Ian Barker

Banks choose to build their own tech solutions

While banks are investing in technology solutions to meet increasing demands, a new study shows that 61 percent prefer to build their own technology stack, rather than buy technology solutions from a third party.

The study from IT services company NTT DATA surveyed 900 senior banking respondents across 12 countries and examines the state of corporate banking following the COVID-19 pandemic.

Continue reading

Successful AI deployment needs to be enterprise wide

Artificial intelligence

Businesses are keen to capitalize on AI, with 72 percent of business leaders in a new survey believing their competitors are using AI, and 63 percent concerned their competitors will use AI to gain an advantage over their own business.

But the study from SambaNova Systems, of over 2100 enterprise and IT leaders based in the US, UK, and Germany, shows just 18 percent of organizations with AI are rolling it out as a large-scale enterprise-class initiative. The majority -- 82 percent -- are rolling it out as multiple programs, creating disorganization and hindering successful deployment.

Continue reading

Do we need a cyber NATO to address the changing threat landscape? [Q&A]

security guards

The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves.

Is the best way to stay on top of the most pressing threats to harness the power of the global cybersecurity community for defense in a sort of cyber NATO? We talked to SOC Prime CEO Andrii Bezverkhyi to find out.

Continue reading

Honor among cyber thieves, the professional side of the dark web

Much like the legitimate eCommerce world, trust and reputation have become essential parts of the cybercriminal trade. New research by HP Wolf Security finds 77 percent of cybercriminal marketplaces analyzed require a vendor bond -- a license to sell -- which can cost up to $3,000.

In other evidence of a professional approach, 85 percent of these sites use escrow payments, and 92 percent have a third-party dispute resolution service. Every marketplace provides vendor feedback scores too. Cybercriminals also try to stay a step ahead of law enforcement by transferring reputations between websites -- as the average lifespan of a dark net website is only 55 days.

Continue reading

New process helps deliver Kubernetes observability

As Kubernetes becomes increasingly widely adopted, monitoring these systems effectively becomes even more critical for businesses. But because Kubernetes is by nature ephemeral -- things can be created and destroyed quickly -- this represents a challenge.

As a Gartner report last year pointed out poor or manual monitoring procedures can introduce friction for developers and loss of visibility. To combat this problem, analytics platform Sumo Logic has unveiled a new process to deliver Kubernetes observability in just a few clicks.

Continue reading

IT and security leaders lack confidence in their ability to protect the cloud

Cloud data security

A new study from secure access specialist Appgate based on research by the Ponemon Institute finds 60 percent of IT and security leaders are not confident in their organization's ability to ensure secure cloud access.

The survey of nearly 1,500 IT decision makers and security professionals worldwide sets out to examine the pain points experienced in securing cloud environments and how zero trust security methods can enable digital transformation.

Continue reading

Almost half of organizations suffer voice network attacks

A new survey shows that 47 percent of organizations have experienced a vishing (voice phishing) or social engineering attack via their voice networks in the past year.

The study by voice traffic protection specialist Mutare also finds most are unaware of the volume of unwanted phone calls traversing their network, or the significance of threats lurking in unwanted traffic, which includes robocalls, spoof calls, scam calls, spam calls, spam storms, vishing, smishing and social engineering.

Continue reading

Quantum computing and its impact on cybersecurity [Q&A]

quantum computing

Quantum computing with its vastly improved processing capability offers the chance of many positive developments in research and science. But it also represents a potential threat to our current encryption models.

How big is quantum's threat to cybersecurity? And should we be taking action on this now? We talked to Skip Sanzeri, QuSecure co-founder and COO, to find out.

Continue reading

More than half of enterprises worried about supply chain risks

Software supply chain risk has become mainstream, with 52 percent of respondents to a new survey being concerned about it.

The study from cybersecurity company Coalfire also finds 50 percent of boards of directors with software-buying companies are raising concerns, which means that responsibility for software supply chain risk is no longer confined to technical teams.

Continue reading

Research reveals weaknesses in five popular web services

New research from Specops Software finds major cybersecurity weaknesses in popular web services including Shopify, Zendesk, Trello, and Stack Overflow.

The study shows several popular business web applications have failed to implement critical password and authentication requirements to protect customers from cybercrime.

Continue reading

Average cost of a data breach increases by 16 percent

A new report released today by ForgeRock shows the average cost of a breach in the US has increased by 16 percent to $9.5m, making the US the costliest place in the world to recover from a breach.

It also reveals a massive 297 percent surge in breaches caused primarily by security issues associated with supply chain and third-party suppliers and representing almost 25 percent of all breaches.

Continue reading

Overview of network operations is crucial for IT teams

binoculars lomg term view

A unified view of network operations is essential for IT teams that want to improve the digital customer experience while boosting their overall productivity, according to a new study.

A new survey for Riverbed, conducted by IDC, reveals that 90 percent of respondents currently use observability tools, yet 60 percent of them believe those tools are too narrowly focused and fail to provide a complete and unified view of their organization's operating conditions.

Continue reading

Now that 5G is becoming widespread what can we expect from 6G? [Q&A]

Mobile tracking

The 5G rollout is continuing, but technology companies, academics, service providers, and even governments are already starting to look ahead to the next generation of mobile technology.

So, what is 6G and what benefits will it offer over earlier standards? We spoke to Roger Nichols, 6G program manager at Keysight Technologies, to find out.

Continue reading

Lack of automation costs enterprises millions

Automation

A lack of automation capabilities for managing IT performance costs an average of $46 million a year according to a new study. While 57 percent of organizations see automation as the key enabler for closing the modernization skills gap in managing IT Operations.

The report from research firm Digital Enterprise Journal also reveals a 54 percent increase in cost of one hour of IT service down time since 2019. In addition 68 percent of IT teams' time is spent on tasks that do not contribute to key business outcomes.

Continue reading

The artificial intelligence tug-of-war in the world of cybersecurity [Q&A]

pixel padlock

It's a rare cybersecurity product these days that doesn't claim to have some form of AI capability. But exactly what benefits does AI deliver? And is there a risk of an arms race as threat actors also turn to the technology?

We spoke to Corey Nachreiner, CSO at WatchGuard Technologies, to find out more about the role of AI in cybersecurity.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.