The importance of blockchain security in an interconnected world [Q&A]


Blockchain is best known for its application in securing cryptocurrency. But in recent years it's expanded to drive emerging business in other sectors such as healthcare, real estate, smart contracts, and more.
Because blockchain ensures a tamper-proof ledger of the distributed transactions, it's sometimes used for high-risk transactions and exchanges. But this presents high stakes opportunities for adversaries to steal money and sensitive information.
Data quality incidents take two days or more to resolve


The latest State of Data Quality survey from Bigeye finds that more than half of respondents have experienced five or more data issues over the last three months.
Another 40 percent say they have experienced moderate to severe data incidents within the last six months, and that it took a major effort to avoid damage to the business. These incidents range from severe enough to impact the company's bottom line, to reducing engineer productivity.
Why organizations shouldn't pay ransomware demands [Q&A]


Many organizations around the world are opting to pay ransoms to cybercriminals in order to buy back ownership of their data. But this can leave them open to further risk of attack.
Gerasim Hovhannisyan, CEO and co-founder of EasyDMARC, believes it's wrong to pay up and that it's better to establish good defenses. We spoke to him to find out why.
The technologies driving developer productivity


Hot on the heels of this morning's story about wasted developer time comes a new survey from GitLab looking at the technologies being used to help DevSecOps teams be more productive.
The company surveyed more than 5,000 development, security, and operations professionals about everything from deployment frequency to the practices teams have adopted to learn what the most agile and efficient organizations have in common.
Wasted developer time costs businesses billions


UK businesses are inadvertently wasting over £10.4 billion ($12.97 billion) each year as developers manually carry out routine operations tasks that could be automated.
Software delivery platform Harness calculates the figure based on the fact that developers spend only around 52 minutes a day on actual coding.
New tools suite aims to open up generative AI for the enterprise


It seems that generative AI is everywhere at the moment, but for businesses understanding how best to make use of the technology can be a bit of a puzzle.
Instabase is aiming to help with the launch of a new AI Hub, this is a repository of AI apps focused on content understanding and a set of generative AI-based tools.
Cyber extortion activity reaches new highs


After a decrease of eight percent in cyber extortion (Cy-X) victims in 2022, the data for the first quarter of this year shows the largest volumes to date.
The latest Cy-Xplorer 2023 report from Orange Cyberdefense shows businesses in 96 different countries were impacted by Cy-X in 2022. Since 2020 Orange Cyberdefense has recorded victims in over 70 percent of all countries worldwide.
Three quarters of organizations risk their data with poor backup and protection policies


Just 25 percent of IT professionals are following industry best practices for backing up data, according to a new study from hardware-encrypted storage maker Apricorn.
The survey details data backup, encryption and resiliency protocols for over 250 IT professionals in the United States and Canada over the last 12 months. It finds that while 93 percent of respondents say that they factor in data backups as part of their cyber security strategy, only one in four follow the 3-2-1 rule, in which they keep three copies of data, on two different formats, one of which is stored off-site and encrypted.
Law firms are struggling with their cybersecurity practices


Law firms store some of the most sensitive information available regarding material business transactions, intellectual property and personal data.
But a new study from the International Legal Technology Association (ILTA) and Conversant Group, reveals a disconnect between legal firms' IT and best practice cybersecurity.
Optimizing tech spend to drive value through economic turbulence [Q&A]


Sustained economic volatility has forced organizations of all sizes to make difficult decisions. Whether it's reducing headcount, lowering operational overhead, or cutting costs in other areas, business leaders are looking to increase agility, efficiency, and flexibility ahead of a looming recession.
Global business leaders are facing a unique set of challenges, and many are looking at their tech spend as an area for cost savings. We spoke to Ryan Newsome, chief technology officer at Motus, about how enterprise decision makers can evaluate tech spend through the lens of value creation rather than simply reducing costs.
New vulnerabilities increase by 25 percent


A new report uncovers a worrying 25 percent increase in the total number of new vulnerabilities published in 2022.
The latest Vulnerability and Threat Trends Report from the Skybox Security Research Lab shows 25,096 new vulnerabilities published last year, representing the largest year-on-year rise seen since 2017.
Google Workspace gains passkey support


Following on from its adding passkey support to Chrome and Android at the end of last year, Google is continuing to rollout the technology across all its platforms.
The company is now bringing passkeys to Google Workspace. Passkeys offer a convenient and secure passwordless authentication experience across websites and apps, allowing users to sign in with a fingerprint, face recognition, or other screen-lock mechanism across phones, laptops, or desktops.
Threat intelligence is a priority but organizations lack network visibility


New research from asset visibility and security company Armis shows threat intelligence has become a top priority, yet organizations don't have a clear view of their networks.
The study of 400 IT professionals across the UK shows the top challenges they faced in the last six months as: keeping up with threat intelligence, compliance with cybersecurity regulations and frameworks, staffing and recruitment, an ever expanding attack surface, and visibility into all assets connected to the network.
Ransomware targets specific industries as attack success rate soars


Last month broke ransomware records -- and not in a good way. The latest report from Blackfog shows 66 publicly disclosed ransomware attacks, the highest recorded since the company began reporting in January 2020.
More concerning still is a significant uptick in the attack success rate, with a 154 percent increase over 2022.
How an IT asset checklist can set up CISOs for success [Q&A]


The Great Resignation and tech layoffs have pushed staff turnover to an all-time high. And with every personnel change, years of institutional knowledge are lost in the transition. That information can be critically important for security executives, like CISOs, who must be the ultimate stewards of organizational security across an ever-changing attack surface.
Organizational environments today are increasingly complex and constantly evolving, making it challenging to understand exactly what is at risk at any given moment. For CISOs joining an organization, it is vital to understand exactly what is on their environment to effectively secure it.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.