F-Secure creates new corporate security brand


Cybersecurity company F-Secure is rebranding its corporate security business under the new name WithSecure and with a snazzy new logo, above.
Previously known as F-Secure Business, WithSecure will focus on corporate security products and solutions, while consumer security products and services remain available under the existing F-Secure name.
Three-quarters of businesses plan to redesign the office as employees return


The switch to hybrid working driven by the pandemic has had a major impact on the relationship between employers and employees.
As people begin to drift back to the office, a new study by audio visual equipment specialist Poly shows that only 19 percent of enterprises are expecting staff to come back to the office full time, while 77 percent plan to redesign the office to include more open-plan areas, collaboration spaces, areas to socialize and quiet zones.
How PSD2 is changing open banking [Q&A]


Compliance with the EU Payments Services Directive (PSD2) is the next key milestone in the continued evolution of open banking. This evolution involves a new set of rules that will change how we confirm our identity when making purchases online.
The implementation of strong customer authentication (SCA), on top of existing open banking capabilities, will require merchants and payment service providers (PSPs) to work together with technology suppliers, card schemes and many others to deliver SCA in a way which works well for customers.
How enterprises responded to Log4Shell


When the Log4Shell vulnerability appeared in December last year the effects rippled across the cybersecurity world with potentially millions of devices affected.
A new study from Qualys takes a look at how enterprises responded to the vulnerability and how successful their remediation efforts were.
Leadership and technology tips for running a remote company successfully [Q&A]


When the world shut down in March 2020, many of us envisioned a two-week work-from-home stint, followed by a prompt return to office life. Little did we know that the business world, as we knew it, would change forever.
At the start of the COVID-19 pandemic, the overnight shift to a remote workforce was done out of necessity. But, over the past two years, companies have realized that this new operations model can have many business benefits, including cost savings associated with physical office space and a better work/life balance for employees.
Organizations invest more in site reliability engineering but challenges still persist


Businesses are investing more in site reliability engineering but are being held back by outdated and manual processes, according to a new report.
A study of 450 site reliability engineers carried out by software intelligence company Dynatrace finds 88 percent say there is now more understanding of the strategic importance of their role than there was three years ago.
88 percent of enterprises plan to boost IT automation investment


New research from service orchestration and automation solutions company Stonebranch finds 88 percent of enterprises intend to grow their investment in these technologies this year.
The report is based on a survey of respondents from companies with over 1000 employees to find their views about automation and orchestration as it relates to cloud, data pipelines, IT operations, self-service enablement, and more.
B2B software companies go virtual for sales and training


New research from CloudShare finds a significant shift in the way B2B software companies are connecting with customers and the potential for increased revenue that comes from a shift to virtual software experiences.
The amount of virtual proof of concepts (POCs) and self-paced virtual learning experiences has increased by nearly 400 percent in 2021 according to the study.
Cybercriminals impersonate Ukraine aid organizations in crypto phishing scams


It never takes long for threat actors to jump on a bandwagon and the Ukraine conflict is the latest event to prompt a wave of cryptocurrency phishing emails.
A new report of February's attack vectors from managed detection and response company Expel shows attempts to impersonate legitimate aid organizations to exploit people's desire to support refugees and victims with donations.
Enterprises look to unlock the power of data through full-stack observability


Following two years of rapid digital transformation and firefighting in response to the pandemic, enterprises are primed to drive the next critical wave of innovation according to a new report from Cisco AppDynamics.
The study of 1,200 technologists worldwide finds that appetite for full-stack observability has markedly increased over the past year, with 85 percent saying 2022 will be pivotal for their organization on the journey to unlock the power of data in an application-driven world.
Chameleon phishing attack brings bad karma to email users


New research by Trustwave SpiderLabs has uncovered a phishing attack that is able to adapt itself to the user's email service in order to trick them into revealing their login credentials.
The attack acts like a chameleon, putting up a fake login page tailored for whatever email service the victim is using. So Gmail users for example will see a different page from Apple, Outlook or Yahoo! Mail users.
All you need to get started with wireless microphones -- Maono WM820 (2-person) [Review]


If you're just recording audio at home or making video calls then a wired microphone that sits on your desk, or even the one built into your laptop, is probably quite adequate.
If you want to take your recordings and calls out and about though, or if you want to conduct interviews with another person, then wireless mics offer a more practical solution. The Maono WM820 2-person kit provides all you need to get started with wireless microphones in one box.
Linux and Raspberry Pi machines become top targets for credential hacking


New research shows that hackers are regularly gaining access to servers with the same commonly used -- often default -- passwords.
The data from Bulletproof also reveals that default Raspberry Pi usernames and logins feature prominently on the list of top default credentials used by hackers.
1Password launches new tools to help developers build secure software


Generating, managing and accessing secrets within development workflows can be a complex process and lead to the inadvertent introduction of risks.
Security and privacy specialist 1Password is launching a new set of developer tools that aim to simplify complex processes and improve security practices to ensure data is protected, without slowing down the development pipeline. This will also provide developers with secure access to the secrets they need wherever they are.
Cloud security tool sprawl leads to missed issues, false positives, burnout and more


A new survey of more than 800 IT professionals finds that 55 percent of respondents are using three or more cloud providers and 57 percent have five or more cloud security tools.
But the study from Orca Security shows this combination of multi-cloud adoption and disparate tooling is overwhelming security teams with inaccurate alerts. For example, 59 percent of respondents receive more than 500 public cloud security alerts a day, and 38 percent receive more than 1,000 a day.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.