CrowdStrike improves ability to combat breaches

Breach detection

Effective cyber security is all about seeing threats and being able to respond to them quickly and effectively. Increasingly this means using the cloud to deliver intelligence.

CrowdStrike, a specialist in cloud-delivered protection, is launching a new version of its Falcon platform to deliver endpoint, detection and response functions along with advanced antivirus capabilities.

Continue reading

Enterprises have no protection against mobile malware

Mobile app threats

Mobile enterprise security firm MobileIron has released its Q4 2015 Mobile Security and Risk Review, discussing the threats and risks that enterprises face in their mobile deployments.

The report reveals the worrying find that more than 50 percent of enterprises have at least one non-compliant device, creating a broader attack surface for malware and data theft.

Continue reading

85 percent of enterprises keep sensitive data in the cloud

cloud padlock

According to a new report by enterprise security specialist Vormetric, 85 percent of senior IT security executives worldwide say they are using sensitive data in the cloud, up from 54 percent last year.

But even as they move to adopt cloud services, and in some cases believe that cloud environments are more secure than their local IT infrastructure, enterprises remain concerned about the security of their information.

Continue reading

The top 5 myths about Virtual Mobile Infrastructure (and, oh yeah, the facts)

facts myths

With more and more enterprises recognizing the need to go beyond securing devices while still finding an effective way to deploy native mobile apps to employees, it's little wonder that remote enterprise approaches like Virtual Mobile Infrastructure (VMI) are receiving more eyeballs in the enterprise mobility space and the scrutiny that comes along with it. With this comes questions, doubts and even fears over the whether this new approach can really fulfill on its promise.

In fact, fears can spiral into outright myths if left to fester. Remember the myth that Macs couldn't get viruses? We all know how that claim turned out. To this end and, without further ado, here's the truth about five of the most common myths you may have heard about VMI.

Continue reading

New platform helps protect enterprise Android use

android_security

Allowing the use of mobile devices and BYOD in the enterprise has led to new challenges for IT teams. Not lease of these is controlling which apps employees can access and how they can use them.

Security solutions provider OptioLabs is launching a new platform that will allow enterprises to create policies that control each of the 3,300 system methods in Android to provide targeted security protections.

Continue reading

90 percent of Android devices are running an outdated OS

Android danger sign

According to new research over 90 percent of Android devices are running an out of date version of the OS. In addition, 32 percent of those in use in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities like Stagefright.

The study by cloud based access provider Duo Security analyzed data from its installed base of over a million mobile devices. It reveals that the problem isn't just with Android, only 20 percent of iPhones run the latest Apple operating system version, iOS 9.2. Outdated iOS devices have well-known vulnerabilities such as Ins0mnia and Quicksand that make these devices susceptible to attacks.

Continue reading

The cost of mobile data breaches in big companies

Mobile fear

A mobile data breach could cost a large enterprise over $25 million (£18 million) according to a new report.

The study of security and IT leaders in Global 2000 companies, carried out by mobile security specialist Lookout and the Ponemon Institute, examines the risk introduced by employees accessing increasing amounts of corporate data via their mobile devices.

Continue reading

How to improve security in a BYOD enterprise environment

BYOD

For most of us, our mobile and personal devices have become extensions of our lives and even bodies. Most of us carry our smartphones with us all the time, and when we can’t find them, we feel lost.

We are essentially always on, always connected to the Internet. This notion of anytime, anywhere access has extended not only to our personal lives but also our professional.

Continue reading

New tool uses machine learning to personalize emails

Machine learning

Most marketing email gets personalized using a static template which limits the amount of information that can be tweaked for each recipient.

Marketing automation company Boomtrain is launching a new platform, Boomtrain Editor, that adds advanced machine learning personalization regardless of email provider. It predicts the optimal email content for each recipient, and can then be applied by simply dragging and dropping it into a customizable template.

Continue reading

Tips on how to start a successful tech business

looking ahead

Starting any business can be fraught with difficulties, but a tech business can be even trickier. We look at what things you should do to make your business a success.

Starting a business is the dream for anyone with a bit of entrepreneurial spirit, but turning dreams into reality is never easy. This year alone, more than 70,000 start-ups have opened for business according to Startup Britain. Each year, more than half a million people start a business.

Continue reading

Five not so obvious things you can expect at MWC 2016

MWC 2015

At Mobile World Congress (MWC) tides will start to turn. There won’t be an overnight revolution powered by shiny new gadgets, but technologies we’ve seen evolving over recent years will start to demonstrate their real potential.

We expect to see five major technology themes come to the fore in Barcelona this year:

Continue reading

Majority of UK businesses want to move their IT infrastructure to the cloud

Cloud access

A significant portion of UK businesses, 63 percent of them, plan to move their entire IT infrastructure to the cloud in the near future, according to a new report by the Cloud Industry Forum (CIF).

The adoption rate of the Cloud among UK’s businesses currently sits at 78 percent, the same as a year before, but "substantially higher" than when the research was first conducted back in 2011, the report says. The report also says that the adoption is likely to increase to 85 percent in the next two years.

Continue reading

Dark data and why you should worry about it

Dark data

How much of your company's data do you actually use? According to search technology specialist Lucidworks, businesses typically only analyze around 10 percent of the data they collect.

The rest becomes what the company calls 'dark data' -- information that lurks unused. Much of this data is unstructured and doesn't fit into any convenient database format. This means that companies don't have the tools to make sense of it or simply find they have too much to handle.

Continue reading

Mendix products now available on Microsoft Azure

sunrise sky

Platform-as-a-service provider Mendix and Microsoft today announced a partnership which will bring Mendix services on the Azure cloud platform.

Mendix says the new partnership will allow Azure customers to seamlessly access Mendix’s rapid application development capabilities, adding that two versions are available -- free and commercial.

Continue reading

Prelert brings behavioral analytics to Elasticsearch

Data analytics

Increased use of big data in IT management and other areas means that companies are on the look out for new tools to give them better insights from their information.

Behavioral analytics company Prelert is making it easier for Elasticsearch users to automate the analysis of large data sets with the launch of Behavioral Analytics for the Elastic Stack.

Continue reading

Load More Articles