Ian Barker

Is it time to make World Password Day a thing of the past?

As another World Password Day rolls around there’s the inevitable debate about whether the days of the password at the front line of security are numbered.

In recent years it has seemed that reports of the password's death have been greatly exaggerated. But as Google extends its rollout of passkey technology it seems that passwords may finally have had their day.

Continue reading

Enterprise IT leaders plan to cut cloud spending

Cloud dollars

A new study from Vega Cloud on the use of cloud software and services by enterprise IT executives shows 48 percent expect to reduce their IT spending a little or a lot in 2023.

In addition, 65 percent say that reducing their cloud spending will be a goal for this year, while three-quarters of IT execs surveyed say they plan to cut cloud costs by between 10 and 50 percent in 2023.

Continue reading

Google extends its passkey rollout to all platforms

Google HQ logo

Tomorrow is World Password Day but Google has chosen today to announce a major step towards ending the need for passwords, introducing support for passkeys across Google Accounts on all major platforms.

Back in December last year, passkey support was introduced to Chrome. Today's announcement means they can now be used across Google Services for a fully passwordless sign-in experience.

Continue reading

Malicious HTML attachments double in the last year

email attachment

Last May, 21 percent of all HTML attachments scanned were malicious. Ten months on, that figure has more than doubled with 45.7 percent of scanned HTML files found to be malicious in March 2023.

This finding comes from the latest Threat Spotlight report from Barracuda Networks, which shows that not only is the overall volume of malicious HTML attachments increasing, they remain the file type most likely to be used for malicious purposes.

Continue reading

Connecting the world: the role of technology in providing humanitarian aid [Q&A]

When a crisis occurs, telecommunications infrastructure can be partially or entirely destroyed, severing the ties between crisis victims and the outside world, and in some cases disconnecting them entirely from their loved ones.

We underestimate the importance of technology until it is taken away, and providing connectivity to affected communities as quickly as possible in times of crisis is extremely important.

Continue reading

Ubuntu Pro becomes available on the AWS EC2 console

Certified Ubuntu images float their way into Google Cloud Platform

Ubuntu Pro is now available in a subscription-included model on Amazon Web Services (AWS), allowing users to launch Ubuntu Pro on-demand instances and purchase Ubuntu Pro Compute Savings Plans from the Amazon Elastic Compute Cloud (Amazon EC2) console.

Users will be able to run Ubuntu machines with expanded security maintenance, kernel live patch, and hardening scripts out of the box with all of these features enabled by default.

Continue reading

Smaller businesses are ready to embrace AI

Artificial intelligence

According to a new report, 61 percent of SMBs expect their AI usage to increase in the next year, and younger groups are more likely to incorporate AI into regular tasks.

The study from DigitalOcean also finds that while 70 percent have used ChatGPT in some capacity, it's still in the early testing stages and only nine percent of companies have policies in place concerning its usage. 62 percent of those using ChatGPT say they are just testing it out, with 23 percent integrating it into regular tasks.

Continue reading

Meeting the challenges of the digital workspace [Q&A]

home working security

Remote and hybrid teams are increasingly adopting digital tools to get their jobs done. But while this strengthens productivity for workers it risks compromise to the business's security. In turn, this has exacerbated the need for additional layers of supervision and oversight.

Ungoverned connections leave businesses open to supply chain attacks, data breaches and more. We spoke to Astrix Security CEO and co-founder Alon Jackson to discuss these challenges and how to safely and securely manage the new digital workplace.

Continue reading

Cybersecurity teams are overconfident of their ability to deal with threats

A study from Immersive Labs finds that while businesses have high confidence in their overall resilience, teams are insufficiently prepared for threats.

The study, carried out by Forrester, surveyed 316 global cybersecurity training strategy decision-makers in the UK, US, Canada, Germany, and Sweden, finds that 82 percent agree they could have mitigated some to all of the damage of their most significant cyber incident in the last year if they were better prepared.

Continue reading

Why 5G/LTE network security needs a different approach [Q&A]

5G circuit board

The continuing rollout of 5G offers faster mobile networking which will pave the way for new apps and devices connecting to the internet and to corporate networks.

Liron Ben-Horin VP of systems engineering at OneLayer argues that this world of faster connections and more devices will need a new approach to security. We spoke to him to find out more.

Continue reading

Deepfake fraud hits a third of businesses

Deepfake fraud is on the rise, with 37 percent of organizations experiencing voice fraud and 29 percent falling victim to deepfake videos, according to a survey by identity verification specialist Regula.

Fake biometric artifacts like deepfake voice or video are perceived as real threats by 80 percent of companies, with businesses in the USA most concerned, about 91 percent of organizations considering them to be a growing threat.

Continue reading

New community helps businesses to collaborate like scammers

Cybercriminals and fraudsters have long relied on a dark web community to exchange information on vulnerable businesses and individuals as well as trading fraud-as-a-service schemes.

In an effort to turn the tables, Sift is launching a new online community called 'Sifters' to allow its customers to learn from, interact with, and share information with each other, including on any emerging fraud threats they encounter.

Continue reading

Java retains its popularity in a changing landscape

The Java programming language dates back to 1996, released by Sun Microsystems as a way of developing multimedia applications in a portable and interactive way.

That Java is still immensely popular almost 30 years on suggests that it must have got something right. New Relic's 2023 State of the Java Ecosystem report takes an in-depth look at the use of one of the most popular programming languages.

Continue reading

Versa delivers zero trust access across the enterprise

Hybrid cloud and hybrid work have changed where and how we access systems, challenging organizations to find ways to secure the enterprise while delivering the best user experience.

While cloud-delivered Zero Trust Network Access (ZTNA) solutions are now widely adopted to secure remote work, they don't deliver the application performance and inline policy enforcement needed for workers at the office.

Continue reading

How analytics can boost the supply chain [Q&A]

Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.

We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.