New tool makes it easier to manage machine identities


Thanks to increased cloud and container use there's a growing demand for machine identities, but delivering and managing those identities can present problems.
Machine ID specialist Venafi is launching a new tool called Firefly that enables security teams to easily and securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally and quickly across any environment.
Misconfigurations leave internet-facing servers open to attack


Issues with server configuration remain a major problem. Researchers at Censys have identified over 8,000 hosts on the internet misconfigured to expose open directories.
These directories contain potentially sensitive data, such as database information, backup files, passwords, Excel worksheets, environment variables, and even some SSL and SSH private keys. Exposure of these types of data in such an accessible manner can offer threat actors an easy way into an organization's network.
What if cloud data was stored on floppy disks?

How enterprises can stay ahead of risks, threats and potential attacks [Q&A]


Businesses are engaged in a constant cat-and-mouse game with hackers, attackers, and bad actors in order to stay secure.
Dominic Lombardi, VP of security and trust at Kandji believes that in order to stay ahead it's necessary to master basic IT and security hygiene, update and communicate your risk register, and work steadily toward a zero-trust security model. We spoke to him to discover more.
Ransomware attacks can cost enterprises up to 30 percent of operating income


The financial impact of a ransomware attack can cost businesses up to 30 percent of their operating income, with smaller enterprises hit proportionally harder.
A new report from ThreatConnect looks at the financial impact of ransomware attacks on small ($500M), medium ($1.5B) and large ($15B) organizations within healthcare, manufacturing, and utilities.
Enterprises plan to increase cloud service investment as part of network transformation


In a drive for network transformation, 98 percent of enterprise IT leaders say they plan to increase their dependence and investment in cloud services.
The latest Enterprise Network Transformation report from SASE solutions company Aryaka finds that although an uncertain economy is impacting network and security team investments CIOs, CISOs and IT leaders are doubling down on investment in the cloud.
(Tell me why) We don't like passwords


Despite relatively low awareness of passwordless technology, 65 percent of North American consumers report they’d be open to using new technology that makes their lives simpler.
A new report from 1Password shows that 80 percent say they care about their online privacy and actively take measures to protect it. But it's clear that they also believe we can do better than passwords for both security and ease of use.
Decoy Dog sniffs out enterprise networks to target


A malware toolkit dubbed 'Decoy Dog' has command-and-control (C2) propagated to a Russian IP and is selectively targeting organizations worldwide -- and going undetected.
The Infoblox Threat Intelligence Group is the first to discover Decoy Dog and the company is collaborating with other companies in the security industry, as well as customers, to identify and disrupt this activity.
Cyber threats get more personal


Popular online platforms such as Netflix, Facebook, and Steam are being used to spread cyber attacks as criminals focus on consumers' favorite online activities.
The latest consumer threat guide from F-Secure finds the most imitated social media platform used to spread phishing threats in 2022 was Facebook at 62 percent. Steam, the largest distribution platform for PC games, was the most popular gaming platform to spoof at 37 percent.
New solution offers cheaper enterprise-grade cloud storage


A new enterprise-grade, native cloud storage solution aims to deliver increased speed, affordability and security thanks to its use of decentralized Web3 technology.
Impossible Cloud supports almost unlimited capacity, and its Object Storage solution offers a scalable, cost-efficient alternative for organizations that require reliable and secure storage.
82 percent of open source software components are inherently risky


Recent supply chain attacks such as SolarWinds, Log4j and 3CX have highlighted the need to protect the software supply chain as well as the potential consequences of failing to properly assess the integrity of software.
A new report from software supply chain security management company Lineaje looks at the composition of open-source software and assesses the risks associated with its usage.
Why workplace engagement and collaboration are the true benefits of the metaverse [Q&A]


The trend towards hybrid work has meant that face-to-face meetings have been widely supplanted by collaboration tools like Zoom, Teams and Slack.
With the advent of the metaverse, virtual interaction is set to become even more common. We spoke to Martin Bodley, director of emerging business at Bose Work to find out more about how this new world might look and how it can draw on expertise gained from video games.
Convergence of OT and IT systems sees moves to improve security

Why have cloud when you can have supercloud? [Q&A]


There's been a lot of talk about 'supercloud' recently, but what exactly does it mean? And is it the next big thing that's set to disrupt the technology landscape?
We talked to Amir Khan, CEO and co-founder of Alkira, to find out more about supercloud and what it means for the industry.
Advanced search, analytics and AI deliver a smarter infrastructure platform


The use of infrastructure as code to define and deploy network and data center architecture has become increasingly common. Whilst it undoubtedly offers many advantages, it can create challenges too.
Pulumi is launching a new tool that unlocks analytics and search across cloud infrastructure, generates infrastructure as code from natural language prompts, and even enables novel AI-driven infrastructure automation.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.