Ian Barker

2019 proves a bumper year for cyber attacks

Cyber attack

Cyber criminals launched a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal Blue vulnerability.

Security company F-Secure's global network of honeypots saw 5.7 billion attacks during the year. For comparison, 2018 saw just over one billion attacks, while 2017 saw 792 million.

Continue reading

Almost a third of businesses lose up to $1 million a year to integration issues

cloud data cable

A new study reveals 30 percent of businesses estimate they lose between $100,000 and $1 million per year as a result of integration-related issues such as data errors, technology impediments, or SLA violations.

The report from cloud platform Cleo shows 10 percent claim to lose $1 million or more on an annual basis from such causes. As for productivity costs, nearly half (46 percent) say it takes them a month or longer to onboard a new trading partner, causing slowdowns in their business.

Continue reading

Claris Connect helps to streamline digital transformation

digital transformation

Smaller businesses can struggle to compete with big companies in the digital transformation stakes due to lack of available resources and development talent.

Apple subsidiary Claris is launching a new tool that provides integration, orchestration and automation to allow third party apps like Box, DocuSign and others to be stitched together seamlessly, without the need to code.

Continue reading

Consumers put off smartphone upgrades because of 5G

4G 5G

More than half (51 percent) of global consumers have been waiting for 5G networks and smartphones to become available before upgrading their devices. This stretches to more than 70 percent of people in India and the Philippines.

A survey of over 5,000 people worldwide by Blancco Technology Group finds 45 percent of US consumers have held onto their current device for longer than usual in anticipation of 5G availability, while 61 percent intend to upgrade to a 5G device with 42 percent doing so in the next three to six months.

Continue reading

Increased security investments aren't stopping data breaches

data breach cash wall

Companies are putting more resources into security technologies to detect and respond quickly to a data breach, but the number of breaches is still increasing according to a new report.

The latest annual corporate preparedness study from Experian, based on research carried out by the Ponemon Institute, shows 68 percent of respondents are putting more resources into security, with 57 percent also reporting that they believe their data breach response plans are 'very' or 'highly' effective, up from 49 percent in 2018.

Continue reading

Why data quality is essential to cloud migration [Q&A]

Cloud

Migrating to the cloud is an increasingly popular option for businesses, but to be successful the data involved needs to be in good shape.

We spoke to Kevin Kline, principal program manager at SentryOne, to find out why the quality of data is so essential to successful migration and what businesses need to do to ensure their migration succeeds.

Continue reading

What will infrastructure and data centers look like by 2025?

2021 predictions

What do IT executives think the world is going to look like in five year’s time? To find out INAP presented several five-year predictions to 500 IT leaders and infrastructure managers to collect and analyze their opinions.

Among the findings are that 81 percent agree that AI and machine learning will mean most common data center and network tasks will be completely automated.

Continue reading

Blacklisted apps in the Google Play store decrease by 76 percent

Google Play logo

Despite a surge in app usage, with consumers downloading over 200 billion apps and spending more than $120 billion in app stores worldwide in 2019, Google's new security controls mean blacklisted apps available in the Play store dropped 76.4 percent.

The latest Mobile App Threat Landscape report from RiskIQ shows total blacklisted apps across all stores are down 20 percent.

Continue reading

Malwarebytes launches enhanced business cloud platform

cloud padlock

Malwarebytes is today launching a new set of enhanced enterprise features for its business cloud platform, Malwarebytes Nebula.

The platform offers cloud delivery and management across the entire Malwarebytes’ product portfolio including Incidence Response, Endpoint Protection, and Endpoint Detection and Response. Native capabilities include guided UI, threat reporting, and simple API integrations, which enable security teams to overcome gaps in team experience and bandwidth.

Continue reading

Integrated attack simulations help protect against cyber threats

Attack route

Security teams can often spend as much time managing security tools as they do defending against threats, and this can lead to extra risk such as misconfigured controls.

Enterprise security company ReliaQuest is introducing a new capability to its GreyMatter platform. Called Verify it uses both provided and customizable attack simulations to verify that security investments are performing as expected.

Continue reading

New tool aims at improving enterprise end user experience

endpoint data

The user's endpoint system is a major factor in their productivity and overall view of a system. But often IT departments have a limited view into the performance and responsiveness of these devices.

To address this, endpoint management specialist 1E is launching a digital experience monitoring and remediation tool as part of its Tachyon real-time endpoint control, self-servicing capability, and task automation platform.

Continue reading

What happens when your identity is stolen on social media? [Q&A]

identity theft mask

Scams involving social media and online dating sites are on the increase. So it's not surprising that recent research shows a majority of people are now worried about identity theft and account hijacking.

But what happens when your identity gets stolen? And what can you do to protect yourself from this kind of scam?

Continue reading

IBM-backed global code challenge focuses on climate change

IBM Call for Code

Now in its third year, the Call for Code Global Challenge encourages and fosters the creation of practical applications built on open source software. The goal is to employ technology in new ways that can make an immediate and lasting humanitarian impact in communities around the world.

For the 2020 challenge IBM is joining forces with key UN agencies and world leaders to help tackle climate change.

Continue reading

Shadow IoT threatens enterprise security

IoT hand

A 1,500 percent increase in IoT traffic over the past year and a rise in unauthorized devices being used in the workplace represents a major threat to enterprise security, according to a new report.

The latest IoT report from cloud security company Zscaler reveals its customers are now generating more than a billion IoT transactions each month. Analysis of just two weeks of this traffic through Zscaler cloud found 553 different IoT devices across 21 categories from 212 manufacturers.

Continue reading

5G and risks to critical infrastructure [Q&A]

industrial skyline

The speed and bandwidth of 5G means that as the roll out continues a lot of industrial automation equipment will eventually be on the 5G network.

So what can be done to protect the integrity and availability of manufacturing networks and other critical infrastructure? We spoke to Dave Weinstein, CSO of Claroty to discuss the link between 5G and the cyber security of critical infrastructure.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.