers, 58 percent of IT leaders expect to either significantly or moderately increase their annual technology budgets.

The report from SaaS infrastructure platform OpsRamp also finds 73 percent of IT operations and DevOps team leaders expect to either accelerate or maintain digital transformation initiatives and projects, indicating the value of digital products and services in an era of social distancing.

Continue reading

Three quarters of end of life IT kit is not being recycled

old scrap computers

Just a quarter (24 percent) of end-of-life equipment is being cleaned up and reused, while 39 percent of organizations physically destroy end-of-life IT equipment according to a new study.

Research from data erasure specialist Blancco Technology Group looks at the issues associated with the corporate sustainability practices that some of the world's largest enterprises are following today.

Continue reading

The factors that are hindering digital transformation [Q&A]

digital transformation

The majority of enterprises have at least explored their potential paths to digital transformation, if not already embarked on their journeys. But some are still struggling to leave the starting gate.

We sat down -- at a safe distance -- with Russ Kennedy, chief product officer at Nasuni to discuss what kinds of challenges enterprises are encountering when it comes to readying their businesses for the digital era.

Continue reading

Coronavirus stimulus payments offer tempting target for cybercriminals

Man with cash

While many industries are struggling to continue during the lockdown, the cybercrime business is gearing up to exploit the economic stimulus and relief payments being offered around the world.

Researchers at Check Point have seen COVID-19 related cyberattacks rise to an average of 14,000 a day this month, which is six times the average number of daily attacks compared to March.

Continue reading

Free security analytics helps fight remote worker threats

remote work

We've seen many companies offering free software during the current crisis. Now security and risk analytics company Gurucul is launching two free services to help organizations protect themselves against cyberattacks that target their remote workers and third-party identities.

These deliver the Gurucul Unified Security and Risk Analytics platform as a cloud service with pre-configured and tuned algorithms that can detect unusual and high risk behavior patterns exhibited by remote workers as well as third party identities and devices.

Continue reading

IT leaders still keen to innovate and invest despite uncertainty

cash handshake

Research into the buying intentions of IT decision makers in the UK has revealed that, despite many organizations (55 percent) putting their buying on hold, 38 percent are still reviewing their digital needs and progressing buying decisions.

The study of 100 top IT decision makers, conducted earlier this month by data-driven consultancy Resonance, finds 67 percent of those actively seeking solutions have increased their urgency to implement them.

Continue reading

Looking ahead to the cybersecurity challenges of 2022

looking ahead

Just in case you didn't have enough to worry about at the moment, the Information Security Forum has published its Threat Horizon 2022 report, looking ahead to the cyber challenges of the next two years.

Balancing today's realities with forecasts that push the limits of thinking, the report highlights nine major threats, broken down into three themes, that organizations can expect to face as a result of developments in technology.

Continue reading

'Fraud guides' account for almost half of material for sale on dark web markets

How to guide

Digital risk protection company Terbium Labs has released a trend report on the stolen and fraudulent data of three of the largest multi-good dark web marketplaces, which finds that fraud guides account for 49 percent of the data being sold.

Personal data lags some way behind at at 15.6 percent, followed by non-financial accounts and credentials (12.2 percent), financial accounts and credentials (8.2 percent), fraud tools and templates (eight percent) and payment cards (seven percent).

Continue reading

The Raspberry Pi-based server that could transform edge computing

Turing Pi

Cloud servers, you might think, are big expensive pieces of kit. But you’d be wrong, at least where the Turing Pi project is concerned.

This mini ITX format board costing under $200 allows seven Raspberry Pi systems to be combined into a desktop Kubernetes cluster that's smaller than a sheet of A4 paper.

Continue reading

New tools help automate container security

DevSecOps

Containerization is increasingly popular, but its adoption presents challenges when it comes to vulnerability management and protection.

DevOps security specialist NeuVector is launching new features for its platform aimed at enterprise teams.

Continue reading

Economic uncertainty gives fintech apps a boost

Fintech

The COVID-19 crisis has led to major economic as well as health concerns and new research from mobile app marketing company Liftoff in partnership with analytics platform App Annie shows more people are turning to mobile apps to manage their money.

The report analyzed 22 billion ad impressions across 382 million clicks, seven million app installs, and five million first-time events in 117 apps for the full calendar year 2019. It shows that the self-reliant nature of contemporary fintech apps has taken precedence over legacy banking apps, a trend that is likely to continue in the current economic climate.

Continue reading

Cohesity launches mobile app for its enterprise data management platform

Cohesity Helios app

Data management company Cohesity's platform allows enterprises to manage all of their data functions -- backups, archives, file shares, object stores, and data used for dev/test and analytics -- on a single platform.

It's now adding to its offering with the launch of a Helios mobile app which allows IT staff to monitor the health and performance of their Cohesity infrastructure, easily manage support cases, and get alerts about anomalies, including potential ransomware attacks to their production environment, while on the go.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.