Ian Barker

Improved data privacy equals improved revenues

privacy key

According to a new survey, 94 percent of chief data officers (CDOs) from healthcare organizations and financial services firms say that deploying data privacy technology that enforces existing privacy regulations would result in increased revenues for their organizations.

The study from privacy technology specialist TripleBlind finds 37 percent of respondents estimate improved collaboration would increase revenues as much as 20 percent. In addition, 46 percent say increased data collaboration would give their organization a competitive advantage over others.

Continue reading

Native .NET comes to Ubuntu hosts and containers

code

Microsoft and Canonical have announced that the .NET development platform is available as a native experience on Ubuntu hosts and container images, starting in Ubuntu 22.04 LTS.

This means .NET developers will be able to start their Linux journey with Ubuntu and will benefit from timely security patches and new releases as the two companies work together to deliver them.

Continue reading

DevSecOps delivers significant results but take up remains low

Only 22 percent of organizations have developed a formal DevSecOps strategy integrating security into software development lifecycle processes, according to a new report.

But the study from Mezmo shows an overwhelming percentage of those that do have a strategy report a positive impact on accelerating incident detection (95 percent) and response (96 percent) efforts.

Continue reading

New, free tool to help enterprises assess financial risk of cyberattacks

Risk dial

A successful cyberattack can have significant costs for a business, in terms of both reputation and finances. But what's the actual cost of an attack? And if you're looking at insurance how much should you be covered for?

To help answer those questions Safe Security is announcing two industry-first assessment tools to empower organizations to make financial decisions based on their actual cyber risk.

Continue reading

Cybercriminals attack the wrong water company in bungled extortion attempt

On Monday, hacker group ClOp claimed to have gained access to 5TB of data from UK water supplier Thames Water and said it could change the chemical composition of the company's water supply.

Thames Water denied the reports and said it hadn't faced a cyber attack. Today it emerges that an attack has taken place but on a different company, South Staffordshire plc, the parent company of South Staffs Water and Cambridge Water.

Continue reading

Monitoring and management of backups becomes more challenging

Disk backup

Monitoring of backups has long been a necessary chore for IT professionals, but a report out today shows that new issues are also impacting the category and creating greater challenges.

The study from Bocada, a company which specializes in the automation of backup reporting and monitoring, is based on a survey of over 260 IT professionals. Varied environments and growing data volumes are revealed as a major concern, with securing data across backup applications the most-cited backup management challenge, followed by protecting growing data volume.

Continue reading

Cloud hyperscalers get more involved in open source

open source

Amazon, Microsoft, and Google are getting more employees involved in open source than ever before according to new analysis.

A study from Aiven of GitHub, the repository hosting service, finds the total number of active contributors to GitHub from Amazon, Microsoft, and Google has increased by 300 percent in six years -- from 2,654 contributors in May 2016 to 10,549 in May 2022.

Continue reading

The changing role of the CISO [Q&A]

CISO

The IT infrastructure of a modern enterprise is made up of a complex architecture of dynamic networks, cloud deployments, software applications, and endpoint devices.

Each of these has its own set of security controls, which form a critical part of the technology ecosystem, but managing these systems can hinder efficient threat detection and response, which in turn compromises visibility, allowing vulnerabilities and gaps to flourish.

Continue reading

Attacks on healthcare organizations increase 90 percent

There has been a 90 percent increase in the number of healthcare organizations targeted by cyber-attacks, in comparison with the first quarter of 2022.

The latest cyber threat Landscape report from Kroll finds that while phishing continues to be the vector used for initial access, there has been a vast increase in external remote services (such as VPNs and RDP environments) being compromised, up 700 percent.

Continue reading

Why run your database in Kubernetes? [Q&A]

Business database

Kubernetes is one of the most widely used platforms for running containerized applications. Many businesses though still run their databases in a more traditional environment.

Of course there's no reason why you can't run a database in Kubernetes and there are many advantages to doing so. We spoke to Karthik Ranganathan, founder and CTO of cloud-native database specialist Yugabyte, to discuss the pros and cons.

Continue reading

New cloud-based platform helps protect operational security

business security

As more and more devices that we might not conventionally think of as 'IT' become connected, the risks to enterprises increase.

To address this concern Claroty is launching xDome, a new cloud-based industrial cybersecurity platform that drives cyber and operational resilience for modern industrial businesses.

Continue reading

Stolen data used to launch more effective BEC attacks

Email attack

New research from Accenture shows that data stolen in ransomware and other cyberattacks is being weaponized in order to carry out business email compromise (BEC) attacks.

Underground forums have sets of credentials for sale for as little as $10 that provide access to genuine corporate email accounts, making malicious emails seem genuine.

Continue reading

Cybercriminals take shortcuts to attack business PCs

Shortcut

Office macros have long been a favorite attack method for cybercriminals but now that Microsoft has started blocking them by default the bad guys have started to turn to other methods.

A new report from HP Wolf Security shows a shift to shortcut (LNK) files being used to deliver malware. Attackers often place shortcut files in ZIP email attachments, to help them evade email scanners.

Continue reading

AI-based security solution protects email and messaging

Chat network

With more people working remotely, messaging and email have become even more essential tools, but the sharing of sensitive data via these routes also presents risks.

Concentric AI is using this week's Black Hat USA to launch an AI-based solution that protects sensitive data shared as text or attachments across today’s most popular business messaging platforms, including email, Slack, and Microsoft Teams.

Continue reading

Enterprises lose millions by not fully exploiting their IT

Burning money

Failure to make the most of their technology investments could be costing large enterprises almost $100m a year according to a new study.

The report from user experience company WalkMe shows enterprises struggle to give employees the ability to use digital tools as they are intended and to their fullest extent.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.