New low-code environment helps deliver network automation


With more programmable features and APIs being introduced, networks have shifted in recent years from being hardware-focused to software-centered functions.
This has changed the network management techniques and skillsets required to keep pace with the changing environment. To address this, network automation specialist Itential is launching its Automation Studio which allows developers and network engineers to manage increasingly complex networks regardless of their level of knowledge or coding skills.
Cisco launches Industrial IoT security architecture


Increasingly the boundaries between operational technology and business networks are breaking down as businesses seek access to the real time data that industrial IoT devices hold.
But that leads to increased risk to critical infrastructure as devices become more exposed. To combat these threats, Cisco is introducing an IoT security architecture that provides enhanced visibility across both IT and OT environments, and helps protect industrial processes.
Avast free antivirus sends browser history to marketers


When you install an antivirus program -- even a free one -- you have a reasonable assumption that it's going to help keep your data safe.
But a joint investigation by Motherboard and PCMag has discovered that Avast's free antivirus is harvesting user data. Although this is supposedly 'de-identified' it is being sold to marketers in a way that can be linked back to an individual.
Businesses gain from strong data privacy practices


Data privacy is very much in people's minds at the moment with the introduction of CCPA and other legislation around the world.
Businesses can sometimes see privacy regulations as a necessary evil that they have to comply with, but new data from Cisco reveals growing, tangible benefits for businesses that adopt strong privacy practices.
Breakthrough technology allows voice biometrics to be used at the edge


The use of voice for authentication has been limited in IoT applications and devices because of storage and processing limitations.
But new technology from ID R&D looks set to change that, offering voice biometric optimization with an AI-based SDK of under 1MB, enabling voice biometrics to be implemented at the edge.
How CCPA will impact on enterprises and individuals [Q&A]


With the California Consumer Privacy Act (CCPA) having come into force at the beginning of the year, and Data Privacy Day coming up next week, privacy is very much in the news at the moment.
But how much of an impact will the new legislation have? And what do organizations need to do to make sure they don't lose consumer trust? We spoke to Chad McDonald, VP of customer experience at Arxan to find out more.
Budget constraints and cyberattacks are top concerns for SMBs


SMB network security specialist Untangle has released the results of a survey of its channel partners looking at current trends and barriers that they face when protecting clients against emerging threats.
It also examines how these companies will shape future strategic business decisions for Managed Security Providers (MSPs) and Value-Added Resellers (VARs).
Lack of data confidence leads to AI failures


More than a third of AI and analytics projects in the cloud are failing due to poor quality data according to a new survey.
The study from data specialist Trifacta surveyed 646 data professionals across different industries and titles to examine how organizations are handling the accelerating transition of data to the cloud, the obstacles of data cleaning for analytics and the time constraints they face when preparing data.
AI -- separating the reality from the hype to deliver better solutions [Q&A]


Artificial intelligence is making its way into more and more areas of our lives. But how much of this is hype and how much is genuine innovation? And can improved AI learning models deliver better commercial solutions?
We spoke to Ben Lamm, CEO of Hypergiant Industries, a company at the cutting edge of solving problems with AI, to find out.
How machine learning is set to be a major disruptor in the 2020s [Q&A]


Over the last decade we've seen significant advances in AI and machine learning. But there's more on its way, with ML set disrupt almost every industry sector in the decade to come.
We spoke to Eric Loftsgaarden, VP of Data Science and co-founder of consulting services company Atrium to find out how ML can be used to set businesses apart from their competitors and give start ups an edge in traditional industries.
CRM is no longer enough say leading software companies


Customer Relationship Management (CRM) systems are no longer enough for the digital era, according to more than 200 software companies.
In a declaration published as an open letter in yesterday's Wall Street Journal, the Platform of Independents set out its belief that companies should never be locked into CRM suites, and that building better products, respecting customer privacy, and making smarter business decisions requires more than a one-size-fits-all approach to their technology stacks.
Phishing dominates the UK threat landscape


Using analysis of the last three year's worth of data breach information from the UK's Information Commissioner's Office (ICO), cyber security awareness platform CybSafe has revealed that phishing breaches have jumped significantly.
In 2019, UK organizations reported more cyber security breaches to the ICO than ever before. A total of 2,376 reports were sent to the public body last year, up from 540 in 2017, and 1,854 reports in 2018.
Fake 'compensation' scheme exploits fears of data leaks


A new online fraud scheme is designed to trick people into thinking they are owed compensation for data leaks only to scam them out of cash.
Researchers at Kaspersky uncovered the scam which tries to get users to purchase 'temporary US social security numbers' at a cost of around $9 each. Victims have been found in Russia, Algeria, Egypt and the UAE, as well as other countries.
Why consumers must adopt a 'zero trust' approach to security [Q&A]


A lot has been written about the consumerization of IT, but when it comes to personal security Josh Wyatt, VP of global services engagement at Optiv Security, believes consumers would be well served to take a page from the corporate cybersecurity playbook and adopt a 'zero trust' security strategy.
We recently spoke with Josh to find out how zero trust security can help consumers defend against cyberattacks, what types of threats we need to be aware of, and how this all relates to the business world.
2019: The year in cyber attacks


Check Point Research has released its 2020 Cyber Security Report, looking at the key malware and cyber-attack trends during 2019.
Even though cryptomining declined during 2019, linked to cryptocurrencies' fall in value and the closure of the Coinhive operation in March, 38 percent of companies globally were impacted by crypto-miners in 2019, up from 37 percent the previous year. Crypto-miners remain a low-risk, high-reward activity for criminals.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.