Ian Barker

PayPal faces UK backlash over account closures

As we reported last week, PayPal has cancelled the accounts of a number of campaigning organizations in the UK, citing its Acceptable Use Policy but without providing a specific reason.

On Friday The Times reported that the fintech giant was poised to back down in the case of parents' group UsForThem, which campaigned for schools to be kept open during the pandemic.

Continue reading

Why enterprises need to treat data as a first class citizen [Q&A]

Data has become increasingly important for modern businesses and they increasingly expect it to help them improve their delivery to customers and ultimately their bottom line.

We spoke to Dom Couldwell, head of field engineering, EMEA at DataStax to discuss how companies can use data and how they need to adapt their approach to do so effectively.

Continue reading

Legacy technology undermines ransomware response

Ransomware

Almost half of respondents to a new survey say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. 46 percent are relying on primary backup and recovery infrastructure that was designed in, or before, 2010.

The study commissioned by Cohesity from Censuswide also finds 62 percent expressed some level of concern over whether their IT and security teams would be able to mobilize efficiently to respond to an attack.

Continue reading

Are we heading for a cyber war?

We've already seen that cyberattacks have played a role in the war in Ukraine. But what about the prospect of more widespread cyber warfare. Could Ukraine be just a testing ground?

Education advice site Security Degree Hub has produced an infographic looking at the prospects of a cyber war and what it might look like.

Continue reading

Staying ahead of the hackers with zero trust [Q&A]

With the decline of the traditional enterprise network perimeter, more and more organizations are turning to a zero trust approach to securing their systems.

This not only reduces the attack surface, it ensures that if an attack does succeed it's much less likely to spread laterally within the network. We talked to Tim Silverline, VP of security at network automation specialist Gluware, to find out more about what implementing zero trust means.

Continue reading

Wolfi Linux is designed to safeguard the software supply chain

supply chain

The desire for software supply chain integrity and transparency has left many organizations struggling to build in software security measures like signatures, provenance, and SBOMs to legacy systems and existing Linux distributions.

This has prompted Chainguard to produce Wolfi, a new Linux '(un)distribution' and build toolchain, that's been designed from the ground up to produce container images that meet the requirements of a secure software supply chain.

Continue reading

Untrained workers don't know who to turn to when faced with cybersecurity threats

Worried It worker

Without training, 21 percent of the workforce don't not know who to go to when faced with a cybersecurity threat.

A new report from security awareness training platform KnowBe4 shows that annual security training reduces that percentage to 17 percent.

Continue reading

PayPal cancels customers it doesn't like

PayPal on a smartphone

In the past 48 hours or so PayPal’s UK arm has canceled the accounts of a number of campaigning organizations including the Free Speech Union, legal campaigners Law or Fiction, parents group UsForThem, and even the personal account of the FSU's founder journalist Toby Young.

The only reason the company has given for these actions is to cite its Acceptable Use Policy. And, as Young wrote in his column in The Spectator, PayPal also decided it would hang onto his money for up to 180 days while deciding whether to extract 'damages' before refunding it.

Continue reading

Windows 11 could save you millions*

computer piggy bank and cash

As the latest update to Windows 11 rolls out with new features focusing on productivity and collaboration, IT management efficiency and security, Microsoft is understandably keen for businesses to adopt the OS.

To that end it's commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Windows 11 and Microsoft 365.

Continue reading

Firms act to beef up software supply chain security

supply chain

New data reveals a significant increase in activities to secure open source components and integrate security into developer toolchains in order to protect the software supply chain.

The 13th edition of the Building Security In Maturity Model (BSIMM) report from Synopsys analyzes the software security practices of 130 organizations -- including Adobe, PayPal and Lenovo -- in their efforts to secure more than 145,000 applications built and maintained by nearly 410,000 developers.

Continue reading

Why anomalies in network traffic are key to cybersecurity [Q&A]

Networked computers

Major cyberattacks invariably make the headlines, but it seems that rather than take a proactive approach, many CISOs wait for a new threat to emerge before protecting their business. They simply hope they won't be caught up in the first wave of a new attack.

Dave Mitchell, CTO of cybersecurity investigation specialist HYAS Infosec, believes there is a better approach, one that detects threats by monitoring the communications that form the foundations of internet architecture. We recently talked to him to learn more.

Continue reading

New solution enhances facial recognition technology

Identity fraud is on the rise, with cybercriminals employing increasingly sophisticated techniques including realistic 2D/3D masks and deploying display attacks (e.g. showing a picture of a person on a screen) to try to spoof biometric verification systems.

Identity verification specialist Onfido is launching a new 'biometric liveness solution' called Motion which is aimed at increasing verification speed and ensuring that it’s seeing a real person.

Continue reading

Half of IT pros believe quantum computing could put their data at risk

quantum computing

A new study from Deloitte shows 50.2 percent of professionals at organizations considering quantum computing benefits believe that their organizations are at risk from 'harvest now, decrypt later' (HNDL) cybersecurity attacks.

In HNDL attacks, threat actors harvest data from unsuspecting organizations, anticipating that data can be decrypted later when quantum computing gets sufficiently mature to render some existing cryptographic algorithms obsolete.

Continue reading

Think your business is ready for ransomware? Think again

Although business leaders think they're fully prepared to deal with ransomware, actual outcomes suggest otherwise, according to a new report.

Druva has commissioned IDC to conduct independent research into ransomware preparedness, challenges, and threats to find out how approaches to ransomware are changing and whether common recovery efforts are effective.

Continue reading

Data center sector unprepared for expanding sustainability requirements

Data center

The latest Annual Global Data Center survey from the Uptime Institute shows an industry that remains strong but is working to address increasing pressure for sustainability progress and reporting.

The sector is also grappling with continuing staffing shortages, supply chain delays, costly outages and other complex challenges.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.