Ian Barker

Microsoft products continue to be most targeted by cybercriminals

Windows key

2019 was the third year in a row that Microsoft technology was most affected by vulnerabilities, with eight of the top 10 vulnerabilities identified targeting its products.

This is a key finding of the Recorded Future annual vulnerability report which also shows that for the first time six of the vulnerabilities, all impacting Microsoft, were repeats from the prior year.

Continue reading

Businesses want zero trust capability despite lack of confidence deploying it

Login zero trust

To combat growing cyber risks, 72 percent of businesses plan to implement zero trust technology this year, yet 47 percent of security professionals lack confidence in their ability to apply it.

A new report from Cybersecurity Insiders and Pulse Secure, based on a survey of more than 400 cyber security decision makers, finds a striking confidence divide among cybersecurity professionals in applying zero trust principles.

Continue reading

Mobile malware incidents increase by 142 percent

Mobile phone malware

According to a new study, 36.5 percent of all organizations have experienced a malware incident on a mobile device in the past year, which represents a 142 percent increase from 2018.

Research from mobile security specialist Wandera finds 57 percent of organizations have experienced a mobile phishing incident, with 60 percent of mobile phishing attacks occurring over HTTPS.

Continue reading

Why businesses must be ready for lots more IoT devices [Q&A]

Internet of things

There are expected to be more than 70 billion connected devices by 2025, which means the opportunity for hackers to infiltrate connected devices, and to get onto networks, is going to get much larger.

So how can businesses prepare for this influx, train their staff and get ahead in order to protect their critical data from cybercriminals who are always keen to update their tactics and strategies? We spoke to Jonathan Langer, CEO of healthcare device security specialist Medigate to find out.

Continue reading

Less than a fifth of organizations are effectively stopping cyberattacks

Stop

Just 17 percent of organizations worldwide are considered 'leaders' in cyber resilience, meaning under a fifth are effectively stopping cyberattacks and finding and fixing breaches fast enough to lower the impact, according to a new report from Accenture.

Based on a survey of more than 4,600 enterprise security practitioners, Accenture's report looks at how businesses prioritize security, the effectiveness of their current security efforts, and the impact of new security-related investments.

Continue reading

UK SMEs see their future in the cloud

Cloud growth arrow

Cloud computing features strongly in the plans of SMEs for the coming year, with 57 percent planning increased adoption, according to a new report.

The study from UK IT services provider OGL Computer shows that 59 percent plan on increasing the use of applications such as Microsoft Office 365, Teams and SharePoint.

Continue reading

IBM launches new open source tool to label images using AI

IBM logo

Images for use in development projects need to be correctly labeled to be of use. But adding labels is a task that can involve many hours of work by human analysts painstakingly applying manual labels to images, time that could be better spent on other, more creative, tasks.

In order to streamline the labelling process IBM has created a new automated labeling tool for the open source Cloud Annotations project that uses AI to 'auto-label' images and thus speed up the process.

Continue reading

New application delivers easier data access for business analysts

Digital data

Businesses are collecting more data than ever, but ensuring that employees have easy and reliable access to information they need for their jobs can prove difficult.

Now though Kloud.io has raised $4 million in seed funding for its spreadsheet-based application that enables financial analysts to directly access data from multiple sources, such as Salesforce, Oracle, Netsuite, and hundreds more.

Continue reading

New solution allows businesses to find and protect sensitive documents

secure documents

Modern businesses have large numbers of documents, many of which contain information that is commercially sensitive. But poor file management, incorrect permissions and uncontrolled sharing can put that information at risk.

The unstructured nature of this data makes it notoriously difficult to keep track of. Now though California-based Concentric is launching a new solution to allow enterprises to identify and protect these documents.

Continue reading

How eCommerce fraud is evolving [Q&A]

eCommerce

Online fraud has gained in sophistication in recent years. As consumers have moved to using mobile devices and have come to expect a consistent shopping experience across platforms,  so the fraudsters have never been far behind.

We spoke to Michael Reitblat, co-founder and CEO of eCommerce fraud prevention specialist Forter, which recently published its latest Fraud Attack Index, to find out more about the fraud landscape and how businesses can protect themselves.

Continue reading

People are a key element in securing systems

security flaw

With attackers often targeting individuals and their credentials to gain unauthorized access to accounts, people are increasingly at the center of security.

This is one of the conclusions of a new report from identity solutions provider Okta which finds that when deploying security tools a third of businesses start with a tool focused on protecting their people, as opposed to devices, infrastructure, and networks.

Continue reading

Why everyone needs to be speaking the same language on data privacy [Q&A]

data privacy

Today is Data Privacy Day and with CCPA coming into force at the start of this month, the focus is very much on personal data, how it's used and how it needs to be protected.

One of the issues is that there are lots of definitions and terms involved which means it’s vital that everyone understands what they’re dealing with.

Continue reading

New low-code environment helps deliver network automation

network connections

With more programmable features and APIs being introduced, networks have shifted in recent years from being hardware-focused to software-centered functions.

This has changed the network management techniques and skillsets required to keep pace with the changing environment. To address this, network automation specialist Itential is launching its Automation Studio which allows developers and network engineers to manage increasingly complex networks regardless of their level of knowledge or coding skills.

Continue reading

Cisco launches Industrial IoT security architecture

Industrial IoT

Increasingly the boundaries between operational technology and business networks are breaking down as businesses seek access to the real time data that industrial IoT devices hold.

But that leads to increased risk to critical infrastructure as devices become more exposed. To combat these threats, Cisco is introducing an IoT security architecture that provides enhanced visibility across both IT and OT environments, and helps protect industrial processes.

Continue reading

Avast free antivirus sends browser history to marketers

Snooping

When you install an antivirus program -- even a free one -- you have a reasonable assumption that it's going to help keep your data safe.

But a joint investigation by Motherboard and PCMag has discovered that Avast's free antivirus is harvesting user data. Although this is supposedly 'de-identified' it is being sold to marketers in a way that can be linked back to an individual.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.