Ian Barker

Organizations failing to unlock the full potential of zero trust

More than 90 percent of organizations migrating to the cloud have implemented, are implementing, or are in the process to implement a zero trust architecture.

But a new study from Zscaler shows only 22 percent of global IT decision-makers claim to be 'fully confident' that their organization is leveraging the potential of their cloud infrastructure, presenting an opportunity for zero trust.

Continue reading

Value stream management is key to digital transformation (even if you don't know what it is)

digital transformation

Businesses are increasingly turning to digital transformation in order to remain competitive and relevant in their respective industries. But how do you ensure you're getting value from your efforts?

A new survey of 600 senior executives in large companies from CloudBees shows that value stream management (VSM) is seen as key, as well as removing barriers and making transformation easier to achieve.

Continue reading

Integration, legacy tech and lack of skills prevent implementation of security solutions

open digital lock

According to research, 50 percent of over 400 IT security decision makers in the US and UK have been prevented from adopting a new cybersecurity solution due to integration issues or challenges with legacy infrastructure.

The study for BlackFog, conducted by Sapio Research, also reveals that 32 percent say a lack of skills within their team to support a new product would also be a factor preventing them from deploying new solutions.

Continue reading

Balancing the risks and benefits of an online presence [Q&A]

The widespread use of digital platforms allows businesses to expand, but at the same time a growing internet presence can put organizations at risk in ways they cannot plan for.

We talked to Censys' data scientist, Emily Austin about the company's recent State of the Internet report and about how businesses can proactively fight against unknown domains and risks.

Continue reading

IBM and AWS extend their collaboration to drive innovation

IBM logo

IBM and AWS are launching a new set of capabilities, including access to new SaaS offerings and consulting capabilities for clients modernizing on AWS as part of their hybrid cloud approach, and expanded mainframe application modernization.

Earlier this year, the two companies announced the availability of IBM Software products as Software-as-a-Service (SaaS) on the AWS Marketplace, making IBM solutions more accessible.

Continue reading

Fueling the Apple BYOD revolution [Q&A]

It's no secret that BYOD provides incredible benefits on paper -- from increased productivity to more flexibility and streamlined output. But unfortunately, many initiatives fail to take off due to security and privacy concerns.

Mosyle CEO Alcyr Araujo believes this doesn't always have to be the case, and that Apple devices are primed to offer the best balance for BYOD. We spoke to him to find out more.

Continue reading

Identity fraud doubles in crypto and banking sectors

identity theft mask

The crypto and banking sectors both experienced a nearly two-fold increase in identity fraud in 2022, according to a new report from verification platform Sumsub.

The report also finds that over half of all fraud cases happened in just five countries: Bangladesh (22 percent), Pakistan (15.2 percent), Vietnam (8.1 percent), Nigeria (5.4 percent) and the USA (5.1 percent).

Continue reading

Archive files overtake Office docs as a malware delivery method

Archive file formats -- like ZIP and RAR files -- are the most common file type for delivering malware, overtaking Office files for the first time in three years.

A new report from HP Wolf Security, based on on data from millions of endpoints, finds that between July and September this year 44 percent of malware was delivered inside archive files -- an 11 percent rise over the previous quarter -- compared to 32 percent delivered through Office files such as Microsoft Word, Excel, and PowerPoint.

Continue reading

Cyber extortion dominates the threat landscape

Cyber extortion is impacting businesses of all sizes across the world, and 82 percent of observed are small businesses, an increase from 78 percent last year.

The latest Security Navigator report from Orange Cyberdefense shows a marked slow-down in cybercrime at the onset of the Ukraine war, but intensity soon increasing again.

Continue reading

Three out of four organizations are still vulnerable to Log4Shell

Security breach lock

The Log4j or Log4Shell vulnerability first hit the news in December 2021 sending ripples through the cybersecurity world. So you might be forgiven for thinking that it's safe to assume it's no longer a threat. However, one year on it seems that this is a vulnerability that keeps on being, well… vulnerable.

New research from Tenable, based on data collected from over 500 million tests, shows that 72 percent of organizations remain vulnerable to Log4Shell as of October this year.

Continue reading

Cybersecurity budgets are up but aren't being well spent

New research from cloud platform Fastly shows that while enterprises are increasing their cybersecurity spending they're not making the most of their investments.

While 73 percent of organizations worldwide are increasing their cybersecurity spending to protect themselves against future risks, IT leaders are investing poorly with only 61 percent of their cybersecurity tools fully active or deployed.

Continue reading

Ensuring compliance through network automation [Q&A]

Compliance gauge

Cyber threats are on the rise across every industry and business size, highlighting the importance of maintaining network compliance for organizations and especially for IT and security teams.

But that's easier said than done, with many industry-specific compliance regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI) each with their own set of standards and processes.

Continue reading

CISOs look to balance transformation and cybersecurity

CISO

A new survey reveals that while CISOs are still experiencing challenges around visibility, intelligence and control, nearly half (47 percent) are proactively focused on digital transformation and cloud migration.

The study of 600 UK CISOs from BlueFort Security finds most have moved beyond the challenges of a widespread shift to remote working and are now focused on digital transformation and migration to the cloud, despite an uncertain world picture and bleak economic environment.

Continue reading

Pressure on developers puts digital transformation efforts at risk

One of the side effects of the pandemic has been a boost to digital transformation efforts. But in the rush to innovate businesses are struggling to find developer talent.

New research shows 72 percent of tech teams have a skills shortage with two million vacancies for tech jobs advertised between May 2021 and 2022 in the UK alone, and tech salaries almost 80 percent higher than those for non-IT roles.

Continue reading

Data privacy and the changes enterprises need to be ready for [Q&A]

privacy key

It has been estimated that there are some 43 zetabytes of data stored by enterprises today that are inaccessible and not commercialized due to privacy concerns, operational complexity and regulations.

With the California Consumer Privacy Act (CCPA) becoming fully operational on January 1 2023 and other legislation in place or coming around the world, the need for businesses to find new data accessibility methods that are compliance-friendly is very real.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.