Application security best practices and trends [Q&A]


Businesses today face a wider and more dangerous array of cybersecurity threats than ever before. In the UK alone there were more than 400,000 reports of fraud and cybercrime in 2021. Those crimes come with significant costs too. In addition to the reputational damage that comes with cybersecurity incidents, data breaches cost UK companies an average of US$4.35 million.
That makes it critical that organizations have the best possible cyber defences in place, not just for the threats they face today but also for those of tomorrow. This is especially true for business-critical applications like ERP systems that need to be run continuously in order for the organization to keep operating smoothly and servicing its customers.
Economic uncertainty leads digital marketers to focus on customer experience


The pandemic led to a boom in online commerce, but as it fades away enterprises are keen to find new ways to understand and reach their customers, at the same time as addressing increasing privacy concerns.
Customer experience company Acquia commissioned Vanson Bourne to seek the views of 2,000 consumers and 200 marketers in the UK and the US on the digital marketing landscape.
Visibility into communications remains a worry for compliance and security chiefs


Two-thirds (66 percent) of security and compliance leaders are worried that their employees are using unmonitored communications channels, according to a new report.
The study from Theta Lake finds 67 percent of respondents expect the usage of collaboration tools and popular platforms like Microsoft Teams, Zoom, Webex, Slack and RingCentral to increase.
Free solution helps admins manage remote workforces


Hybrid work took off during then pandemic, but there's no doubt that it's now here to stay and remote support is a critical tool for IT teams as they troubleshoot end users' technical issues and support onboarding and offboarding.
Today sees identity and device management specialist JumpCloud launching a new, free cloud-based solution that allows IT admins and MSPs to support global workers by quickly accessing remote end-user devices at the click of a button.
IBM aims to breakdown barriers to AI adoption


IBM is unveiling a set of new AI capabilities that aim to reduce some of the top barriers to AI adoption and drive down the cost and time investment it currently takes to build and implement AI applications.
The expansion to its embeddable AI software portfolio sees the release of three new libraries designed to help IBM Ecosystem partners, clients and developers more easily, quickly and cost-effectively build their own AI-powered solutions and bring them to market.
67 percent of UK IT decision makers are concerned about supply chain issues


A new survey of UK IT decision makers from cybersecurity company WithSecure looks at global supply chain issues, with 67 percent of respondents believing that these issues will either remain the same (28 percent) or get worse (39 percent) within the next year.
As issues around inflation and supply shortages remain high in the news agenda, 43 percent believe they are very knowledgeable in their understanding of supply chain issues. However, few are confident of quick fixes to these global issues, and 60 percent of respondents believe that they will last for two years or more.
How facial recognition can help improve remote productivity


Remote working has become the norm for many following the COVID pandemic. But while it offers many benefits for both employers and workers, it can also lead to problems with productivity and stress.
A new infographic from work time management firm TrackTime24 looks at some of the issues faced by remote workers and at how improved time tracking technology using facial recognition can help.
Why SBOMs are key to securing the software supply chain [Q&A]


Attacks on the software supply chain have become more common in recent years. Part of the key to tackling them lies in understanding what components are in your software and where they originate.
This is why the software bill of materials (SBOM) has become a vital tool for organizations seeking to secure their software. We spoke to Alex Rybak, senior director, product management at Revenera to learn more about SBOMs and what advantages they offer.
Google open source project aims to boost supply chain security


Software supply chain security is at the top of a lot of agendas at the moment, more so since the Log4j vulnerability was discovered and since the US Executive Order on cybersecurity.
Google is seeking contributors to a new open source project called GUAC (Graph for Understanding Artifact Composition), which although in its early stages yet is poised to change how the industry understands software supply chains.
CNAPP -- what is it and why should you care about it? [Q&A]


The IT world is littered with acronyms and one of the latest is CNAPP, standing for Cloud Native Application Protection Platform. If you haven't heard about it already you almost certainly will do soon.
We spoke to Stanimir Markov, CEO at Runecast, about CNAPP, what it is and how it can benefit modern enterprises and their cloud environments.
Attackers aren't as clever as you think when it comes to finding passwords


Although we've been told for years that their days are numbered, passwords are still a major part of our security defenses.
New research from Rapid7 looks at two of the most popular protocols used for remote administration, SSH and RDP, to get a sense of how attackers are taking advantage of weaker password management to gain access to systems.
Ransomware attacks are down in the third quarter


The period from July to September this year has seen 27 ransomware variants used to conduct 455 attacks according to cybercrime intelligence company Intel 471's Spot Reports and Breach Alerts.
This represents a decrease of 38 attacks from the second quarter of 2022 and 134 from the first quarter of 2022.
If your name is Michael Smith and you're from Houston you could be a fake


New research from identity verification company Socure looks at patterns surrounding how fraudsters construct synthetic identities to identify factors that may assist in identifying and thwarting this kind of crime.
The study shows that criminals employing synthetic identities do their best to blend them with the overall population. So in the majority of cases, synthetic identities fell into the most common demographics and consumer traits.
Federal cybersecurity leaders are struggling to protect information


A new survey of 150 federal cybersecurity leaders finds that 73 percent of respondents feel a lack of foundational data protection efforts puts their agency at risk.
In addition the research, from data protection provider Zettaset, shows 77 percent say that siloed systems that lack visibility make it difficult to properly protect critical assets. It's not surprising then that 57 percent report experiencing multiple data breaches over the past two years.
New open source tool helps security analysts gather data following incidents


Incident investigations in today's environments such as the cloud, containers and serverless environments can be a challenge. In particular collecting volatile data quickly following an incident to help security teams identify root causes and respond faster.
Cado Security is launching a new new volatile artifact collector tool that allows security analysts to collect a snapshot of volatile data, adding critical context to incident investigations.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.