Ian Barker

How improving the application experience can deliver for business [Q&A]

Motion interface

Spending on cloud services is showing no sign of slowing down, but IT and security leaders are realizing that applications need to have high availability and strong performance in order to be effective.

Application experience management is therefore becoming a key element of enterprise strategy. We spoke to Jason Dover, VP product strategy at Progress, to find out why.

Continue reading

Why we need to face up to the e-waste problem [Q&A]

old scrap computers

A record 59.1 million tonnes (53.6 million tons) of e-waste was generated by homes and businesses in 2019, but only 17.4 percent of it was correctly recycled, the rest ending up in landfill or other disposal routes.

With the amount of e-waste expected to grow further, it's still the case that many people simply don't know where or how to properly recycle their obsolete devices.

Continue reading

Twitter finally adds an edit button -- but only for some

Twitter header

One of the most frustrating features of Twitter has always been that once you've sent a tweet it becomes carved in digital stone. You can't go back and change it to fix typos or add missing hashtags.

Your only option is to delete it and try again, but that makes you look like a bit of an idiot. An edit button is the most requested feature among Twitter's 230 million plus users and it seems that the company has finally decided to give them what they want.

Continue reading

Supply chain issues lead to mobile app vulnerabilities

app frustration

A new study from Symantec's Threat Hunter team looks at how upstream supply chain issues can make their way into mobile apps, making them vulnerable.

Issues identified include mobile app developers unknowingly using vulnerable external software libraries and SDKs, as well as companies outsourcing the development of their mobile apps then ending up with vulnerabilities that put them at risk.

Continue reading

Thousands of Android apps leak hard-coded secrets

Android hazard sign

Thousands of Android apps have hard-coded secrets which means that a malicious actor -- and not necessarily a very skilled one -- could gain access to API keys, Google Storage buckets and unprotected databases and more.

Research from Cybernews shows that over half of 30,000 investigated apps are leaking secrets that could have huge repercussions for both app developers and their customers.

Continue reading

Enterprises increase their SaaS usage but neglect security risks

SaaS

A new study of SaaS usage among enterprises across the US, UK and Europe shows 74 percent report more than half of their applications are now SaaS-based, and 66 percent are spending more on SaaS applications today than a year ago.

The study by cybersecurity asset management company Axonius shows the increase in SaaS applications has resulted in more complexity and increased security risk in 66 percent of organizations, but 60 percent rank SaaS security fourth or lower on their list of current security priorities, and only 34 percent say they're worried about the costs associated with rising SaaS-based app usage.

Continue reading

How decentralized storage can help prevent data breaches [Q&A]

Network

According to a recent IBM report the average cost of a data breach is now $4.35 million. If enterprises don't take steps to protect personal data effectively they risk losing not just money but also the trust of their customers.

We spoke to Saswata Basu, founder and CEO of 0Chain, to discuss how decentralized storage can help to address the problem.

Continue reading

Enterprises are storing more data than ever

folder stack

According to a new study more than 50 percent of enterprises are managing 5PB or more of data, compared with less than 40 percent that were doing so in the same survey last year.

The 2022 Unstructured Data Management Report from Komprise also shows most are now spending more than 30 percent of their IT budget on storage and backups.

Continue reading

IBM and VMware help businesses modernize hybrid cloud workloads

cloud button

IBM and VMware are using this week's VMware Explore event to announce an expanded partnership to help clients and partners modernize mission-critical workloads and speed up time to value in hybrid cloud environments.

The two companies are also planning to help clients in regulated industries such as financial services, healthcare and the public sector address the cost, complexity and risk of migrating and modernizing mission-critical workloads in the cloud.

Continue reading

Facial recognition -- the good, the bad and the getting older

Your friends may not be willing to tell you that you're looking older, but facial recognition systems have no such reservations.

Face-recognition algorithms might struggle to identify you as the same person after just five years, according to the New Scientist.

Continue reading

Taking a holistic approach to application security [Q&A]

DevSecOps

Application security is becoming mainstream, and that's a good thing as it means that security testing is becoming an embedded aspect of the software development life cycle (SDLC). It also means that automated security testing tools are becoming faster, more sophisticated, and better integrated, so they're less likely to slow down developers or burden them with too many trivial findings or false positives.

But as good and necessary as AppSec testing tools are, it's not nearly enough simply to buy them and run them -- you need to buy the right ones and configure them correctly so that they help build security into your SDLC without bogging it down. It's important to implement a security strategy and a plan. It’s also important to employ developers with the skills to build trust into your software -- a concept known as 'holistic AppSec'.

Continue reading

Nextcloud works with governments to create MS Office rival for the EU

The European Union's relationship with big tech companies has long been a fractious one. Its Digital Markets Act is aimed at reigning in their power and, among other things, it's credited with forcing Apple to adopt the USB-C standard.

In the latest development a number of European governments are working with Nextcloud to create a 'digitally sovereign' office platform, the aim being to help governments regain their independence from a small number of tech giants and allow them to confidently roll out digitization efforts.

Continue reading

Ransomware attacks top 1.2 million per month

Ransomware skull

A new report from Barracuda finds the volume of ransomware threats detected spiked between January and June of this year to more than 1.2 million per month.

Researchers have also seen a spike in the number of service providers that have been hit with a ransomware attack. The main targets, however, are still five key industries: education, municipalities, healthcare, infrastructure, and financial.

Continue reading

Tackling cybercrime and the threat of 'script kiddies' [Q&A]

Major cyberattacks still have the power to make headline news, yet reporting and indeed conviction rates for cybercrime remain low. It's perhaps not surprising then that rising numbers of young people are getting involved in these illegal activities.

We spoke to Simon Newman, International Cyber Expo Advisory Council member and CEO of the Cyber Resilience Centre for London, to get his views on what needs to be done to improve reporting and change the mindset of 'script kiddies' for the better.

Continue reading

Data maturity drives increased revenues

Data-mature enterprises see a three times improvement in revenue along with shorter time to market, greater profit, improved operational efficiency and great customer loyalty, according to a new report.

The study from IDC and sponsored by analytics specialist Heap shows that how well a company uses data and employs it in its decision making can provide up to a 2.5 times average increase in business outcomes across the board.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.