Cryptomining malware targets unpatched servers
Cybercriminals are increasingly targeting unpatched server vulnerabilities to infect machines with cryptomining malware, according to a new report.
The study from Check Point Software Technologies sees cryptomining malware dominate Check Point’s Top Ten Most Wanted Malware Index, the Coinhive variant retains the top spot with a global reach of 16 percent. Cryptoloot -- another crypto-mining malware -- is close behind with a global reach of 14 percent, while the Roughted malvertising malware came in third (11 percent).
Shadow devices put enterprise networks at risk
A new study finds that enterprise networks have thousands of shadow personal devices including laptops, tablets and mobile phones, as well as Internet of Things devices -- such as digital assistants and smart kitchen appliances -- connecting to them.
The report from network control company Infoblox shows 35 percent of companies in the US, UK and Germany reported more than 5,000 personal devices connecting to the network each day.
CRM technology isn't keeping pace with business needs
CRM systems should make communication with customers easier, but a new report from ProsperWorks, the CRM tool for Google's G Suite, suggests CRM technology isn't keeping pace with the needs of the digital workforce.
ProsperWorks commissioned research firm Lab42 to conduct a survey on sales relationships and CRM pain points from those that frequently use CRM systems. The findings show that the way companies interact with customers is changing but CRM technology is too manual, hasn't evolved and is not focused enough on fostering relationships.
Companies can turn GDPR compliance into competitive advantage
GDPR comes into force on May 25th and will have an effect on all companies that collect user data even if they are outside the EU.
Independent identity research and strategy company One World Identity has produced a report that aims to serve as a definitive primer on what companies need to do to comply, and help them turn that compliance into a competitive edge.
Most companies not putting adequate investment into application security
According to a new survey from Arxan, only 25 percent of respondents say their organization is making a significant investment in solutions to prevent application attacks.
This is despite awareness of the negative impact of malicious activity. A worrying 65 percent of companies say they would be spurred to increase application protection measures only after an end user or customer was negatively affected.
How managed services can help businesses with GDPR [Q&A]
With GDPR implementation now only weeks away many businesses are still not fully prepared for the impact of the new legislation.
We spoke to Matt Klassen VP of cloud marketing at IT service management specialist Cherwell Software to find out how managed services can help companies to comply with GDPR by the may 25th deadline and to manage the additional workload it's likely to create.
The rise of the experimentation team
2017 was the year of DevOps with companies focusing on delivering better customer experience and improving operational efficiency. According to a recent Forrester report, over 60 percent of organizations surveyed said they have either already implemented or are expanding their DevOps efforts in the future. With the rise of DevOps, greater investments in software development and a faster release cadence comes a need to measure the impact of these efforts and ensure they are delivering valuable software faster. To do this, organizations are taking a more modern approach to code deployment, release management, and measurement of outcomes.
This approach known as experimentation is a new product development workflow, combining DevOps and Product Analytics, helping organizations both speed up product delivery while simultaneously providing critical insights on the performance of their features and products. Every feature release is measured against business and technical KPIs defined by the organization. Experimentation teams, historically only formed at leading technology companies, are now emerging in most enterprises who are starting to look for and build out engineering and product experimentation roles.
The challenges of adopting the Industrial Internet of Things [Q&A]
A future enabled by the Industrial Internet of Things (IIoT) is not so far off, with the integration of IoT devices rising across industrial settings from oil and gas to building security.
The potential to leverage big data and analytics to optimize operations and efficiencies is driving industrial companies to move to IIoT-enabled devices, but these companies are now faced with the challenge of modernizing their legacy production systems.
73 percent of industrial networks are vulnerable to hackers
The industrial control systems (ICS) used to run equipment in manufacturing, energy, and other sectors are secured differently from office networks. Vulnerabilities often go unpatched, because organizations are afraid to make changes that might cause downtime.
To minimize the chances of exploitation of vulnerabilities, measures put in place include placing ICS components on a separate network, isolating them, or air-gapping them entirely from Internet-connected corporate systems. However, penetration testing performed by Positive Technologies has shown that such measures often fall short in practice, leaving attackers plenty of opportunity to access critical equipment.
Turbonomic delivers AI-powered workload automation for the cloud
Workload automation specialist Turbonomic has released a major update to its software, delivering application-aware infrastructure and making any type of workload -- virtual, cloud and container -- self-managing.
Turbonomic's AI-powered decision engine analyzes performance, cost and compliance data across the entire IT stack and generates trustworthy decisions at scale faster than before.
Critical vulnerability found in infrastructure and manufacturing applications
A critical remote code execution vulnerability has been discovered in two Schneider Electric applications heavily used in manufacturing, oil and gas, water, automation and wind and solar power facilities.
The vulnerability, discovered by cyber exposure company Tenable, could, if exploited, give cyber criminals complete control of the underlying system.
The CIO and robotics: Two peas in an IT pod?
Best friends are hard to come by. Once the right one is found, we tend to make conscious choices to invest in those relationships in order to build the right foundation for the future. Unfortunately for many CIOs, it’s a pretty short list of applicants. As organizations change and grow, CIOs will be the resident experts on things like big data, the Internet of Things (IoT) and automation. Not only is this a weighty charge, CIOs are at the forefront of change management, which can feel isolating as they forge new paths.
Now, as automation becomes mainstream, many CIOs are finding an unlikely ally: the robots themselves. But, just like our real-life best friends, it’s important that CIOs choose wisely. By taking the right path to deployment and unleashing the true benefits, CIOs can ensure that their new best friends will be around for the long haul. Here are three ways CIOs can partner with robots to make the most of the relationship.
Windows 10 April 2018 -- what's new for IT pros?
As the keenly awaited Windows 10 April 2018 update (Windows 10 1803) begins its roll out, IT professionals will be interested to see what features it offers them.
Among the developments of interest to professionals is the Windows Autopilot feature which offers cloud powered device management. Using Intune, Autopilot now allows the device to be locked during provisioning until policies and settings for the device get provisioned, ensuring that by the time the user gets to the desktop, the device is secured and configured correctly.
The impact of AI in the data center [Q&A]
The rise of artificial intelligence (AI), automation and machine learning is changing the way IT professionals approach data center operations and management. And the possibilities are endless -- from lowering operational costs and reducing time to deploy new applications -- there’s no doubt that AI is transforming the data center.
We spoke with Hal Woods, chief technology officer of storage and data management specialist Datera, to learn more.
81 percent of organizations see an increase in cyber security challenges
A new study from IT solutions provider US Signal reveals that businesses are seeing a greater number of security challenges.
The survey of security experts from a cross-section of organizations also shows 40 percent of respondents experienced at least one security incident in the last year, and 13 percent didn't know if they had.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.