Ian Barker

Three-quarters of enterprises don't have full observability of log data

data magnifier

Log data is important for tasks such as tracking performance of applications and capacity resources, informing product improvements, and identifying threats and anomalous activity.

But a new report from LogDNA, based on a Harris poll of more than 200 professionals responsible for observability and log data management across the US, shows 74 percent of companies are still struggling to achieve true observability despite substantial investments in tools.

Continue reading

Ransomware doesn't take weekends off

ransomware key

Ransomware is being targeted at organizations seven days a week, leaving no time for enterprises to shore up their security operations, according to a new report.

Analysis of publicly reported ransomware events by RiskRecon looks at the dates on which ransomware activated to encrypt systems, a metric that which was disclosed in 473 of the 654 events examined.

Continue reading

Password frustrations lead two-thirds of shoppers to abandon their carts

Poor account and password experiences at checkout mean two-thirds of shoppers abandon a shopping cart if they need to create an account according to new research.

Passwordless security firm, Beyond Identity surveyed more than 1,000 people in the UK and found that 62 percent of respondents have abandoned a shopping cart if required to create an account.

Continue reading

Modernizing your intranet to improve the employee experience [Q&A]

remote working

Whether they are working from the office or at home, employees need a seamless digital experience to stay engaged, productive and do their jobs effectively.

Larger enterprises often use an intranet, but delivering an improved experience requires a new way of thinking about an organization's intranet, using it as a resource to not only meet employees needs where they are but to improve their day-to-day experience.

Continue reading

What are Log4Shell and log4j and should you be worried about them?

At the end of November a vulnerability targeting Minecraft servers was uncovered. If you don't play Minecraft you probably didn't pay it much attention.

Since then, however, 'Log4Shell' has surged across the web sending tremors through the security community and prompting the US government to describe it as a 'severe risk'. So, what's going on and is it time to panic?

Continue reading

Lack of segmentation exposes enterprise networks to risk

Segmentation

Segmentation is an approach that separates critical areas of the network to control traffic, prevent lateral movement, and ultimately reduce the attack surface.

But according to a new study from Guardicore -- based on a survey of over 1,000 IT decision makers by Vanson Bourne -- while 96 percent of organizations claim to be implementing segmentation in their networks, only two percent are segmenting all six mission-critical asset classes, including critical applications, public-facing applications, domain controllers, endpoints, servers, and business critical assets/data.

Continue reading

Enterprises believe large cloud providers charge too much

Cloud money

The majority of businesses believe that large 'hyperscale cloud' providers are overcharging while also pursuing a narrative that their cloud offerings are low cost.

New research from cloud native provider Civo, based on responses from over 1,000 businesses, finds that 82 percent believe large public cloud providers like Amazon AWS, Google Cloud, and Microsoft Azure overcharge their customers.

Continue reading

Cybereason and Google Cloud launch AI-powered protection

cloud lock

Anything that's connected to the internet can be a possible attack route for hackers, but organizations are often forced to use multiple solutions for protection, adding complexity and risk.

Cybereason and Google Cloud are launching an AI-powered XDR (Extended Detection and Response) solution to enhance and simplify the ability to predict, detect, and respond to cyberattacks.

Continue reading

Why hybrid is the future of AI [Q&A]

Artificial intelligence

Artificial intelligence, along with machine learning, deep learning and natural language understanding are increasingly being combined to create a hybrid approach.

Harnessing a range of techniques in this way helps data scientists to produce the best results. We spoke to Luca Scagliarini, chief product officer at expert.ai to find out more about how this approach can work and why we can expect to see it becoming more common.

Continue reading

Breaking bias -- ensuring fairness in artificial intelligence [Q&A]

Artificial intelligence

Artificial intelligence is creeping into more and more areas of technology, increasingly becoming the basis for commercial and other decisions, but bias can find its way in to AI systems and lead to results that are neither fair nor objective.

To prevent bias in AI businesses need to understand the different types of bias that can occur and know what’s needed to address each of them. We spoke to Alix Melchy, VP of AI at Jumio, to find out about the problems AI bias can cause and what enterprises can do about them.

Continue reading

New solution aims to streamline enterprise identity management

identity management

Over time enterprises amass lots of applications, each of which has its own means of authentication and authorization for users. This inevitably leads to 'identity sprawl' with information being held in multiple different silos.

In order to unify identity data from all sources within an organization and turn it into a flexible resource that can deliver verification on demand, Radiant Logic is launching its RadiantOne Intelligent Identity Data Platform.

Continue reading

The internet is getting safer but legacy encryption techniques still linger

A new report from Venafi, based on in-depth security analysis of the world's top million websites over the last 18 months, shows the internet is becoming more secure.

Use of encryption is increasing and the adoption of newer TLS protocols is rising. However, many companies continue to use legacy RSA encryption algorithms to generate keys, despite stronger protocols being available.

Continue reading

SMEs face challenges around remote working

working from home

IT teams in small and medium businesses report a significant increase in challenges surrounding migrating and managing remote workforces, despite lower security concerns and adequate budgets.

The latest State of the SME IT Admin Report from cloud directory platform JumpCloud finds the top three security priorities are adding layered security for truly secure remote work, making remote work easier for end users, and making remote work easier for admins.

Continue reading

Developers become more reliant on APIs

api

A new study from RapidAPI reveals that 68 percent of developers expect to increase their API usage in 2022.

The report, based on responses from over 2,200 individuals, shows 61.6 percent of developers are already relying on APIs more in 2021 than in 2020. In addition 75.5 percent say that participating in the API economy is a top priority for their organization now or in the near future.

Continue reading

Linux Foundation to host Cloud Hypervisor project

Cloud

The Linux Foundation has announced that it will host the Cloud Hypervisor project, aiming to deliver a Virtual Machine Monitor for modern cloud workloads.

Written in Rust, the project has a strong focus on security, features include CPU, memory and device hot plugging; support for running Windows and Linux guests; device offload with vhost-user; and a minimal and compact footprint.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.