The biggest barriers to adopting BYOD

BYOD key

Thanks to the benefits that it offers in terms of productivity and employee satisfaction, BYOD remains a popular option for many companies and the market is predicted to be worth $360 billion by 2020.

But a new report from Crowd Research Partners in conjunction with some leading data security vendors -- including Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, SnoopWall and Tenable Network Security --provides a conflicting portrayal of BYOD security barriers and adoption trends in the workplace.

Continue reading

IT budgets will mostly go towards buying mobile devices, security

Business mobile devices

IT budgets for businesses in the US will be mostly spent on security, and mobile devices allowing employees remote working, a new survey has shown.

According to a new survey by Wakefield, 30 percent of US businesses will spend most of their IT budgets on network and data security, and 28 percent will spend it on mobile devices allowing employees to work remotely.

Continue reading

The benefits and challenges of building a hybrid cloud

Hybrid Cloud

The growth of cloud computing over the last decade has been unprecedented. From a relatively unheard-of concept, the cloud has become a key part of the boardroom conversation amongst CIOs and IT directors at companies across industries, sizes, and revenues for its promise of organizational transformation.

A large amount of enterprises have already built their own private cloud networks, hosting essential applications and providing anywhere, anytime access to mission critical data for employees scattered across the world. In many cases, the effort pays off, resulting in increased productivity, reduced costs and ease of access.

Continue reading

New research helps isolate real threats from suspicious activity

insider threat

Security teams often spend a lot of their time investigating anomalies and suspicious behavior, leaving them less time to focus on true threats.

Cloud security specialist CloudLock is tackling this problem with research into what it calls a Cloud Threat Funnel. Based on analysis of user behavior patterns it can isolate truly malicious threats from the noise of other potentially suspicious or unusual behaviors.

Continue reading

The dangers of using public Wi-Fi hotspots

Public wi-fi

There are hundreds of thousands of free public Wi-Fi spots throughout the UK. Widespread connectivity and free accessibility are two appealing features that tempt users to open up their devices for on-the-go convenience.

However, uncontrolled access to public Wi-Fi hotspots and robust mobile security often conflict with one another. Cyber-criminals now find it increasingly easy to attack public Wi-Fi networks using Man-in-the-Middle (MitM) techniques which allow the attacker to clearly view all information transmitted across networks.

Continue reading

UK start up seeks to make online software research easier

Software testing

According to Google's Consumer Barometer Report 53 percent of people compare products, prices and features online before buying.

This is even more true of B2B buyers, with 89 percent saying they use the web as part of their research process.

Continue reading

A different take on what DevOps is

Developer

For the last couple of years I’ve been struggling a bit with the idea of DevOps. At the root of it was my own lack of clarity about what it is. My question remained unanswered and it wasn’t for the want of trying.

I went to conferences, attended talks, read articles and met with people in our business. I gathered logically inconsistent lists of things that it was and wasn’t. In the end, I concluded that there isn’t a consensus, so I had to work out what DevOps means to me.

Continue reading

Docker comes to Mac and Windows

Docker

Today is the third birthday of the Docker containerization system and to celebrate the company is launching a beta program for Mac and Windows versions of its software.

It offers an integrated, easy-to-deploy environment for building, assembling, and shipping applications from Mac or Windows as well as having many improvements over Docker Toolbox.

Continue reading

User error is the leading cause of data loss in SaaS applications

data loss

Accidental deletion of information is the leading cause of data loss from SaaS applications, responsible for 43 percent in the US and 41 percent in the UK, ahead of data loss caused by malicious insiders and hackers.

This is among the findings of a new survey of IT professionals in the US and UK from cloud backup specialist Spanning which also has insights into who is responsible for SaaS data protection, organizational confidence in SaaS data protection, and the top concerns surrounding moving data to the cloud.

Continue reading

Data scientists spend lots of time doing stuff they don't enjoy, but they still love their jobs

Data analytics

Data scientists spend a lot of time doing things they don't like, such as sorting out problems with unprocessed information, but they still love their jobs according to a new survey.

The second annual Data Science report from data enrichment platform CrowdFlower shows that there’s a perceived shortage of data scientists, with 83 percent saying there aren’t enough to go around, up from 79 percent last year.

Continue reading

Sitefinity delivers improved content management and customer analytics

Mobile analytics

In modern fast-moving business environments, marketers need to be able to respond quickly to changes and deliver appropriate content.

To help deliver this ability, business transformation specialist Progress is releasing new versions of its Telerik Sitefinity platform for content management and customer analytics.

Continue reading

Ginni the Eagle: IBM’s corporate 'transformation'

IBM

I promised a follow-up to my post from last week about IBM’s massive layoffs and here it is. My goal is first to give a few more details of the layoff primarily gleaned from many copies of their separation documents sent to me by laid-off IBMers, but mainly I’m here to explain the literal impossibility of Big Blue’s self-described "transformation" that’s currently in process. My point is not that transformations can’t happen, but that IBM didn’t transform the parts it should and now it’s probably too late.

First let’s take a look at the separation docs. Whether you give a damn about IBM or not, if you work for a big company this is worth reading because it may well become an archetype for getting rid of employees. What follows is my summary based on having the actual docs reviewed by several lawyers.

Continue reading

Thycotic plans $100 million security software giveaway

Free stamp

Privileged accounts exist in all areas of business IT and if compromised they can provide an external attacker or dishonest insider access to sensitive data.

Account management company Thycotic wants to help businesses protect themselves and so is giving away a no-cost version of its Secret Server package to guard against attacks that target privileged accounts.

Continue reading

New platform aims to break down barriers to big data adoption

Big data

Big data deployments are increasingly shifting from lab settings to full production environments. But there are a number of security and QoS (quality of service) challenges that can slow this process.

Big data company BlueData is launching the latest release of its EPIC software platform, introducing several security and other upgrades to provide a smoother Big-Data-as-a-Service experience as well as support for new applications and frameworks.

Continue reading

Kyvos brings big data to Microsoft Azure

Big data cloud

Many organizations are looking at the benefits they can gain from big data but are put off by the infrastructure costs involved.

Analytics company Kyvos Insights is aiming to make big data more accessible by making its scalable, self-service online analytical processing (OLAP) solution available to users of Microsoft Azure HDInsight.

Continue reading

Load More Articles