Ian Barker

F-Secure creates new corporate security brand

Cybersecurity company F-Secure is rebranding its corporate security business under the new name WithSecure and with a snazzy new logo, above.

Previously known as F-Secure Business, WithSecure will focus on corporate security products and solutions, while consumer security products and services remain available under the existing F-Secure name.

Continue reading

Three-quarters of businesses plan to redesign the office as employees return

The switch to hybrid working driven by the pandemic has had a major impact on the relationship between employers and employees.

As people begin to drift back to the office, a new study by audio visual equipment specialist Poly shows that only 19 percent of enterprises are expecting staff to come back to the office full time, while 77 percent plan to redesign the office to include more open-plan areas, collaboration spaces, areas to socialize and quiet zones.

Continue reading

How PSD2 is changing open banking [Q&A]

online banking

Compliance with the EU Payments Services Directive (PSD2) is the next key milestone in the continued evolution of open banking. This evolution involves a new set of rules that will change how we confirm our identity when making purchases online.

The implementation of strong customer authentication (SCA), on top of existing open banking capabilities, will require merchants and payment service providers (PSPs) to work together with technology suppliers, card schemes and many others to deliver SCA in a way which works well for customers.

Continue reading

How enterprises responded to Log4Shell

When the Log4Shell vulnerability appeared in December last year the effects rippled across the cybersecurity world with potentially millions of devices affected.

A new study from Qualys takes a look at how enterprises responded to the vulnerability and how successful their remediation efforts were.

Continue reading

Leadership and technology tips for running a remote company successfully [Q&A]

Remote working

When the world shut down in March 2020, many of us envisioned a two-week work-from-home stint, followed by a prompt return to office life. Little did we know that the business world, as we knew it, would change forever.

At the start of the COVID-19 pandemic, the overnight shift to a remote workforce was done out of necessity. But, over the past two years, companies have realized that this new operations model can have many business benefits, including cost savings associated with physical office space and a better work/life balance for employees.

Continue reading

Organizations invest more in site reliability engineering but challenges still persist

process automation

Businesses are investing more in site reliability engineering but are being held back by outdated and manual processes, according to a new report.

A study of 450 site reliability engineers carried out by software intelligence company Dynatrace finds 88 percent say there is now more understanding of the strategic importance of their role than there was three years ago.

Continue reading

88 percent of enterprises plan to boost IT automation investment

Automation

New research from service orchestration and automation solutions company Stonebranch finds 88 percent of enterprises intend to grow their investment in these technologies this year.

The report is based on a survey of respondents from companies with over 1000 employees to find their views about automation and orchestration as it relates to cloud, data pipelines, IT operations, self-service enablement, and more.

Continue reading

B2B software companies go virtual for sales and training

New research from CloudShare finds a significant shift in the way B2B software companies are connecting with customers and the potential for increased revenue that comes from a shift to virtual software experiences.

The amount of virtual proof of concepts (POCs) and self-paced virtual learning experiences has increased by nearly 400 percent in 2021 according to the study.

Continue reading

Cybercriminals impersonate Ukraine aid organizations in crypto phishing scams

It never takes long for threat actors to jump on a bandwagon and the Ukraine conflict is the latest event to prompt a wave of cryptocurrency phishing emails.

A new report of February's attack vectors from managed detection and response company Expel shows attempts to impersonate legitimate aid organizations to exploit people's desire to support refugees and victims with donations.

Continue reading

Enterprises look to unlock the power of data through full-stack observability

Following two years of rapid digital transformation and firefighting in response to the pandemic, enterprises are primed to drive the next critical wave of innovation according to a new report from Cisco AppDynamics.

The study of 1,200 technologists worldwide finds that appetite for full-stack observability has markedly increased over the past year, with 85 percent saying 2022 will be pivotal for their organization on the journey to unlock the power of data in an application-driven world.

Continue reading

Chameleon phishing attack brings bad karma to email users

New research by Trustwave SpiderLabs has uncovered a phishing attack that is able to adapt itself to the user's email service in order to trick them into revealing their login credentials.

The attack acts like a chameleon, putting up a fake login page tailored for whatever email service the victim is using. So Gmail users for example will see a different page from Apple, Outlook or Yahoo! Mail users.

Continue reading

All you need to get started with wireless microphones -- Maono WM820 (2-person) [Review]

If you're just recording audio at home or making video calls then a wired microphone that sits on your desk, or even the one built into your laptop, is probably quite adequate.

If you want to take your recordings and calls out and about though, or if you want to conduct interviews with another person, then wireless mics offer a more practical solution. The Maono WM820 2-person kit provides all you need to get started with wireless microphones in one box.

Continue reading

Linux and Raspberry Pi machines become top targets for credential hacking

Credentials on sticky note

New research shows that hackers are regularly gaining access to servers with the same commonly used -- often default -- passwords.

The data from Bulletproof also reveals that default Raspberry Pi usernames and logins feature prominently on the list of top default credentials used by hackers.

Continue reading

1Password launches new tools to help developers build secure software

DevSecOps

Generating, managing and accessing secrets within development workflows can be a complex process and lead to the inadvertent introduction of risks.

Security and privacy specialist 1Password is launching a new set of developer tools that aim to simplify complex processes and improve security practices to ensure data is protected, without slowing down the development pipeline. This will also provide developers with secure access to the secrets they need wherever they are.

Continue reading

Cloud security tool sprawl leads to missed issues, false positives, burnout and more

cloud worry

A new survey of more than 800 IT professionals finds that 55 percent of respondents are using three or more cloud providers and 57 percent have five or more cloud security tools.

But the study from Orca Security shows this combination of multi-cloud adoption and disparate tooling is overwhelming security teams with inaccurate alerts. For example, 59 percent of respondents receive more than 500 public cloud security alerts a day, and 38 percent receive more than 1,000 a day.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.