Ian Barker

BullGuard supports small businesses with three months free Small Office Security

BullGuard small office

To help small businesses that need assistance managing their cybersecurity in the wake of the disruption caused by the coronavirus pandemic, BullGuard is offering a free, three-month license of BullGuard Small Office Security.

The offer comes with no financial obligations whatsoever and small businesses don't need to submit any form of credit card payment information to obtain their three-month cybersecurity software license.

Continue reading

New solution brings SD-WAN capabilities to securing endpoints

endpoint protection

Business workloads are increasingly moving to multi-cloud and SaaS environments and at the same time the endpoint estate is diversifying to include increasing numbers of mobile and IoT devices.

As a result, CIOs and IT teams are struggling to orchestrate and enforce uniform security and compliance policies across distributed workloads and fixed, mobile and IoT devices. Enterprise mobility and connectivity specialist Asavie though has a solution.

Continue reading

38 percent of enterprises plan to adopt blockchain solutions this year

Blockchain

While blockchain has gained lots of interest from businesses in recent years, actual use of the technology remains relatively low.

However, new research from cryptocurrency site InsideBitcoins.com shows that around 38 percent of organizations are planning to integrate blockchain solutions into their operations in 2020.

Continue reading

GigaSpaces helps enterprises boost speed, scale and availability of systems during the COVID-19 crisis

Cloud growth arrow

The restrictions imposed as a result of the COVID-19 pandemic mean that enterprises are more reliant than ever on online transactions.

To help businesses improve their systems speed, scale and availability GigaSpaces, provider of the InsightEdge in-memory real-time analytics processing platform, has announced that it's offering a free Go-Live professional services package.

Continue reading

IBM Open Source Community Grant goes to internship and mentoring program Outreachy

IBM logo

Last October, IBM began awarding quarterly grants to encourage diversity and inclusion among the open source community.

The company has today announced the winner of its second grant as Outreachy, an organization that provides internships in Free and Open Source Software (FOSS) for people from under served communities.

Continue reading

Is coronavirus going to break the internet?

Breaking internet header

With the current pandemic leading to many more people working from home, we could be looking at a permanent shift in working patterns over the longer term.

But the question many people are asking is can the internet cope? Tech education site Computer Science Zone has created an infographic looking at the effect of more remote working on the internet.

Continue reading

Grand National goes virtual to give fans their racing fix

virtual grand national

The Grand National is a highlight of the British sporting calendar. An event that prompts people who never normally bet on a horse race to venture a few pounds at the bookies or take part in a workplace sweepstake.

With this year's race canceled due to the coronavirus it looked like they might miss out, but virtual reality is coming to the rescue.

Continue reading

Events tracking tool helps track and guard against phishing and spam campaigns

Phishing

It's not unusual for phishing attacks to focus their efforts on major events. The end of the tax year is always popular as are major sporting occasions. The latest lure of course is the current COVID-19 pandemic.

The problem for IT admins is how to protect against a sudden deluge of threats and spam messages while ensuring that important legitimate communications aren't accidentally blocked.

Continue reading

Poor audio quality on calls can lead to lost productivity

Phone call frustration

On average end-users are losing almost half an hour of productivity each week due to poor sound quality on voice calls, time spent double checking information via follow-up emails or calls.

Research from Danish audio brand EPOS shows 87 percent of end-users surveyed have experienced at least one pain point due to poor sound quality on calls, whether in the office or working from home.

Continue reading

Integrated deployment approach plugs the gap between data science and production

plugging a gap

While data is essential to businesses it increasingly seems that there is a gap between creating data science and actually using the information in production.

Open source analytics company KNIME is aiming to eliminate this gap with the launch of Integrated Deployment.

Continue reading

How Malicious Azure apps can be used to target Office 365

Network security

Infected mail attachments and malicious links are common ways for hackers to try to infiltrate organizations.

Researchers at cybersecurity company Varonis have uncovered at new attack route in the form of malicious Azure apps. Azure apps don't require approval from Microsoft and, more importantly, they don't require code execution on the user's machine, making it easy to evade endpoint detection and antivirus systems.

Continue reading

Ubuntu Linux publisher Canonical launches Managed Apps for enterprise DevOps teams

DevOps

Ubuntu creator Canonical is launching a new Managed Apps platform, allowing enterprises to have their apps deployed and operated by Canonical as a fully managed service.

At launch the service will cover ten widely used cloud-native database and LMA (logging, monitoring and alerting) apps on multi-cloud Kubernetes but also on virtual machines across bare-metal, public and private cloud.

Continue reading

2019's top cyberattack techniques

Cyber attack

Recorded Future has been logging sandbox submissions from its platform as mapped to the MITRE ATT&CK framework over 2019 and has released a list of the most frequently referenced tactics and techniques.

The most common tactic in the results is Defense Evasion and the most common technique Security Software Discovery. Defense Evasion involves avoiding detection by, among other things, hiding in trusted processes, obfuscating malicious scripts, and disabling security software.

Continue reading

Employees reluctant to adopt data-driven working methods

reluctance dislike

New research commissioned by analytics database Exasol finds that 63 percent of UK data decision makers experience resistance from employees in adopting data-driven methods.

Key drivers of this resistance are anxiety over job redundancy if all decisions are based on data (39 percent), a lack of understanding (39 percent), and a lack of education on the positive impact data can have (36 percent).

Continue reading

Excel vulnerability aids delivery of malware

Spreadsheet

Microsoft office files have long been used as a means of delivering malware payloads and researchers at Mimecast have discovered a rise in LimeRAT malware delivered using an Excel default password.

Excel files are designed to be easily encrypted, which helps attackers evade detection by common malware detection systems when a file is emailed.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.