Is latency the cloud's Achilles heel? [Q&A]

Cloud maze complexity

The cloud is arguably the most transformative enterprise technology in the past two decades. Yet, as powerful as it is, it faces a huge latency problem -- and the big public cloud providers know it.

Their data centers can't be everywhere and close to every end-user, so the big distances created result in unavoidable latency.

Continue reading

Uncovering the everyday frustrations of cybersecurity professionals

Head in hands

Anyone who has worked in IT knows that it can be a frustrating experience at times. A new survey carried out by network security provider Lastline at RSAC 2019 set out to discover security professionals' attitudes and frustrations towards their jobs.

These come from a number of places, including resources, management and other workers. We all know that there's a skills shortage in security, but funding is often an issue too.

Continue reading

Helping organizations understand the pros and cons of blockchain

Blockchain word cloud

Blockchain is often seen as a game-changer for businesses, governments and criminals alike. But, as organizations rush to deploy applications based on blockchain technology, do the potential benefits outweigh the information risks?

The Information Security Forum (ISF) is releasing a new briefing paper aimed at boosting understanding of the technology.

Continue reading

Protecting card data and more in the contact center [Q&A]

call center

Although many transactions are now carried out online, contact centers remain an important tool for businesses.

Call and contact center payment security solutions provider Semafone has had its latest Cardprotect (version 4) product validated by the Payment Card Industry Security Standards Council (PCI SSC) against the latest version of the Payment Application Data Security Standard (PA-DSS). This makes it one of the only companies in the industry to provide this level of certification.

Continue reading

Americans are overconfident about cybersecurity

Happy user

A new study from Webroot that examines the cyber hygiene habits of 10,000 Americans, 200 in each state, reveals that 88 percent feel they take the right steps to protect themselves from cyberattacks.

However, just 10 percent scored 90 percent or higher on a cyber hygiene test, with the average respondent getting only 60 percent.

Continue reading

Shining a light onto the dark web

Dark web hacker

The dark web is, by its very nature something of an object of mystery. It's easy to think of it as a huge, closed community hidden from the world in dusty corners of the internet. But what's the reality?

Threat intelligence specialist Recorded Future has done some research to try to understand the dark web's true nature.

Continue reading

New risk assessment capabilities help secure containers

Red and blue security padlock

Container security company NeuVector is releasing new security risk assessment capabilities for enterprises using Kubernetes in production environments.

The features, added to its existing container security offering, include new dashboard widgets and downloadable reports to provide security risk scores for the most critical run-time attack risks, network-based attacks and vulnerability exploits in containers.

Continue reading

Companies continue to struggle with privileged access management

Admin login

Privileged accounts can be a headache for organizations so you'd expect managing them to be a high priority for security teams. However, a new report from Thycotic reveals that 85 percent fail to achieve even basic privileged security hygiene.

In addition 55 percent have no idea how many privileged accounts they have or where they’re located, while over 50 percent of their privileged accounts never expire or get deprovisioned.

Continue reading

97 percent of companies now use agile development methods

Agile development

Agile is clearly becoming the norm in the development community according to the findings of a new report from CollabNet VersionOne which has been charting the agile landscape for 13 years.

The report shows 97 percent of organizations now practicing agile development methods. That's not to say its use is universal, however, only 22 percent of respondents report that all their teams are agile, 26 percent more than half and 48 percent less than half.

Continue reading

Reported data breaches up more than 56 percent

data breach

According to the latest Data Breach Report from Risk Based Security the number of reported data breaches was up 56.4 percent in the first quarter of 2019 compared to the same period last year.

The increase in reporting could be a result of new legislation like GDPR that obliges businesses to be more open about security issues. The number of exposed records was also up by 28.9 percent. Already in 2019, there have been three breaches exposing 100 million or more records.

Continue reading

Microsoft announces Internet Explorer mode for Edge to aid enterprise compatibility

New Edge

As part of this week's Build 2019 Microsoft is announcing a number of enhancements to the Edge browser including an Internet Explorer mode for enterprises.

This is aimed at cutting the need for IT staff to manage multiple solutions. Allowing legacy IE-only content -- such as intranet sites -- to be opened in Edge without the need to change any settings or launch a different browser.

Continue reading

Why firewalls still matter [Q&A]

Firewall

Firewalls have been used to protect networks and endpoints from the very early days of the web. In recent years many people have been predicting its demise, yet the firewall is still with us.

Why is this and how has the firewall evolved to protect enterprises in the 21st century? We spoke to Ruvi Kitov, founder and CEO of network security specialist Tufin to find out.

Continue reading

Physical threats rank alongside cybersecurity for many US businesses

Threat

A new study into the threats faced by US businesses produced by Securitas Security Services reveals that in many sectors businesses are concerned as much or more with physical threats such as shootings than they are with cyber security.

It also shows rising concern about the threats posed to organizations by insiders, of the 27 threat categories security executives consider to be a concern, 21 may be caused or carried out by an insider.

Continue reading

IBM uses technology to help hurricane-hit communities

Hurricane

To mark the start of US National Hurricane Preparedness Week this week, The Weather Company, an IBM Business, is releasing not just its 2019 hurricane forecast, but also analytic data that looks at how weather affects preparedness, emotion and consumer habits.

In addition, through its Code and Response deployment initiative which aims to put open source technologies to use for social good, IBM is taking action to help save the lives of people in communities that are vulnerable to natural disasters.

Continue reading

Data breaches spark increased interest in password managers

Stealing password from code

People have been predicting the death of the password for some time, but it's still the case that most online accounts rely on them, even if supplemented by another feature like 2FA.

A new report from Avira to coincide with World Password Day shows that so far in 2019, there have been at least four major data breaches, each impacting more than 200 million records.

Continue reading

Load More Articles