Software supply chain attacks set to become a major threat
According to a new study, 80 percent of IT decision makers and IT security professionals believe software supply chain attacks have the potential to become one of the biggest cyber threats over the next three years.
The survey by Vanson Bourne for endpoint security company CrowdStrike finds two-thirds of the surveyed organizations experienced a software supply chain attack in the past 12 months.
SUSE launches new enterprise Linux to help the move to software-defined infrastructure
Businesses are increasingly running a mix of traditional and software-defined architectures and the launch of SUSE Linux Enterprise 15 is aimed at bridging the gap between the two.
It's a modular operating system that helps make traditional IT infrastructure more efficient and provides an engaging platform for developers. It also aids in integrating cloud-based platforms into enterprise systems, merging containerized development with traditional development, and combining legacy applications with microservices.
New survey conveys the challenges of the Windows 10 migration
It has been heralded as the last version of Windows you will ever need. This is great news for internal IT. Rather than large abrupt OS version updates such as the cumbrous leap between Windows 7 and 8, the Windows-as-a-Service delivery of Windows 10 will allow for regular incremental improvements and updates. The expectation is to eliminate the arduous elongated process of OS migrations that require significant planning, training and working hours. For those who need any further incentive, there is also the impending end-of-life deadline in January 2020 for Windows 7. Of course, to get to Windows 10, you have to endure one final big upgrade.
Fortunately, Microsoft has taken great strides to simplify the Windows 10 migration process. New deployment methodologies that utilize images, task sequences and provisioning packages make the deployment process far more agile today. That does not mean there aren’t challenges in the process however. The hurdles instead lie in the standardization of the user workspace. It is the details of ensuring that all those configuration settings, applications, printers and security protectants are delivered to ensure a secure productive work environment.
Traditional identity systems are the new battleship row
In 1941, the US Military was trying to save on security costs by mooring its battleships close together while they were in port. Aircraft were also parked neatly in rows. Many of the most valuable assets of the Pacific Fleet were all centralized in one convenient spot that was well organized, easy to find, and therefore easy to attack.
On 7 December 1941, a date that will live on in infamy, that is exactly what happened.
BetterCloud adds activity-based alerts to boost G Suite security
SaaS management platform BetterCloud is launching a new activity-based alerts solution for Google to strengthen security for G Suite applications.
The solution enables organizations to continuously monitor event-related activity for malicious or unauthorized behavior, and automates security responses to rapidly address security risks.
Poor infrastructure monitoring leads to outages, slowdowns and missed targets
Almost 90 percent of enterprises fail to meet SLA targets due to inadequate monitoring of IT infrastructure, according to a new report.
The study by Dimensional Research for infrastructure performance management specialist Virtual Instruments, reveals that 61 percent of respondents report that they experience four or more significant application outages and/or slowdowns each year.
Data lakes improve business decision making
The data lake has long been a powerful tool for data scientists and engineers. But today’s business environment often requires users without coding or scripting skills to access the data stored in lakes.
A new study from analytics and business intelligence specialist Arcadia Data looks in detail at the use of data lakes and the analytical tools that surround them.
McAfee launches new enterprise security portfolio
As businesses move more of their systems into the cloud the protection they require to keep them safe needs to be more flexible.
Cybersecurity specialist McAfee is responding to this challenge with the launch of McAfee MVISION, a portfolio of products which strengthens the device as a control point in security architectures, delivers simplified management, stronger Windows security, behavior analytics, and threat defense for Android and iOS devices.
This is how prioritization can save us from the shortage of cybersecurity professionals
It is no secret that the technology sector has a labor problem. As demand for new products and services continues to rise, we are simply not producing enough qualified developers to keep up. Just ask any company where their greatest pain point is and they will have hiring somewhere towards the top of that list.
This shortage is felt especially acutely when it comes to security professionals that understand both how code is written, and how to keep it secure. A 2018 report from the Enterprise Strategy Group (ESG) found that 51 percent of respondents reported shortages of cybersecurity skills as an area of concern. These concerns have been on the rise in recent years, spiking from a reported 23 percent in 2014 citing cybersecurity skills as a problem, up to the latest 51 percent statistic from this year.
Business priorities lead to multi-cloud strategies
A new report finds that 86 percent of businesses describe their cloud strategy as multi-cloud today, with performance and innovation rising above cost savings as the top measures of success.
In addition the report, produced by Forrester for enterprise cloud specialist Virtustream, reveals that 60 percent of enterprises are now moving or have already moved mission-critical applications to the public cloud.
80 percent of IT decision makers say outdated tech is holding them back
A study by analysts Vanson Bourne for self service automation specialist SnapLogic looks at the data priorities and investment plans of IT decision makers, along with what's holding them back from maximizing value.
Among the findings are that 80 percent of those surveyed report that outdated technology holds their organization back from taking advantage of new data-driven opportunities. Also that trust and quality issues slow progress, with only 29 percent of respondents having complete trust in the quality of their organization’s data.
100 percent of corporate networks vulnerable to insider attacks
Penetration testing company Positive Technologies has released some alarming figures surrounding the vulnerability of corporate networks to insider attacks.
During testing performed as an internal attacker, the company's researchers were able to obtain full control of infrastructure on all the corporate networks they attempted to compromise. Only seven percent of systems were assessed as having 'moderate' difficulty of accessing critical resources.
Two out of three IT pros don't comply with all data laws
According to a new study, 68 percent of IT professionals believe their organizations are failing to carry out all procedures in line with data protection laws.
The report from digital security specialist Gemalto also shows 65 percent of companies are unable to analyze all the data they collect and only just over half (54 percent) know where all of their sensitive data is stored.
The importance of cybersecurity training for business
While businesses spend a lot of time and effort putting up technical defenses to protect their systems, often the weakest spot is the users.
Employees can do harm to the business by visiting infected websites, responding to phishing emails, using business email through public Wi-Fi and more. Spam filtering service EveryCloud has put together an infographic looking at why it’s therefore important for companies to offer cybersecurity training.
77 percent of industrial organizations worried about cybersecurity incidents
Information technology and operational technology are gradually moving closer together thanks to wider connectivity of OT with external networks, and the growing number of industrial IoT devices.
While this boosts the efficiency of industrial processes, it also presents new risks and vulnerabilities according to a new report from Kaspersky Lab.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.