BetaNews Staff

Best practice steps for safe data sharing

file sharing

Digital data is everywhere. You only have to look at how much data is transmitted over the internet on a weekly, daily, hourly, or even second-by-second basis to understand just how much data is being shared. In fact, at the start of 2020, the amount of data in the world was estimated to be 44 zettabytes. Given how much data is created every day, pundits predict that this will likely increase to 175 zettabytes by 2025

As employees and businesses, we are constantly sharing information. Likewise, the number and variety of entities and individuals we share that information with has grown exponentially. No longer is this simply restricted to the perimeter of our own businesses, but it now extends to partners, suppliers, customers, prospects, and influencers around the globe. Consequently, the challenge for most organizations now is: how do we share data easily, quickly, yet also securely? 

Continue reading

Leveraging MISP and TheHive when you create your cyber threat intelligence practice

DevSecOps

Many CISOs I speak with across Europe tell me their cybersecurity teams rely on two, primary open-source platforms within their security operations (SecOps). The first is Malware Information Sharing Platform (MISP), that allows the storing and sharing of indicators of compromise (IoCs) with other MISP users. The second is TheHive, designed for security incident response (IR). The two solutions are tightly integrated so that SOCs, CERTs and any security practitioner can act more quickly when incidents happen. 

For organizations with limited resources or just beginning to build a SecOps practice, MISP and TheHive are easy-to-use tools to help your teams react to malicious threats. The next step to proactively mitigate risk from the full breadth of threats your organization is facing, is to leverage MISP and TheHive to create a cyber threat intelligence (CTI) practice. To do this, you need to consider a third platform that integrates with these two solutions and provides five essential capabilities for a CTI practice so your teams can get ahead of threats.

Continue reading

Why digital transformation is an ongoing process for enterprises

digital transformation

It’s already well known that COVID-19 accelerated digital transformation. McKinsey estimates that it shot forward by about 7 years of progress within just a few months, and CNBC reports that 85 percent of companies sped up their digital transformation plans, but the real question is what happens now?

You could say that there are 3 main pillars to digital transformation, and they don’t necessarily take place one after another. These pillars include:

Continue reading

Finding the formula to combat back-to-work anxiety in STEM

Mental health is a popular topic at the moment, while the majority of us were trying to maintain a healthy routine and lifestyle while stuck indoors, it begged the question, what about after lockdown? Back to work anxiety was bad enough for some of us after months of leisure time and lie ins. But entering the next stage of eased lockdown regulation is a cause of mental health disruption for some of us, bringing a sense of unease, worry, and anxiety.

At first, the thought of losing our freedom and summer plans caused anxiety in itself, but once we got used to our new life it subsided. While some are eagerly anticipating a return to work and normality, others are genuinely distressed by it -- whether this is facilitated by concerns of the virus or facing our colleagues, there’s a real issue that needs addressing.

Continue reading

Digital transformation: 5 steps your company must take to succeed instead of survive

Digital transformation

COVID-19 has changed the way companies think about digital transformation because it has accelerated the need to increase business connectivity while operating from decentralized settings.

Chief Technology Officers (CTOs) have been tasked with keeping their places of business at the forefront of the latest tech innovations. In a recent Gartner survey, 47 percent of respondents said their CTO is dedicated to modernizing core technology infrastructure in order to spur innovation.

Continue reading

Why IT needs smarter cloud security

Cloud data security

For IT and security professionals, the job of keeping the enterprise secure is becoming an ever more complex proposition. In addition to the fact that distributed working looks set to become a permanent feature, keeping up with a raft of emerging new technologies while dealing with the rising tide of cyber threats means there is a growing number of tasks to keep on top of.

With time and resources in short supply, gaining full visibility of data from across the entire security stack will be key to achieving better and more comprehensive threat detection. But maintaining robust policies and controls also depends on adopting technology that is able to adapt quickly and self-learn from user behaviors.

Continue reading

Edward Snowden: The untold story of how one patriotic American exposed NSA surveillance

Snowden: Facebook is allowing the government to see your messages

Edward Snowden might not yet be a historical figure, but he certainly is a hero. He is the whistleblower of all whistleblowers, the American who blew the lid off of Washington's spying on private citizens. But Snowden’s leak revealed that it’s not just the U.S. government that is spying on virtually every American -- big American telecommunications companies are also helping them to spy as well.

Snowden’s upbringing is largely uneventful. His maternal grandfather was a Coast Guard rear admiral and his father was also an officer in the Coast Guard. His mother was a U.S. District Court clerk. His parents divorced around the time that he would have graduated high school in 2001, but Snowden is a high school dropout. After a nine-month absence due to mononucleosis, he simply took the GED exam and then began taking community college classes. Despite a lack of a bachelor’s degree, he worked at a master’s online from the University of Liverpool.

Continue reading

2021 cybercrime and protecting your data

2020 was a difficult year all around. Many organizations are still adjusting to the new landscape while trying to plan for the future. Cybercrime was at its prime in 2020 with global costs climbing as high as $1 trillion, according to CSIS research. Unfortunately, with the pandemic dragging on and an extremely drained remote workforce that still needs to be secured, there is every chance that cybercrime will be an even bigger headache in the months ahead. 

Numerous aspects are aligning to create even more dangerous situations. Organizations that fail to identify and address these impending hazards will be at risk from increased cyber-attacks and data breaches. But these types of imminent disaster can be averted with the right plans. By aligning security efforts with business goals, redesigning infrastructure, and looking at new technologies, organizations can build resilience while setting themselves up for future success. 

Continue reading

How to preserve consumer trust amid new data privacy regulations

Trust card

Following the passing of Virginia’s Consumer Data Protection Act and the Washington Privacy Act currently making its way through the legislature, states across the country are working to expand consumer rights over their personal data. As rights requests emerge for enterprises affected by current and future data privacy regulations, businesses cannot trust the person making the request is who they claim to be. With fraud escalating as cybercriminals are taking advantage of online-only operations amid the COVID-19 pandemic, enterprises need to ensure they can authenticate users making rights requests to avoid the devastating repercussions of handing personal data to fraudsters.

This article will discuss new considerations for enterprises amid new state privacy regulations to keep data secured and out of cybercriminals’ reach. 

Continue reading

A smart data strategy will power your embedded analytics forward

Let’s get real about real-time data.

We are reminded daily how real-time data makes business decisions easier. Timing is essential. Yet still overlooked in the need for real-time data is operationalizing the data itself. Timely data is just part of the equation. Being able to glean actionable insights in a timely manner is the other part. According to research by Enterprise Strategy Group, 38 percent of IT and business professionals say complexity and usability issues with their business intelligence platform is a challenge.

Continue reading

How advanced analytics can help law enforcement and security organizations overcome cryptocurrency challenges

Bitcoin more acceptable

In today’s hectic news cycle, there always seems to be a new story angle that is focused on cryptocurrency. The increasingly popular digital currency’s market value recently reached $2 trillion for the first time and the Coinbase IPO was referred to as "crypto’s coming-out party." But, just as cryptocurrencies are gaining traction with consumers as legitimate transactions, they are also massively used by criminal actors and terrorists, with a global total of $10 billion in illicit activities in 2020.

Though technology has helped to advance industries and markets tremendously, it is clear that advanced technology has also played a part in illegal activities around the world. We are witnessing a drastic shift from the traditional financing of criminal and terror actors to a new world of digital financing, creating a seriously daunting task for security and law enforcement organizations to anticipate, track and identify illegal activities.

Continue reading

Moving to the cloud? A look at enterprise security considerations

Cloud security

Of the technologies that saw a spike due to the pandemic, cloud-based services are experiencing a bump in enterprise sales. The enterprise previously had been trailing scrappy upstarts in terms of digital transformation, largely because of the complications associated with moving tens of thousands of endpoints into a new environment. With entire workforces shifting to work-from-home environments, though, movement to the cloud has become all but inevitable.

According to IDC, digital transformation in the enterprise has accelerated since the start of the pandemic as enterprises seek greater flexibility and cost efficiency. Yet, enterprise security teams are posing a slew of new questions to cloud vendors about the security of their offerings. Best case scenario, this adds time to an already lengthy buying cycle. Worst case, security practices and protocols can kill a contract.

Continue reading

5 simple steps to prevent cloud overspend

Cloud dollars

There are several drivers that have fueled the surge in cloud usage globally. Businesses are recognizing that the cloud provides a level of flexibility that in-house environments cannot match. Cloud makes it easy to scale up and down quickly and efficiently with nearly unlimited resources. Adding capacity to an enterprise system can often take days in an on-premises data center, if there is capacity, but can be accomplished in minutes in the cloud.

As we have witnessed over this past year, with a sudden need to work from home, cloud rescued many enterprises by providing an abundance of resources quickly. It empowered millions of employees to work from home when circumstances were not conducive to work from their office. Therefore, it's not surprising to see the report from Research and Markets forecasting the global cloud computing market to reach $832.1 billion by 2025. However, with increased cloud usage comes the challenge of managing that consumption and avoiding overspend.

Continue reading

10 notable tech conferences of 2021

Technology conferences are some of the most exciting to attend and experience because of how fast advancements are made in the field. Whether you’re an enthusiast interested in the latest or greatest gear, looking for new business technologies, or you want to see some new STEM achievements, there’s a lot of potential out there.

As the pandemic winds down, things are opening back up, and that means many new and exciting in-person events are kicking off, as well. Here are the top 10 noteworthy tech conferences of 2021.

Continue reading

The technology that is shaping bridge construction

Technology and engineering go hand in hand. They rely each other to further progress innovation across all sectors. For bridges, technology has allowed designs to push the boundaries of what was once thought possible.

New designs and improving maintenance services increase efficiency and reduce waste with the help of technology. While some innovations are moving into the mainstream, others can give us an indication of which direction bridge engineering is heading in. Here, we look at the most promising technology that is creating the future of bridge construction.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.