New open source database designed for enterprise users

Business database

Businesses are looking for database technology that increases their agility, scalability, security, and supports a range of different use cases, at the same time keeping down costs.

On the other hand developers want a database that is open and extensible, and lets them easily develop many different types of application.

Continue reading

New software adds secure authentication to any enterprise application

identity login

Increased numbers of phishing and other cyber attacks are putting companies under greater pressure to secure their applications.

Conventionally this requires re-coding or other work to achieve, but new software from behavioral firewall specialist Preempt lets organizations add secure authentication to any enterprise application.

Continue reading

Phishers cash in on WannaCry attack

Phishing

The UK's ActionFraud cyber crime reporting center is warning customers of BT’s internet services of a phishing scam claiming to protect against WannaCry-style attacks.

The emails claim that BT has launched preventative measures to protect data on an international scale and try to get recipients to click on a link to a 'security upgrade'.

Continue reading

Digital assistants set to outnumber people by 2021

digital assistant

The number of digital assistants installed is on track to exceed 7.5 billion by 2012, which is more than the world population.

According to technology research company Ovum, Google Assistant will dominate the voice AI–capable device market with 23.3 percent market share, followed by Samsung's Bixby (14.5 percent), Apple's Siri (13.1 percent), Amazon's Alexa (3.9 percent), and Microsoft's Cortana (2.3 percent).

Continue reading

Cyber crime is a $6 trillion a year industry

Cyber attack

Last week's WannaCrypt attack infected over 200,000 devices and is estimated to have made its perpetrators $72,000.

Increasingly scammers and criminals are seeing the internet as a means of making financial returns. Cyber crime has become a serious business and no business or information is safe from attack.

Continue reading

New free plugin filters bot data from Google Analytics

Choice

Google's own bot filtering catches only a small percentage of the bot traffic that hits most sites, leading to traffic analysis data being skewed.

Bot detection specialist Distil Networks is launching a free tool designed to remove the bad data created by bots.

Continue reading

European political parties left open to email-based cyber attacks

Email attack

None of the political parties in the UK, Germany and Norway, all of whom have upcoming elections, have email authentication or protection against spear phishing in place, according to new research.

The study by secure email company Agari shows that while eight percent have published an email authentication policy, they've left the door wide open by setting their policy to 'none', which will not stop malicious emails from reaching intended victims.

Continue reading

Are your devices listening to you?

microphone listening

Increasingly we're surrounded by devices that have microphones. Not just our computers and smartphones, but smart home devices like Alexa and Echo and even our TVs.

The problem is these mics are not just accepting commands, they're listening to what's going on in the background too.

Continue reading

New platform helps deliver industrial IoT solutions

Internet of things

Enterprises are under increasing pressure to adopt the benefits the Internet of Things can offer, but they need to be able to deliver fast performance at large scale.

IoT platform company infiswift is launching a new solution to deliver powerful IoT infrastructure that can also be scaled down from the cloud to run on an edge device like a Raspberry Pi or Arduino.

Continue reading

Cyber security professionals don't trust data from their tools

Broken trust

A majority of cyber security professionals don’t trust the data that they get from their tools according to a new report from risk analysis company Bay Dynamics.

The survey, carried out by research firm Enterprise Management Associates, of more than 400 security professionals in organizations with more than 5,000 employees reveals that 52 percent of threat alerts are improperly prioritized by systems and must be manually re-prioritized.

Continue reading

Updated EnCase software enhances endpoint protection

endpoint shield

The weakest point in any network is usually the endpoint, so effective protection measures are essential to fend off cyber attacks.

Security specialist Guidance Software is launching an updated version of its EnCase Endpoint Security solution aimed at providing enhanced endpoint detection and response (EDR) capabilities for businesses.

Continue reading

Huddle simplifies bulk document collection

In any organization teams often waste valuable time requesting, tracking and chasing documents. In the process they can run up against file size and mailbox limitations as well as trying to track who holds and has sent which files.

To help with all this, collaboration specialist Huddle is launching a new File Request feature designed to make the collection of files more secure, and up to 80 percent more efficient.

Continue reading

Cray partnership delivers supercomputing-as-a-service

Cray Urika

The latest generation of supercomputers are able to deliver unparalleled processing power, but their cost puts them beyond the reach of many businesses and researchers.

A new partnership between cloud computing and data center specialist Markley and leading supercomputer brand Cray is offering supercomputing-as-a-service to make it easier and more affordable for research scientists, data scientists, and IT executives to access dedicated, powerful computing and analytic capability.

Continue reading

Is WannaCry linked to the Lazarus Group?

Hacking

As last Friday's WannaCry (WannaCrypt) ransomware attack continues to cause ripples around the globe, links have emerged between the malware code and the infamous Lazarus Group.

Lazarus is the group responsible for attacks on the Bangladesh Central Bank last year, Sony Pictures Entertainment in 2014, and more financial attacks in at least 18 countries.

Continue reading

Three out of five companies expect to be breached in 2017

Breach detection

As cyber attacks and security breaches continue to make the headlines, a new study suggests that three out of five companies expect to suffer a breach this year.

The latest Market Pulse survey from identity management company SailPoint also reveals that 33 percent believe they may not even know they’ve been breached.

Continue reading

Load More Articles