Ian Barker

New endpoint solution delivers real-time protection against vulnerabilities

endpoint protection

A new IT management and endpoint security solution from Syxsense promises to deliver real-time vulnerability monitoring and instant remediation for every endpoint across an organization’s entire network.

Syxsense Enterprise combines Syxsense Secure, Manage, and Mobile Device Manager to deliver a completely unified platform that scans and manages all endpoints, resolves problems in real-time, and reduces the risks associated with system misconfigurations.

Continue reading

Security professionals say attackers are better at using AI than defenders

AI security

Over 30 percent of cybersecurity professionals think that malicious actors are more adept at using AI to attack their organization than they are at leveraging AI in-house for defense.

A new survey carried out by Wakefield Research for Devo Technology also shows how organizations are struggling to effectively implement AI to aid and augment cybersecurity efforts, with more than 50 percent having to undertake major changes, or reset and start again.

Continue reading

Google SMTP service exploited to send spoof emails

Email attack

Most of us don't think too much about the 'From' address field on our emails, it's filled in by your mail program or web service. At the recipient's end security tools can check this against the sending server to verify that the mail is legitimate.

But hold on a second, an SMTP relay server between the server and the inbox allows messages through even though the addresses don't match. This is how organizations send out mass mailings without them getting blocked.

Continue reading

Why networking technologies remain at the heart of online security [Q&A]

Networked computers

Networks and the internet are reliant on domain name servers, dynamic host control protocol, and IP address management. These three technologies -- grouped together as DDI (DNS, DHCP, IPAM) -- are central to the way things work but that also makes them a tempting target.

We spoke to Ronan David, chief of strategy at EfficientIP to find out why DDI is so vital to online security and how automation can help with defense.

Continue reading

The changing role of the CISO [Q&A]

CISO

Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.

CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.

Continue reading

IT leaders say Log4Shell was a wake-up call for cloud security

Data cloud lock

The Log4Shell vulnerability proved to be one of the major cybersecurity events of last year and its repercussions continue to rumble on.

Research from network security platform Valtix shows 95 percent of IT leaders say Log4Shell was a wake up call for cloud security, changing it permanently, and 87 percent feel less confident about their cloud security now than they did before the incident.

Continue reading

SEO techniques used to get users to trust phishing sites

password theft

Search engine optimization (SEO) is used to boost the ranking of websites by ensuring they offer quality content and a good user experience.

But new research from global threat intelligence firm Cybersixgill shows, perhaps not too surprisingly, that similar techniques are being exploited by threat actors to boost trust in their sites.

Continue reading

Fintech sector will struggle with global talent shortage

Fintech

The first quarter of this year has seen a massive 182 percent growth in tech roles within fintech, three times the pace of general market.

Figures from recruitment firm Robert Walters show that one in three new hires within fintech companies around the globe are software engineers and developers. Also the top eight fintech 'mega-hubs' account for over 90 percent of all new fintech jobs advertised around the globe.

Continue reading

New free tool aims to tackle post-pandemic cloud bloat

Cloud fail

As enterprises have moved to make their systems more accessible to hybrid working during the pandemic, they have increasingly been turning to cloud-based solutions.

But this rapid growth of cloud infrastructure leads to problems managing and optimizing cloud resources. Which is why cloud networking company Alkira is launching a free tool to expose shadow IT and recommend ways to secure, optimize, and boost cloud deployments.

Continue reading

Risks introduced by the fission between security and ITSM -- and how to remediate them [Q&A]

Every day, there seems to be a new headline about the latest ransomware threat, supply chain attack or malware strain.

And, while these are very real risks that organizations need to take seriously, an equally important security issue, albeit a much less publicized one, is the divide between security teams and professionals responsible for IT service management (ITSM).

Continue reading

Deepfakes and crypto scams are on the rise

The first quarter of 2022 has seen a rise in cybercriminals deceiving victims through new deepfakes and crypto scams to gain access to their financial or personal information.

The latest quarterly Consumer Cyber Safety Pulse Report from Norton Labs reveals deepfakes -- computer-generated images and videos -- are on the rise and being utilized by bad actors to spread disinformation.

Continue reading

2022 Call for Code Global Challenge aims to get developers focused on green solutions

Supported by IBM, The Linux Foundation and the UNHCHR, the 2022 Call for Code Global Challenge wants to bring together developers and problem solvers to use open innovation to help accelerate sustainability and combat climate change.

Now in its fifth year, Call for Code has galvanized a community of more than a half million developers, students, and problem solvers from 180 nations to design cutting-edge open source-powered hybrid cloud and AI solutions that can tackle some of the world's most pressing issues.

Continue reading

IT leaders think security is lagging behind current threats

security flaw

New research from Vectra AI reveals that 74 percent of respondents experienced a significant cybersecurity event in the past year.

The study surveyed 1,800 global IT security decision-makers at companies with over 1,000 employees and finds that 92 percent of respondents say that they had felt increased pressure to keep their organization safe from cyberattacks over the past year.

Continue reading

What's needed to improve trust in AI?

Artificial intelligence

Digital technology company, Kainos, along with award-winning slow news organization, Tortoise, has produced a report looking at how business leaders should respond to challenges around trust in AI.

Through interviews with twenty international AI experts -- from companies including Accenture, The Alan Turing Institute, and UNESCO -- the report identifies three guiding principles to improve trust in AI.

Continue reading

Musk takeover of Twitter sparks heated debate

Twitter bird megaphone

News that Elon Musk has succeeded in his bid to buy Twitter has, as you might expect, triggered a range of reaction. From rejoicing in some quarters to wailing and gnashing of teeth in others.

The debate rages on the platform itself as well as in the wider media. We've put together a range of views.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.