Zoho launches revamped platform to create business mobile apps
Business operating system Zoho is launching an updated version of its Creator apps builder, delivering the ability to build native mobile apps to automate business processes.
Zoho Creator 5 introduces a drag-and-drop interface to complement its HTML/CSS screen creator, and includes pre-built design elements like buttons, layouts, and reports that users can drag onto their page.
McAfee brings machine learning to enterprise security
Cyber security company McAfee is announcing an expanded product portfolio that evolves security operations capabilities and allows for rapid response to today’s threats.
McAfee's updated Enterprise Security Manager (McAfee ESM 11) uses a new data architecture optimized for scalability, performance, faster search, and collaboration. This is combined with the newly launched McAfee Behavioral Analytics, and enhanced McAfee Investigator, McAfee Advanced Threat Defense, and McAfee Active Response.
Almost six out of 10 organizations suffer ransomware attacks
New research reveals that 56 percent of surveyed decision makers from IT and risk, fraud or compliance functions report that their organization has suffered a ransomware attack in the last 12 months, compared to under half (48 percent) who said the same in 2016.
The study of 500 businesses in the UK, France, Germany and USA commissioned by SentinelOne and carried out by Vanson Bourne shows 69 percent say the most successful ransomware attack resulted in the attacker being able to encrypt some data, with five percent paying the ransom to decrypt the data.
Unsecured third-party IoT devices could pose major risks for organizations
According to new research, 97 percent believe unsecured IoT devices could be catastrophic for their organization, yet just 29 percent actively monitor for related third-party risks.
The study conducted by the Ponemon Institute and risk assurance body Shared Assessments shows 81 percent of respondents say that a data breach caused by an unsecured IoT device is likely to occur in the next two years.
Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]
With GDPR coming into effect on 25th May, many organizations will find themselves needing to appoint a data protection officer in order to comply.
But appointing full-time compliance staff can be a difficult and costly exercise. Which is why cyber security company ThinkMarble is launching a Virtual Data Protection Officer (VDPO) service.
Lack of investment in security training adds to skills gap
Cyber security is seen as one of the biggest threats to business. Yet employees are not being supported by their organizations when it comes to investing in their continued education and career development.
Crowd sourced IT and security training solution Cybrary, along with cyber security research body the Cyentia Institute, have produced a report looking at the cyber skills gap.
Mainframes become more important to enterprises but staff shortages pose problems
The mainframe is becoming more important to large enterprises, with the percentage of organizations running at least half their business-critical applications on these platforms expected to increase next year.
But the loss of skilled mainframe staff, and the failure to subsequently fill these positions, poses significant threats to application quality, velocity and efficiency.
New developer tool aids deployment of AI applications
There's increasing demand for AI and machine learning solutions from businesses, but often a shortage of skills is holding back implementation.
Cloud computing specialist Paperspace is launching a new tool called Gradient to allow developers to tap into a dedicated cloud of AI solutions for building, training and deploying machine learning applications.
Samsung unveils rugged Galaxy Tab Active2 business tablet with LTE
Quality Android tablets are becoming increasingly rare on the consumer market. Why? There are many reasons, such as the adoption of large-screen smartphones. When your phone has a 6-inch screen, a 7- or 8-inch tablet can feel redundant. Not to mention, despite an arguably stronger economy, there are still many consumers that don’t have much disposable income.
Where Android tablets still have a fairly bright future is in the enterprise. For many jobs, sitting down with a laptop is not possible. Instead, being active with a tablet can be preferable. Today, Samsung unveils the Galaxy Tab Active2 -- a rugged Android 7.1 business tablet with integrated LTE (carrier unlocked). It is very rugged (MIL-STD 810G certified) making it great for dirty jobs -- even the S-Pen is rugged. And yes, it has USB-C.
New partnership delivers data-driven insights into customer behavior
Businesses have more data than ever about their customers, but it can be hard to extract meaningful insight from it.
A new partnership between data warehousing company Snowflake Computing and data analytics platform Segment aims to give enterprises the ability to carry out rapid analysis of customer data at scale.
Automated simulation platform helps enterprises understand cyber risks
Hackers and cyber criminals often seek to exploit human errors like misconfigurations, poor security practices and the use of shadow IT.
In order to help businesses assess the risk XM Cyber is launching an automated advanced persistent threat (APT) simulation platform, HaXM, to continuously expose all attack vectors, above and below the surface.
Businesses are failing to understand the impact of cloud outages
Many firms in the UK are failing to understand their responsibilities in relation to systems in the cloud, according to a new study.
The research from Veritas Technologies shows that 66 percent of respondents believe that dealing with cloud service interruptions is the primary responsibility of their cloud service provider.
Netskope brings continuous assessment and monitoring to IaaS security
Cloud access security specialist Netskope is launching an expansion of its Infrastructure as a Service security offering to add continuous security assessment and monitoring capabilities.
With this release customers can use Netskope for IaaS to continuously assess their infrastructure-as-aservice (IaaS) and platform-as-a-service (PaaS) configuration in AWS, with Microsoft Azure to follow soon.
SAP CRM servers vulnerable to online attack
Researchers at cyber security platform ERPScan have disclosed details of two vulnerabilities that allow compromise of the widely used SAP CRM system.
CRM is considered as a most critical asset by businesses. A data breach into CRM can be disastrous as it can destroy trust in the business and severely tarnish the brand as well as raising compliance issues.
70 percent of companies would fail an access control audit
A new study into privileged access management from account protection specialist Thycotic shows that while over 60 percent of organizations must satisfy regulatory compliance requirements surrounding privilege credential access, a worrying 70 percent would fail an access controls audit.
Access to privileged accounts allows more rights and permissions than those given to standard business users, yet 51 percent fail to use a secure logon process for these accounts.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.