2019 proves a bumper year for cyber attacks


Cyber criminals launched a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal Blue vulnerability.
Security company F-Secure's global network of honeypots saw 5.7 billion attacks during the year. For comparison, 2018 saw just over one billion attacks, while 2017 saw 792 million.
Almost a third of businesses lose up to $1 million a year to integration issues


A new study reveals 30 percent of businesses estimate they lose between $100,000 and $1 million per year as a result of integration-related issues such as data errors, technology impediments, or SLA violations.
The report from cloud platform Cleo shows 10 percent claim to lose $1 million or more on an annual basis from such causes. As for productivity costs, nearly half (46 percent) say it takes them a month or longer to onboard a new trading partner, causing slowdowns in their business.
Claris Connect helps to streamline digital transformation


Smaller businesses can struggle to compete with big companies in the digital transformation stakes due to lack of available resources and development talent.
Apple subsidiary Claris is launching a new tool that provides integration, orchestration and automation to allow third party apps like Box, DocuSign and others to be stitched together seamlessly, without the need to code.
Consumers put off smartphone upgrades because of 5G


More than half (51 percent) of global consumers have been waiting for 5G networks and smartphones to become available before upgrading their devices. This stretches to more than 70 percent of people in India and the Philippines.
A survey of over 5,000 people worldwide by Blancco Technology Group finds 45 percent of US consumers have held onto their current device for longer than usual in anticipation of 5G availability, while 61 percent intend to upgrade to a 5G device with 42 percent doing so in the next three to six months.
Increased security investments aren't stopping data breaches


Companies are putting more resources into security technologies to detect and respond quickly to a data breach, but the number of breaches is still increasing according to a new report.
The latest annual corporate preparedness study from Experian, based on research carried out by the Ponemon Institute, shows 68 percent of respondents are putting more resources into security, with 57 percent also reporting that they believe their data breach response plans are 'very' or 'highly' effective, up from 49 percent in 2018.
Why data quality is essential to cloud migration [Q&A]


Migrating to the cloud is an increasingly popular option for businesses, but to be successful the data involved needs to be in good shape.
We spoke to Kevin Kline, principal program manager at SentryOne, to find out why the quality of data is so essential to successful migration and what businesses need to do to ensure their migration succeeds.
What will infrastructure and data centers look like by 2025?


What do IT executives think the world is going to look like in five year’s time? To find out INAP presented several five-year predictions to 500 IT leaders and infrastructure managers to collect and analyze their opinions.
Among the findings are that 81 percent agree that AI and machine learning will mean most common data center and network tasks will be completely automated.
Blacklisted apps in the Google Play store decrease by 76 percent


Despite a surge in app usage, with consumers downloading over 200 billion apps and spending more than $120 billion in app stores worldwide in 2019, Google's new security controls mean blacklisted apps available in the Play store dropped 76.4 percent.
The latest Mobile App Threat Landscape report from RiskIQ shows total blacklisted apps across all stores are down 20 percent.
Malwarebytes launches enhanced business cloud platform


Malwarebytes is today launching a new set of enhanced enterprise features for its business cloud platform, Malwarebytes Nebula.
The platform offers cloud delivery and management across the entire Malwarebytes’ product portfolio including Incidence Response, Endpoint Protection, and Endpoint Detection and Response. Native capabilities include guided UI, threat reporting, and simple API integrations, which enable security teams to overcome gaps in team experience and bandwidth.
Integrated attack simulations help protect against cyber threats


Security teams can often spend as much time managing security tools as they do defending against threats, and this can lead to extra risk such as misconfigured controls.
Enterprise security company ReliaQuest is introducing a new capability to its GreyMatter platform. Called Verify it uses both provided and customizable attack simulations to verify that security investments are performing as expected.
New tool aims at improving enterprise end user experience


The user's endpoint system is a major factor in their productivity and overall view of a system. But often IT departments have a limited view into the performance and responsiveness of these devices.
To address this, endpoint management specialist 1E is launching a digital experience monitoring and remediation tool as part of its Tachyon real-time endpoint control, self-servicing capability, and task automation platform.
What happens when your identity is stolen on social media? [Q&A]


Scams involving social media and online dating sites are on the increase. So it's not surprising that recent research shows a majority of people are now worried about identity theft and account hijacking.
But what happens when your identity gets stolen? And what can you do to protect yourself from this kind of scam?
IBM-backed global code challenge focuses on climate change


Now in its third year, the Call for Code Global Challenge encourages and fosters the creation of practical applications built on open source software. The goal is to employ technology in new ways that can make an immediate and lasting humanitarian impact in communities around the world.
For the 2020 challenge IBM is joining forces with key UN agencies and world leaders to help tackle climate change.
Shadow IoT threatens enterprise security


A 1,500 percent increase in IoT traffic over the past year and a rise in unauthorized devices being used in the workplace represents a major threat to enterprise security, according to a new report.
The latest IoT report from cloud security company Zscaler reveals its customers are now generating more than a billion IoT transactions each month. Analysis of just two weeks of this traffic through Zscaler cloud found 553 different IoT devices across 21 categories from 212 manufacturers.
5G and risks to critical infrastructure [Q&A]


The speed and bandwidth of 5G means that as the roll out continues a lot of industrial automation equipment will eventually be on the 5G network.
So what can be done to protect the integrity and availability of manufacturing networks and other critical infrastructure? We spoke to Dave Weinstein, CSO of Claroty to discuss the link between 5G and the cyber security of critical infrastructure.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.