Ian Barker

New low-code environment helps deliver network automation

network connections

With more programmable features and APIs being introduced, networks have shifted in recent years from being hardware-focused to software-centered functions.

This has changed the network management techniques and skillsets required to keep pace with the changing environment. To address this, network automation specialist Itential is launching its Automation Studio which allows developers and network engineers to manage increasingly complex networks regardless of their level of knowledge or coding skills.

Continue reading

Cisco launches Industrial IoT security architecture

Industrial IoT

Increasingly the boundaries between operational technology and business networks are breaking down as businesses seek access to the real time data that industrial IoT devices hold.

But that leads to increased risk to critical infrastructure as devices become more exposed. To combat these threats, Cisco is introducing an IoT security architecture that provides enhanced visibility across both IT and OT environments, and helps protect industrial processes.

Continue reading

Avast free antivirus sends browser history to marketers

Snooping

When you install an antivirus program -- even a free one -- you have a reasonable assumption that it's going to help keep your data safe.

But a joint investigation by Motherboard and PCMag has discovered that Avast's free antivirus is harvesting user data. Although this is supposedly 'de-identified' it is being sold to marketers in a way that can be linked back to an individual.

Continue reading

Businesses gain from strong data privacy practices

Privacy key

Data privacy is very much in people's minds at the moment with the introduction of CCPA and other legislation around the world.

Businesses can sometimes see privacy regulations as a necessary evil that they have to comply with, but new data from Cisco reveals growing, tangible benefits for businesses that adopt strong privacy practices.

Continue reading

Breakthrough technology allows voice biometrics to be used at the edge

voice recognition

The use of voice for authentication has been limited in IoT applications and devices because of storage and processing limitations.

But new technology from ID R&D looks set to change that, offering voice biometric optimization with an AI-based SDK of under 1MB, enabling voice biometrics to be implemented at the edge.

Continue reading

How CCPA will impact on enterprises and individuals [Q&A]

Data privacy

With the California Consumer Privacy Act (CCPA) having come into force at the beginning of the year, and Data Privacy Day coming up next week, privacy is very much in the news at the moment.

But how much of an impact will the new legislation have? And what do organizations need to do to make sure they don't lose consumer trust? We spoke to Chad McDonald, VP of customer experience at Arxan to find out more.

Continue reading

Budget constraints and cyberattacks are top concerns for SMBs

Small business owner laptop

SMB network security specialist Untangle has released the results of a survey of its channel partners looking at current trends and barriers that they face when protecting clients against emerging threats.

It also examines how these companies will shape future strategic business decisions for Managed Security Providers (MSPs) and Value-Added Resellers (VARs).

Continue reading

Lack of data confidence leads to AI failures

data failure

More than a third of AI and analytics projects in the cloud are failing due to poor quality data according to a new survey.

The study from data specialist Trifacta surveyed 646 data professionals across different industries and titles to examine how organizations are handling the accelerating transition of data to the cloud, the obstacles of data cleaning for analytics and the time constraints they face when preparing data.

Continue reading

AI -- separating the reality from the hype to deliver better solutions [Q&A]

Artificial intelligence

Artificial intelligence is making its way into more and more areas of our lives. But how much of this is hype and how much is genuine innovation? And can improved AI learning models deliver better commercial solutions?

We spoke to Ben Lamm, CEO of Hypergiant Industries, a company at the cutting edge of solving problems with AI, to find out.

Continue reading

How machine learning is set to be a major disruptor in the 2020s [Q&A]

machine learning

Over the last decade we've seen significant advances in AI and machine learning. But there's more on its way, with ML set disrupt almost every industry sector in the decade to come.

We spoke to Eric Loftsgaarden, VP of Data Science and co-founder of consulting services company Atrium to find out how ML can be used to set businesses apart from their competitors and give start ups an edge in traditional industries.

Continue reading

CRM is no longer enough say leading software companies

CRM jigsaw

Customer Relationship Management (CRM) systems are no longer enough for the digital era, according to more than 200 software companies.

In a declaration published as an open letter in yesterday's Wall Street Journal, the Platform of Independents set out its belief that companies should never be locked into CRM suites, and that building better products, respecting customer privacy, and making smarter business decisions requires more than a one-size-fits-all approach to their technology stacks.

Continue reading

Phishing dominates the UK threat landscape

Phishing

Using analysis of the last three year's worth of data breach information from the UK's Information Commissioner's Office (ICO), cyber security awareness platform CybSafe has revealed that phishing breaches have jumped significantly.

In 2019, UK organizations reported more cyber security breaches to the ICO than ever before. A total of 2,376 reports were sent to the public body last year, up from 540 in 2017, and 1,854 reports in 2018.

Continue reading

Fake 'compensation' scheme exploits fears of data leaks

cash trap

A new online fraud scheme is designed to trick people into thinking they are owed compensation for data leaks only to scam them out of cash.

Researchers at Kaspersky uncovered the scam which tries to get users to purchase 'temporary US social security numbers' at a cost of around $9 each. Victims have been found in Russia, Algeria, Egypt and the UAE, as well as other countries.

Continue reading

Why consumers must adopt a 'zero trust' approach to security [Q&A]

Trust card

A lot has been written about the consumerization of IT, but when it comes to personal security Josh Wyatt, VP of global services engagement at Optiv Security, believes consumers would be well served to take a page from the corporate cybersecurity playbook and adopt a 'zero trust' security strategy.

We recently spoke with Josh to find out how zero trust security can help consumers defend against cyberattacks, what types of threats we need to be aware of, and how this all relates to the business world.

Continue reading

2019: The year in cyber attacks

Cyber attack

Check Point Research has released its 2020 Cyber Security Report, looking at the key malware and cyber-attack trends during 2019.

Even though cryptomining declined during 2019, linked to cryptocurrencies' fall in value and the closure of the Coinhive operation in March, 38 percent of companies globally were impacted by crypto-miners in 2019, up from 37 percent the previous year. Crypto-miners remain a low-risk, high-reward activity for criminals.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.