Ian Barker

Over 65s feel excluded by online brands

New research from customer engagement platform Twilio shows older consumers are being left behind when businesses digitize their customer facing operations.

Although consumers over 65 hold significant digital shopping power, with 76 percent relying on online shopping in the UK, only 12 percent say they feel understood by brands they interact with digitally.

Continue reading

Key things you didn't know about phishing

Phishing is one of the most common forms of cyberattack, fooling people into thinking they're dealing with a trusted organization in order to get them to part with credentials.

But what are the hallmarks of a phishing attack? Atlas VPN has collected some phishy statistics to find out.

Continue reading

Why security teams should prepare to slay the three-headed dragon [Q&A]

Governments, utilities and other key industries are prime targets for attack including from nation state actors and cybercriminals seeking to extract a ransom.

But David Anteliz, technical director at Skybox, believes that given the increase in tensions across the world threat actors will evolve their tactics with the use of a 'three-headed dragon approach' that goes beyond the probing we have seen so far.

Continue reading

How endpoint security and management are consolidating [Q&A]

Endpoint protection

Securing endpoints used to be a simple matter of installing a firewall and antivirus solution and then keeping them updated.

But as threats have become more sophisticated, networks more complex and working patterns have shifted away from the office, securing and managing endpoints has become a much greater problem for enterprises.

Continue reading

Relying on CVSS scores for vulnerability management may be misguided

security flaw

The latest vulnerability intelligence report from Flashpoint finds that 52 percent of all vulnerabilities reported in the first half of 2022 that were scored 10.0 -- the most severe level -- on CVSS are likely scored incorrectly.

When scoring, CVSSv2 guidelines take a 'score for the worst' approach if details of some of the metrics used are unclear. But the report points out this has resulted in many vulnerabilities being scored a 10.0, even though they are actually less severe, simply due to vendors providing fewer details.

Continue reading

Increased expectations see burnout on the rise among enterprise tech teams

Digitization and rising consumer expectations are having a major impact on the working conditions of technology teams leading to a rise in burnout and attrition.

A new study from PagerDuty shows 42 percent working more hours in 2021 than in 2020, and 54 percent of responders are being interrupted outside normal working hours.

Continue reading

Linux malware reaches an all time high

Malware magnifier

In the past cybercriminals have tended to shun Linux in favor of more widely used operating systems, but new data indicates that this trend is starting to shift.

Statistics from the Atlas VPN team show new Linux malware reached record numbers in the first half of 2022, with nearly 1.7 million samples being discovered. This puts it in second spot for the number of new samples even though it has only one percent of the OS market (not counting Android).

Continue reading

A third of businesses feel locked in to major cloud providers

Private secure cloud

Hyperscale cloud providers continue to dominate the market, with Azure and AWS in use as the major public cloud provider by 82 percent of businesses.

But new research from Civo shows that 34 percent of users feel locked into the services these major providers deliver, with 65 percent of these saying that data transfer costs are too expensive for them to move off their current cloud.

Continue reading

So you want to set up an IT support business? Here's what's really involved [Q&A]

With more businesses looking to outsource their support thanks to factors like skills shortages, there's clearly a demand for providing services like automation and remote monitoring and management tools.

But what does it take to set up an IT support business? And how does the idea live up to reality? We spoke to Dale Dawson, director of product at MSP platform Syncro to find out.

Continue reading

New solution makes it easier to manage machine learning models

machine learning AI

More than 80 percent of organizations do not have the necessary visibility and control over their machine learning models or how they're deployed throughout the ML model development lifecycle.

To deal with this problem, Iterative has built an open-source model registry solution that allows teams to easily manage models with full context around model lineage, version, production status, data used to train the model, and more.

Continue reading

Cybercriminals go phishing for data in the social media pool

Phishing

The latest quarterly report from NortonLifeLock's global research team, Norton Labs, looks at how cybercriminals are using social media phishing attacks to steal private information.

Based on analysis of a full year of phishing attacks on the top social media platforms, it finds plenty of fake login pages designed to trick victims into inputting their login credentials, but also a diversity and complexity of lures going far beyond that one technique.

Continue reading

60 percent of security pros say their strategy doesn't keep up with the threat landscape

A new survey reveals that 60 percent of respondents believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20 percent), treading water (13 percent), or merely running to keep up (27 percent).

The study from privileged access management specialist Delinea also shows that 84 percent of organizations experienced an identity-related security breach in the last 18 months, despite 40 percent of respondents believing they have the right strategy in place.

Continue reading

Cybercriminals use messaging apps to steal data and spread malware

Mobile phone malware

The shift to remote working has boosted the popularity of messaging apps, in particular those like Discord and Telegram which have underlying elements that allow users to create and share programs or other types of content that's used inside the platform.

But research from Intel471 shows cybercriminals are finding ways to use these platforms to host, distribute, and execute functions that ultimately allow them to steal credentials or other information from unsuspecting users.

Continue reading

A third of employees don't understand the importance of cybersecurity

Man shrugging shoulders

One in three employees doesn't understand the importance of cybersecurity at work according to new research from email security company Tessian.

In addition only 39 percent of employees say they're very likely to report a security incident, making investigation and remediation even more challenging and time-consuming for security teams. When asked why, 42 percent of employees say they wouldn't know if they had caused an incident in the first place, and 25 percent say they don't care enough about cybersecurity to mention it.

Continue reading

Addressing the cybersecurity talent shortage [Q&A]

talent

Cyber threats are growing in volume and sophistication, but efforts to combat them are being hampered by a shortage of cybersecurity skills.

One way of meeting that shortage is to look at upskilling and retraining within the current workforce. We spoke to Apratim Purakayastha, chief technology officer at Skillsoft, to find out more about how using innovative learning solutions can deliver the skills businesses need.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.