Ian Barker

Trustwave's new MDR solutions improve detection and response times

Cloud data security

New managed detection and response (MDR) offerings launched by Trustwave aim to give organizations real-time 24x7 monitoring of their hybrid multi-cloud environments for active threats and anomalies.

Trustwave MDR and Trustwave MDR Elite are backed by a team of global threat operators, threat hunters, and malware experts. Clients also get a free subscription to Trustwave Security Colony -- a battle-tested resource specifically built for CISOs that includes toolkits, guidelines, playbooks, and assessment capabilities.

Continue reading

Could democratization of AI help prevent the Great Resignation? [Q&A]

Artificial intelligence

The Great Resignation has hit the IT industry harder than most, with recent figures from Gartner suggesting only 29 percent of global IT workers have a ‘high intent’ to stay in their current role.

AI is sometimes blamed for reducing the number of jobs, but could a democratization of AI in the workplace help retain staff by giving them the skills to be more involved in the flow of work?

Continue reading

New UK data laws set to make annoying cookie pop-ups crumble

Website pop-ups asking you to consent to cookies have become a regular -- if irritating -- feature for European internet users since the introduction of GDPR in 2018.

As part of a post Brexit shake up of data law the UK government has announced that its Data Reform Bill will cut down on the number of times these 'user consent' boxes will be shown.

Continue reading

The rise of double extortion ransomware

Ransomware sign

We've become familiar with the widespread use of ransomware, but researchers at Rapid7 have been examining the rise of a newer phenomenon, 'double extortion'.

Pioneered by the Maze ransomware group, double extortion involves cybercriminals collecting files before encrypting them. Then if the target organization refuses to pay they threaten to release sensitive information.

Continue reading

Why and how organizations are modernizing their container deployments at the edge [Q&A]

Edge computing is aimed at bringing computing power closer to the source of data, such as IoT devices. It's increasingly being seen as an alternative to traditional data center and cloud models.

Stewart McGrath is the CEO at Section, a global Edge as a Service (EaaS) provider that helps organizations improve availability of their containerized application workloads in the cloud. We spoke to him to find out how and why companies are moving applications out to the edge.

Continue reading

Choose your partners carefully to protect your security

Man and woman shaking hands

Choosing a partner business with a poor security posture makes an organization 360-times more likely to be at risk compared to choosing a top security performer, according to a new study.

The risk surface research from Cyentia Institute and RiskRecon shows that single demographic factors, such as industry, size and region, aren't enough to assess the risk posed by third parties.

Continue reading

Microservices and service mesh are critical to digital transformation

New research shows that 85 percent of companies are modernizing their applications to a microservices architecture.

The study from Solo.io and ClearPath Strategies reveals that 56 percent of organizations with at least half of their applications on a microservices architecture have faster development cycles, with daily or more frequent releases.

Continue reading

Enterprises vulnerable to identity-related incidents due to lack of mature strategies

identity theft mask

Only 16 percent of respondents to a new survey have a fully mature identity and access management (IAM) strategy in place, yet 56 percent have experienced identity-related incidents in the last three years.

The study carried out by the Ponemon Institute for enterprise identity specialist Saviynt shows that the 84 percent without a mature strategy are currently dealing with inadequate budgets, programs stuck in a planning phase, and a lack of senior-level awareness.

Continue reading

Email threats still managing to evade defenses

Email attack

New research released today from Cyren shows that business email perimeter defenses are often incapable of preventing well-crafted email attacks.

During an average month, there are 75 malicious messages per 100 mailboxes that slip past email security filters like Microsoft 365 Defender. This means that an enterprise with 5,000 mailboxes would need to detect and respond to 3,750 confirmed malicious inbox threats each month.

Continue reading

Automation improves employee retention

Whenever automation is discussed there are always concerns around whether it will lead to a need for fewer staff or will cause existing employees to leave.

But a new study from Samsara shows that 95 percent of businesses which have already implemented AI and automation report it has in fact led to increased employee retention.

Continue reading

74 percent say iPaaS is a key factor for competitiveness

Integration Platform as a Service (iPaaS) is the most important factor in competitiveness, say 74 percent of companies in a new survey.

The research, carried out by Forrester Consulting for Celigo, also shows that 67 percent of respondents from organizations that don't have iPaaS say a lack of visibility into the data needed to make real-time decisions and a lack of data integrity due to manual data entry, delays, incompleteness and errors are major challenges of their firms' current SaaS landscapes.

Continue reading

Just because you have a backup strategy it doesn't mean you can recover data

Backup key

Almost all (99 percent) of IT decision makers say they have backup strategies in place, but 26 percent admit they were unable to fully restore all data or documents when recovering from a backup.

These findings come from a survey conducted for encrypted USB drive company Apricorn by Vanson Bourne, which also finds that 27 percent have automated backups to both central and personal repositories.

Continue reading

Meeting the challenges of multicloud [Q&A]

Cloud

Businesses have been using the cloud for many years, but only in more recent times have we seen the rise of multicloud as companies seek to spread their public cloud workload.

Why has multicloud become such a popular strategy and what challenges does it present? We talked to Pavel Despot, senior product manager at Akamai, to find out.

Continue reading

Budgets up and incidents down as CISOs take control

CISO

Organizational cybersecurity has significantly improved over the last year, following positive shifts in influence by CISOs and changing attitudes towards security culture, according to a new report.

The ninth annual Information Security Maturity report, published by ClubCISO in collaboration with Telstra Purple, surveyed more than 100 information security leaders around the world and finds 54 percent report that 'no material incident occurred', in the past year, compared to 27 percent in 2021.

Continue reading

Demand for automation surges across all areas of business

Automation

Demand for automation from business teams has increased over the last two years according to 91 percent of respondents to a new survey.

The study from MuleSoft shows the highest demand for automation comes from research and development (39 percent), administrative/operations (38 percent), customer service (33 percent), and marketing (26 percent).

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.