Ian Barker

Privacy legislation and the impact of GDPR and CCPA [Q&A]

Data privacy

With the California Consumer Privacy Act (CCPA) coming into force in January and GDPR in Europe having been active for nearly two years, data privacy is something that's being taken more seriously than ever.

But what impact does legislation have on businesses and consumers? And how has GDPR influenced the drafting of CCPA? To find out we spoke to Sophie Stalla-Bourdillon, senior privacy counsel and legal engineer and Dan Wu, privacy counsel and legal engineer, from data governance specialist Immuta.

Continue reading

Having too many enterprise security tools could increase risk levels

Risk dial

A rapid increase in the number of security tools used by large companies is limiting their return on investment while increasing the risk of cyber threats, according to a new report.

The study from enterprise security specialist ReliaQuest finds that there is a 'security tool tipping point' where the number of cybersecurity solutions becomes overwhelming and actually increases organizational risk levels.

Continue reading

The advantages and risks of outsourcing application development [Q&A]

As the IT skills shortage continues -- and organizations consider strategies to meet the shortfall -- outsourcing application development to experts is becoming a reality. But why are those skills outsourced, and what are the potential risks of outsourcing?

We spoke to Sreedhar Veeramachaneni, CEO and founder of System Soft Technologies, a Florida-based IT products, services, and solutions company focused on helping organizations optimize their IT processes and infrastructure.

Continue reading

Why the future of security is biometric

CSZ infog header

With the security of IDs and passwords increasingly under scrutiny, more people are becoming interested in using biometrics to verify their identity and authorize payments.

Technology education course guide Computer Science Zone has produced an infographic looking at the advantages of biometrics and how they are gaining in popularity.

Continue reading

Online retail fraud up nearly a third in the 2019 holiday season

Fraud stop

A new study shows a 29 percent increase in suspected online retail fraud during the start of the 2019 holiday shopping season compared to the same period in 2018, and a 60 percent increase over the same period from 2017 to 2019.

The findings from iovation, the fraud prevention arm of TransUnion, are based on the online retail transactions analyzed for its e-commerce customers between Thanksgiving and Cyber Monday over the last three years.

Continue reading

New software delivery models mean a change to customer relationships

SaaS

The move to new business models for software, such as subscription services and SaaS, will require suppliers to better understand their customer relationships and offer improved usage data, says a new report.

The study from Flexera suggests that with subscription and usage-based models comes a demand for consistent, persistent level of customer engagement, supported through compliance and transparency.

Continue reading

Weak passwords leave UK businesses at risk of cyberattack

Stealing password from code

Millions of people and hundreds of thousands of businesses in the UK are using cracked or weak passwords for their online accounts according to new research.

Cybersecurity and data analytics CybSafe has conducted a blind-analysis of the passwords used by over 21,000 staff at a sample group of 250 UK businesses, and finds that three quarters are employing staff with vulnerable password combinations -- either passwords which are too simple, or which have been compromised in previous data breaches.

Continue reading

New tool helps in the fight against weak passwords

Written passwords

Poor passwords frequently provide hackers with a way into networks. In order to help security teams and penetration testers identify them, Trustwave is launching a new cracking tool.

CrackQ is a queuing system to manage password cracking that works with the Hashcat tool which uses the power of GPUs to crack passwords.

Continue reading

Tech startups set to shake the traditional insurance market

insurance key

The insurance industry has been around for over 300 years, but the rise of small, agile businesses employing new technology like AI is disrupting life for more established players.

A study from IT and consulting firm NTT DATA shows 'insurtech' startups have globally raised more than $11bn in the last three years, more than double previous years.

Continue reading

Cyber attacks become more targeted with data theft as the goal

Cyber attack

Mass cyber attacks are now being outnumbered by targeted attacks, with 65 percent of the total in the third quarter of 2019 being targeted, compared to 59 percent in the previous quarter.

The latest threatscape report from Positive Technologies also shows data theft grew to 61 percent of all attacks on organizations and 64 percent of all attacks on individuals (compared to 58 and 55 percent respectively in the second quarter). The share of attacks with direct financial motivation was 31 percent.

Continue reading

Why digital transformation and security should go hand-in-hand [Q&A]

DevSecOps

Digital transformation is becoming an essential part of many business initiatives and of course security is a high priority too. You would think that two such essential areas would exist in close harmony, but it isn't always the case.

In the age of digital transformation security can get left behind. So, what can businesses do to ensure that new digital initiatives are secured from the start? We spoke to John Worrall, CEO at application and infrastructure security specialist ZeroNorth to find out more.

Continue reading

Why mobile healthcare apps are at risk [Q&A]

health apps

Cyber-attacks represent a real threat to unprotected healthcare mobile apps. The overall operational integrity of these apps is at risk, but there's also a significant risk of malicious attacks on the medical devices themselves, personal health information, and intellectual property.

We spoke to Rusty Carter, VP of product management at Arxan to find out more about the risks and how they can be addressed.

Continue reading

A quarter of UK smaller businesses don't have an IT disaster plan

disaster plan

Almost one in four of UK SMEs -- around 1.4 million businesses -- don't have an IT disaster recovery plan in place. Yet, 80 percent of businesses who suffered a major incident ended up failing within within 18 months, according to the Association of British Insurers.

A survey of over 1,100 IT workers by technology services provider Probrand also finds 54 percent reveal that their disaster plan isn't regularly tested to identify and fix any potential flaws in their DR process.

Continue reading

Cybersecurity is not top priority for enterprises say CISOs

Enterprise security

Chief information security officers (CISO) are regularly being summoned by the board of directors to provide recommendations for the business, but this doesn’t mean cybersecurity is being prioritized.

A new study of over 300 cybersecurity executives by 451 Research for Kaspersky finds 60 percent of respondents say business leaders need input from their CISO most often when an internal cybersecurity incident happens, while 57 percent schedule meetings with the board on a regular basis, and 56 percent are requested to provide their expert opinions on future IT projects.

Continue reading

How the real-time data gold rush creates steep learning curves for developers [Q&A]

real-time data

By 2025, industry analyst firm IDC predicts that 30 percent of all data will be real-time. The avalanche of streaming data frameworks, libraries and processing engines has created a massive learning curve for developers.

We spoke with Craig Blitz, product director of cloud native application platform Lightbend to learn more about where we are in these early days of streaming data development, and how Lightbend's newly launched open source framework, Cloudflow, aims to support developers pursuing real-time use cases.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.