Improved data privacy equals improved revenues


According to a new survey, 94 percent of chief data officers (CDOs) from healthcare organizations and financial services firms say that deploying data privacy technology that enforces existing privacy regulations would result in increased revenues for their organizations.
The study from privacy technology specialist TripleBlind finds 37 percent of respondents estimate improved collaboration would increase revenues as much as 20 percent. In addition, 46 percent say increased data collaboration would give their organization a competitive advantage over others.
Native .NET comes to Ubuntu hosts and containers


Microsoft and Canonical have announced that the .NET development platform is available as a native experience on Ubuntu hosts and container images, starting in Ubuntu 22.04 LTS.
This means .NET developers will be able to start their Linux journey with Ubuntu and will benefit from timely security patches and new releases as the two companies work together to deliver them.
DevSecOps delivers significant results but take up remains low


Only 22 percent of organizations have developed a formal DevSecOps strategy integrating security into software development lifecycle processes, according to a new report.
But the study from Mezmo shows an overwhelming percentage of those that do have a strategy report a positive impact on accelerating incident detection (95 percent) and response (96 percent) efforts.
New, free tool to help enterprises assess financial risk of cyberattacks


A successful cyberattack can have significant costs for a business, in terms of both reputation and finances. But what's the actual cost of an attack? And if you're looking at insurance how much should you be covered for?
To help answer those questions Safe Security is announcing two industry-first assessment tools to empower organizations to make financial decisions based on their actual cyber risk.
Cybercriminals attack the wrong water company in bungled extortion attempt


On Monday, hacker group ClOp claimed to have gained access to 5TB of data from UK water supplier Thames Water and said it could change the chemical composition of the company's water supply.
Thames Water denied the reports and said it hadn't faced a cyber attack. Today it emerges that an attack has taken place but on a different company, South Staffordshire plc, the parent company of South Staffs Water and Cambridge Water.
Monitoring and management of backups becomes more challenging


Monitoring of backups has long been a necessary chore for IT professionals, but a report out today shows that new issues are also impacting the category and creating greater challenges.
The study from Bocada, a company which specializes in the automation of backup reporting and monitoring, is based on a survey of over 260 IT professionals. Varied environments and growing data volumes are revealed as a major concern, with securing data across backup applications the most-cited backup management challenge, followed by protecting growing data volume.
Cloud hyperscalers get more involved in open source


Amazon, Microsoft, and Google are getting more employees involved in open source than ever before according to new analysis.
A study from Aiven of GitHub, the repository hosting service, finds the total number of active contributors to GitHub from Amazon, Microsoft, and Google has increased by 300 percent in six years -- from 2,654 contributors in May 2016 to 10,549 in May 2022.
The changing role of the CISO [Q&A]


The IT infrastructure of a modern enterprise is made up of a complex architecture of dynamic networks, cloud deployments, software applications, and endpoint devices.
Each of these has its own set of security controls, which form a critical part of the technology ecosystem, but managing these systems can hinder efficient threat detection and response, which in turn compromises visibility, allowing vulnerabilities and gaps to flourish.
Attacks on healthcare organizations increase 90 percent


There has been a 90 percent increase in the number of healthcare organizations targeted by cyber-attacks, in comparison with the first quarter of 2022.
The latest cyber threat Landscape report from Kroll finds that while phishing continues to be the vector used for initial access, there has been a vast increase in external remote services (such as VPNs and RDP environments) being compromised, up 700 percent.
Why run your database in Kubernetes? [Q&A]


Kubernetes is one of the most widely used platforms for running containerized applications. Many businesses though still run their databases in a more traditional environment.
Of course there's no reason why you can't run a database in Kubernetes and there are many advantages to doing so. We spoke to Karthik Ranganathan, founder and CTO of cloud-native database specialist Yugabyte, to discuss the pros and cons.
New cloud-based platform helps protect operational security


As more and more devices that we might not conventionally think of as 'IT' become connected, the risks to enterprises increase.
To address this concern Claroty is launching xDome, a new cloud-based industrial cybersecurity platform that drives cyber and operational resilience for modern industrial businesses.
Stolen data used to launch more effective BEC attacks


New research from Accenture shows that data stolen in ransomware and other cyberattacks is being weaponized in order to carry out business email compromise (BEC) attacks.
Underground forums have sets of credentials for sale for as little as $10 that provide access to genuine corporate email accounts, making malicious emails seem genuine.
Cybercriminals take shortcuts to attack business PCs


Office macros have long been a favorite attack method for cybercriminals but now that Microsoft has started blocking them by default the bad guys have started to turn to other methods.
A new report from HP Wolf Security shows a shift to shortcut (LNK) files being used to deliver malware. Attackers often place shortcut files in ZIP email attachments, to help them evade email scanners.
AI-based security solution protects email and messaging


With more people working remotely, messaging and email have become even more essential tools, but the sharing of sensitive data via these routes also presents risks.
Concentric AI is using this week's Black Hat USA to launch an AI-based solution that protects sensitive data shared as text or attachments across today’s most popular business messaging platforms, including email, Slack, and Microsoft Teams.
Enterprises lose millions by not fully exploiting their IT


Failure to make the most of their technology investments could be costing large enterprises almost $100m a year according to a new study.
The report from user experience company WalkMe shows enterprises struggle to give employees the ability to use digital tools as they are intended and to their fullest extent.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.