Defending against critical infrastructure attacks [Q&A]


Critical infrastructure is a prime target for cybercriminals and nation state actors. It often operates on legacy operational technologies (OT) which have vulnerabilities that can't be fixed easily or directly.
We spoke to John Moran, technical director, business development at Tufin, to discuss how organizations can protect themselves. John is a former incident response consultant and is a cybercrime forensics expert.
Application security best practices and trends [Q&A]


Businesses today face a wider and more dangerous array of cybersecurity threats than ever before. In the UK alone there were more than 400,000 reports of fraud and cybercrime in 2021. Those crimes come with significant costs too. In addition to the reputational damage that comes with cybersecurity incidents, data breaches cost UK companies an average of US$4.35 million.
That makes it critical that organizations have the best possible cyber defences in place, not just for the threats they face today but also for those of tomorrow. This is especially true for business-critical applications like ERP systems that need to be run continuously in order for the organization to keep operating smoothly and servicing its customers.
Economic uncertainty leads digital marketers to focus on customer experience


The pandemic led to a boom in online commerce, but as it fades away enterprises are keen to find new ways to understand and reach their customers, at the same time as addressing increasing privacy concerns.
Customer experience company Acquia commissioned Vanson Bourne to seek the views of 2,000 consumers and 200 marketers in the UK and the US on the digital marketing landscape.
IBM aims to breakdown barriers to AI adoption


IBM is unveiling a set of new AI capabilities that aim to reduce some of the top barriers to AI adoption and drive down the cost and time investment it currently takes to build and implement AI applications.
The expansion to its embeddable AI software portfolio sees the release of three new libraries designed to help IBM Ecosystem partners, clients and developers more easily, quickly and cost-effectively build their own AI-powered solutions and bring them to market.
The business continuity emergency


2021 marked a dramatic step change in global climate conditions, with a significant increase in the incidence and severity of extreme weather events resulting in flooding, hurricanes and heatwaves across the globe. The UK and Europe experienced the hottest summers on record during the past three years. This year’s extreme, record-breaking heatwave in July took the UK climate beyond 40 degrees Celsius, and posed serious threats to UK infrastructure.
This ongoing and accelerating trend is now sadly locked into the Earth’s system for decades to come. In Western Europe, heatwaves are increasing in frequency, at about three times faster, and in intensity, roughly four times faster, than in other midlatitude regions according to a recent study. This is having a knock-on impact for business, as evidenced by July’s West London data center outages for Google and Oracle Cloud and heatwave related IT issues for NHS Trusts. The need for C-suites to consider climate-related events as a serious risk to business continuity can no longer be seen as a problem of the future.
CNAPP -- what is it and why should you care about it? [Q&A]


The IT world is littered with acronyms and one of the latest is CNAPP, standing for Cloud Native Application Protection Platform. If you haven't heard about it already you almost certainly will do soon.
We spoke to Stanimir Markov, CEO at Runecast, about CNAPP, what it is and how it can benefit modern enterprises and their cloud environments.
96 percent of known open source vulnerabilities can be easily avoided


With more open source being consumed than ever before, attacks targeting the software supply chain have increased too, both in frequency and complexity. A new report reveals a 633 percent year on year increase in malicious attacks aimed at open source in public repositories -- this equates to a 742 percent average yearly increase in software supply chain attacks since 2019.
The latest State of the Software Supply Chain Report from Sonatype, released today at the DevOps Enterprise Summit, also finds that 96 percent of open source Java downloads with known-vulnerabilities could have been avoided because a better version was available, but was ignored.
How AI and data analytics are driving instant commerce [Q&A]


The internet has changed the way that most people shop and increasingly we want to get the things we've ordered fast.
This has given rise to on-demand commerce, with deliveries supported by armies of gig workers. But it's also driven rapid technological innovation in the logistics sector. We spoke to Kashyap Deorah, founder and CEO of logistics app specialist HyperTrack, to learn more about the new the phenomenon of 'instant commerce' and what it means for both enterprises and consumers.
SOC stresses mean 71 percent of security professionals consider quitting


Information and work overload, insufficient downtime, lack of tool integration, and alert fatigue mean that 71 percent of security operations center professionals say they're likely to quit their job.
A new report from logging and security analytics company Devo Technology shows SOC leaders continue to face a tricky balancing act when it comes to retaining SOC analysts amid major talent shortages and turnover.
One in five CISOs works over 25 hours overtime each week


According to new research from Tessian, 18 percent of UK and US security leaders work over 25 hours extra a week, double the amount of overtime they reported in 2021.
On average, they work 16.5 hours over their contracted weekly hours, up from 11 hours in 2021. Also three-quarters of security leaders say they aren't able to always switch off from work, 16 percent of these say they can rarely or never switch off.
How Kubernetes and AI will combine to deliver next-gen services [Q&A]


The popularity of Kubernetes has led to its rapid adoption, but as with any advanced technology, the benefits come alongside challenges.
Being able to take full advantage of the technology means understanding what it can offer and how it fits with other developments like artificial intelligence. We spoke to Tobi Knaup, CEO of independent Kubernetes platform D2iQ, to find out about the current state of Kubernetes and what it promises for the future.
How to tell your customers that you've been hacked [Q&A]


The short-term costs of a cyberattack are significant. Investigating and containing a breach, rebuilding IT systems and implementing new security controls, as well as the loss of productivity, can all cause severe financial strain.
However, the long-term costs of a breach are often even more damaging. Enterprises that do not handle an attack well can suffer a number of further consequences, including reputational damage, a loss of customer loyalty and a drop in share prices.
New exposure management platform helps businesses manage cyber risks


The average enterprise uses more than 130 cybersecurity point solutions, creating siloed data that is hard for security teams to apply in meaningful ways.
To address this problem, Tenable is launching a new exposure management platform, aimed at giving customers a unified view into their organization's assets and vulnerabilities across the whole attack surface.
New tool helps enterprises measure the effectiveness of their security spending


Spending more money on cybersecurity tools doesn't necessarily mean you're less likely to suffer from a cyberattack. Until now though it's been hard to tell whether what you do spend is actually delivering a good return on investment.
Safe Security is today launching a new Return on Security Investment (ROSI) calculator that enables CISOs and CFOs to quantify the reduction in risk for each dollar invested in cybersecurity.
Simplify developers' deployment journey with continuous deployment


Most development teams struggle early in the process of shifting to cloud native application development and deployment. Their existing tool chains that have served them well in the past struggle with them as they attempt to scale their deployment footprint. The last thing they want to do is invest time in becoming experts in deployment. They don’t want to create or troubleshoot a deployment process -- they want to code with a GitOps approach, and know their software has been deployed successfully, is working as expected, and providing value to the customer. How can team leaders satisfy those desires? Automated continuous deployment. Continuous deployment simplifies delivery, ensures the software works at each deployment stage and allows developers to focus on what they do best.
When it comes to the development cycle, faster is better. Companies with higher release rates generate four to five times higher revenue growth than those pushing updates less often. To keep up with the competition, fast and efficient deployment of quality, stable software is the priority.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.