Three-quarters of organizations not confident in dealing with SSL-based attacks

steal-data-binary-hand

Despite 39 percent of businesses suffering an SSL-based attack in 2016, only 25 percent feel confident in their ability to deal with one according to a new study.

The report from cyber security company Radware shows that cyber attacks are becoming the norm, with 98 percent of organizations experiencing some form of attack in 2016.

Continue reading

What challenges do Industrie 4.0 projects face?

smart factory robot

Algorithms are at the heartbeat of Industrie 4.0 projects, according to Gartner, and that’s going to result in 30 percent of Industrie 4.0 projects sourcing algorithms from leading algorithm marketplaces by 2020.

That means a jump of less than five per cent, compared to what we currently have in the market.

Continue reading

New platform protects industrial IoT devices

Internet of Things

Internet of Things devices are the latest threat vector that businesses have to deal with, introducing a potential extra weakness into corporate networks and leading experts to warn of increased risk.

To help guard against the threat, Mocana Corporation is introducing a new security platform designed to protect IoT devices and associated device-to-cloud communications.

Continue reading

The role of IT decision makers in purchasing new technology

decision decide IT flowchart

IT decision makers (ITDM) in the EMEA region serve as their company's "gatekeepers" and primary influencers, when it comes to choosing new technology purchases for the company. This is according to a new report by Spiceworks, which digs deeper into the roles of ITDMs and business decision makers (BDMs) when it comes to purchasing new technologies.

The study, "ITDM vs. BDM: Tech Purchase Superheroes," says BDM’s role is to "give final approval for technology funds and purchases."

Continue reading

Businesses make automated security a part of DevOps

Business security

Mature development organizations make sure automated security is built into their DevOps practice early, everywhere and at scale, according to a new report by Sonatype.

The report, entitled 2017 DevSecOps Community Survey, is based on a poll of 2,292 IT professionals, and also says IT organisations continue to struggle with data breaches.

Continue reading

IBM announces price-competitive cold storage solutions

IBM logo

IBM is jumping on the cold storage bandwagon, offering a service and trying to take Amazon, Microsoft, and Google a piece of their pie. The company recently announced the launch of IBM Cloud Object Storage Cold Vault, which basically stores data that only needs to be accessed every once in a while.

There will also be a cold storage service with "pay as you use" model, called IBM Cloud Object Storage Flex, coming later this year.

Continue reading

How the best companies avoid downtime costs

Sungard DR header

On average downtime costs an enterprise $686,000 per hour, leading to lost revenue across the economy of more than $26 billion.

Hosting and disaster recovery specialist Sungard Availability Services has put together an infographic looking at the threat of downtime and how the best companies are better placed to deal with it.

Continue reading

The hidden impact of DNS on internet users

DNS

According to a new report, 92 percent of UK companies have limited visibility into the impact DNS performance is having on their internet users and visitors to their online resources.

The study by cyber security company Neustar and research firm Quocirca shows that although DNS is a fundamental utility supporting the internet, and relied on by all businesses, visibility is hampered by complexity with 45 percent of organizations having as many as eight different ways of provisioning their DNS infrastructure.

Continue reading

Analytics alone aren't enough to guide your business

Sales graph

Everywhere you look, businesses of all shapes and sizes are looking to transform themselves into digital businesses. This digital transformation tidal wave is often predicated on building a more robust, data-driven organization.

Executives want to make more informed, more strategic decisions, and see analytics technologies, from big data to predictive analytics to good old fashioned business intelligence, as the silver bullet to do so. It’s no secret that businesses are buying in big. Worldwide revenues for big data and business analytics are expected to grow 50 percent, up from $122 billion in 2015 to $187 billion in 2019, according to research from IDC.

Continue reading

VR's potential in the workplace

Virtual Reality VR Headset Man

In recent years, virtual reality (VR) has captivated our imagination, filling the minds of the masses with potential use cases that seemed straight out of the pages of science fiction films.

While you may instantly think of gaming and entertainment in association with VR, it has tremendous promise for corporate innovation and the workplace of the future. Virtual Reality technology is steadily becoming one of the most sought after pieces of technology that could change the way we host conference calls, present information and collaborate with each other.

Continue reading

Jamf gives admins zero day support for the latest Apple OS releases

applelogoinhand

New releases always present a challenge for system admins and that applies to Apple just as much as other systems.

Device management specialist Jamf is offering zero day support for the latest spring releases of iOS (10.3), macOS (10.12.4), and tvOS (10.2).

Continue reading

IBM announces Hyperledger Fabric-based Blockchain-as-a-service

IBM logo

It was a big day for IBM today, as it unveiled its first Blockchain-as-a-service. Unveiled at the Interconnect conference, this commercial blockchain service is based on the open-source Hyperledger Fabric 1.0, built by The Linux Foundation.

In a nutshell, IBM Blockchain allows customers to build their own secure blockchain networks. It took the company a year to bring it from the initial announcement to a finished product.

Continue reading

SAS: Open source software comes with hidden costs and problems

open source

Open source technologies are great for organizations, but they're far from perfect. As a matter of fact, many of the open source technologies in use today come with hidden costs and problems. This is according to a new report by SAS, which was created on a poll of 300 executives across the UK and Ireland.

These costs and problems mostly revolve around training staff, as well as recruiting, or replacing employees with essential data science skills.

Continue reading

Employees are a major security risk, say IT pros

Risk dial

Almost a third of companies have suffered either data loss or a security breach because their employees use mobile technologies to work. This is according to a new report by Apricorn. The company polled 100 IT decision makers in the UK for the report.

Almost half (44 percent) expect mobile workers to expose their company’s data to risks of breaches and theft. Nearly half of respondents also agree that employees are the biggest security threat to their company.

Continue reading

Organizations remain vulnerable to brute force attacks

hammer

Gaining access to accounts is often done the old-fashioned way, using brute force guesses, but a new report reveals that many devices and accounts still have default usernames and passwords.

The study from visibility and testing company Ixia shows the top five username guesses as root, admin, ubnt, support, and user -- ubnt being the default username for AWS and other cloud services based on Ubuntu.

Continue reading

Load More Articles