Big data management salaries see 8 percent rise in UK


If you were thinking about switching careers in order to start earning bigger money, you might want to consider a career in big data management. Reports started coming in that salaries for this position jumped eight percent this year, more than what the Bank of England forecast (three percent).
Professional IT resourcing firm Experis also says that 5,148 advertised jobs in Q1 were in the big data segment, with 87 percent being in London. Other tech cities are closing the gap though, with Manchester, Leeds and Birmingham being notable examples.
Most UK tech workers against Brexit


The tech industry is not really hyped about the UK’s potential abandoning of the European Union, according to new reports by market analysts.
Juniper Research just released a new report which says that almost two thirds (65 percent) of UK’s tech employees believe Brexit would not have a positive effect on the global tech industry.
IT vs security pros: Handling appsec


A new report into corporate app security, conducted by runtime application security visibility and protection company Prevoty, shows significant discrepancies between IT and security professionals, when it comes to app security.
The report, entitled "The Real Root Cause of Breaches -- Security and IT Pros at Odds Over AppSec", is based on a poll of more than 1,000 IT and security professionals and says there are major divides in how these two groups handle app updates, app security tuning and backlogging.
IT pros: Cloud apps are as secure as their on-premise counterparts


For the first time ever, the majority of cybersecurity professionals believe cloud-based apps are as secure as on-premise apps. Those are the results of a new survey conducted by Bitglass, among 2,200 cybersecurity experts.
According to the report, entitled The Rise of Purpose-Built Cloud Security, 52 percent of those surveyed said they found cloud-based apps as secure as their on-premise counterparts. The most interesting thing is that this percentage has jumped from 40 percent same time last year.
Three in four apps do not meet GDPR requirements


Using cloud apps in a business environment, be it Shadow IT or not, is going to be risky business in a couple of years, as a vast majority of today’s widely used apps do not comply with the upcoming rules and regulations of the EU GDPR.
GDPR, or general data protection regulation, is a EU-crafted document aimed at regulating the corporate use of data, and how businesses must act in order to ensure maximum safety of customer data used, as well as privacy. It will come into force in less than two years.
European workers use cloud services for whistle blowing


Wait until you hear what employees in Europe are using cloud services for. Oh, boy.
Blue Coat Systems has polled more than 3,000 workers in France, Germany and the UK, asking them about their cloud usage habits, and, as it turns out, some employees use such services (Dropbox, Box, Office 365, Slack, LinkedIn, Facebook, Gmail, etc.) to store data before starting a new job, for corporate espionage, whistle-blowing and even "personal protection".
Older workers can handle new technology


The stereotype of older people having trouble using new technology is nothing more than that -- a stereotype. At least, according to a new report by Dropbox and Ipsos Mori. The two companies surveyed more than 4,000 workers aged 55 and more about their use of technology in the workplace.
The results will most definitely be surprising to some.
One in five UK businesses would keep a data breach secret


Almost a fifth (19 percent) of companies in the UK wouldn’t notify their customers in case of a data breach, a new report highlights.
As the EU GDPR draws closer, Trend Micro investigated if companies have formal processes in place to notify data protection authorities (within 72 hours), and the public, in case of a data breach, as will be enforced by the Regulation.
Human error and data breaches go hand in hand


There have been significantly more data breaches this year, compared to the year before, new figures from Egress Software Technologies suggest.
The company cross-checked data from security breaches in the past three years and says that 66 percent of the business sectors surveyed reported an increase in data breach occurrences. It would have been even higher if healthcare organizations haven’t had "just" a 13 percent increase.
Three steps to BYOD bliss


BYOD has now become so prevalent that 29 percent of UK secondary schools are now operating some sort of BYOD policy including asking students to bring their own devices. While the enterprise world has been talking about BYOD for years, it’s this kind of mainstream use that confirms BYOD as a way of life, and of business.
While there are clear benefits in terms of productivity for example, unfortunately, security still remains a key concern. In order to take advantage of the potential benefits and avoid the security risks, organizations need to do three core things: develop a robust BYOD policy, choose the right security technology, and support the people using it.
How IT admins can support cloud adoption


Iron Man. Captain America. IT administrator. Yes, you read that correctly. As organizations make their shift to cloud computing technologies, including Microsoft Azure and Office 365, IT admins can be crucial -- but often overlooked -- assets.
These superheroes of the technology world can save their organization from technological chaos, stop compliance issues in their tracks, and spread their technical knowledge for the good of the organization. So how can admins prove their worth in the rise of the cloud?
Debunking seven fundamental cyber-security myths


If we look at the world of cyber security through the eyes of the media, it’s a pretty frightening view. We hear story after story of security breaches hitting major companies and the next data leaks that follows affecting thousands of people. It’s enough to fill any business with trepidation.
With cyber security such a big talking point, we tend to see a lot of information floating around -- some of which is not in the least bit true. If a company wants to enhance its IT security it is imperative to be able to separate facts from fiction.
Nearly half of European workers use personal devices for work


Shadow IT, or stealth IT, is a practice still commonly used by European workers, according to a new Fuze report. It means employees are using either hardware or software that has not been directly approved of by the IT department, risking security breaches.
The report, entitled "App Generation report", argues that 40 percent of employees are using their personal devices for work. The same goes for software and apps.
Business leaders: Anticipating future tech trends is not in our job description


Business leaders understand the importance of data analytics, and will do what it takes to make sure their company’s data needs are met. However, they don’t think they should be anticipating future trends in order to take full advantage of any upcoming opportunities.
Those are the results of a new study conducted by The Economist Intelligence Unit (EIU), and sponsored by Microsoft Cloud. The study is entitled Transforming Business, and says that 67 percent of survey respondents (including IT leaders, HR leaders, finance and sales & marketing people), are "somewhat" or "very" confident about their department’s ability to use data.
IT executives: Anti-corruption policies don't work


Anti-corruption and anti-bribery policies do not work, and IT and telecom companies haven’t been spared the ill practices, a new study by Eversheds shows.
Eversheds polled 500 board-level executives in large organizations in 12 countries, including 55 in the IT and telecoms sector, about how they’re handling bribery and corruption. Turns out, not so well. Almost two-thirds (65 percent) have said anti-corruption policies do not work, and 80 percent of executives said to have uncovered ill practices within their organizations.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.