OpenSilver picks up where Silverlight leaves off


Let us pause for a moment to remember Microsoft Silverlight. The web application framework and alternative to Flash and Java reaches the end of its support life today.
Whilst it never had the market penetration of the others, Silverlight had a 15-year lifespan and in 2010 the plug-in was on over 53 percent of browsers.
Remote work brings increased risk for SMEs


Remote working is leading to increased cyber risk for smaller enterprises according to new research from data center specialist ServerChoice.
New working patterns brought about by COVID mean that many technical staff at SMEs are now based remotely and 77 percent see remote working as an increased risk to their business.
The security challenges of widespread container use [Q&A]


Containers have provided greater flexibility and enabled developers to think less about their infrastructure. However, securing them presents a challenge.
Traditional workload protection technologies designed for static workloads don't work well on minimized, ephemeral container workloads. There's also increased use of open source software that presents additional risks.
Why businesses need to take vulnerability and risk management seriously [Q&A]


As businesses rely more on the cloud and virtual infrastructure, so the potential for both configuration errors and cyberattacks increases.
The pandemic has only made the problem worse and in many cases led to a loosening of security policy. What do organizations need to do to address the issue and protect their systems? We spoke to Tal Morgenstern, Vulcan Cyber CPO and co-founder, to find out.
SMBs feel more secure despite increasing cyberattacks


A new survey of over 700 small and medium businesses shows that 80 percent say they feel more secure now than they did last year in spite of increasing levels of cyberattacks.
The study from network security specialist Untangle shows security budgets increasing over 2020 levels too.
Hybrid working has boosted Apple adoption in the enterprise


The switch to remote and hybrid working has seen 76 percent of enterprises report increased use of Apple devices, according to a new study from device management company Kandji.
Mac notebook computer use is up the most with a 63 percent reported increase. Additionally, over half (53 percent) of respondents report that requests for Apple devices have increased in the past two years, and far more report bigger increases in requests for Apple (42 percent) than any other device (11 percent).
Majority of AWS accounts are vulnerable to ransomware


As more data moves to the cloud, platforms like AWS are becoming an increasingly attractive target for ransomware operators.
A new study by cloud infrastructure company Ermetic finds that 70 percent of environments studied had machines that were publicly exposed to the internet and were linked to identities whose permissions could be exploited to allow the machines to perform ransomware.
New browser-based enterprise endpoint is designed for hybrid working


A browser-based endpoint solution created to address the unique threats imposed by the hybrid workforce and designed with employee experience in mind is being launched today by Talon Cyber Security.
TalonWork can be deployed across the organization in less than an hour, allowing security leaders to make the browser their first line of defense with minimum complexity, cost and without additional hardware.
Patching is too complex and time consuming say IT pros


A new survey from automation platform Ivanti reveals that 71 percent of IT and security professionals find patching to be overly complex, cumbersome, and time consuming.
In addition 57 percent of respondents say that remote work has increased the complexity and scale of patch management.
UK businesses are attacked every 47 seconds


UK businesses faced a new cyberattack every 47 seconds over the summer as the volume of attempts to breach their systems online increased following an earlier slowdown.
Analysis of commercial internet traffic from business ISP Beaming shows that the attack rate increased by four percent between July and September, having fallen in the second quarter.
The changing role of developers in the enterprise [Q&A]


Recent trends such as cloud, open-source software and low-code platforms have led to radical changes in the role of developers.
But what exactly is the effect of these changes and how can development teams prepare for them and take advantage of the opportunities they offer? We spoke to Bob Quillin, chief ecosystem officer at modernization platform vFunction, to find out.
Hybrid working is popular but workers hate being 'always on'


The COVID-19 pandemic brought about a rapid shift to home and hybrid working, a change which looks as though it could be here to stay according to new research from video conferencing specialist Poly.
The survey of over 7,000 hybrid workers across seven countries shows that 82 percent of respondents intend to spend at least one day a week working from home in the future, with 54 percent planning to split their time evenly between office and home.
ExtraHop unveils new threat detection capabilities


High volumes of threats and shortages of skilled staff can lead to security teams becoming overwhelmed and this has led many companies to turn to professional and managed services.
Network detection and response (NDR) specialist ExtraHop is launching an expansion of its expanded Reveal(x) Advisor service that provides threat detection and hunting capabilities alongside network assurance analysis.
Qualys offers free ransomware risk assessment


Ransomware continues to be a major issue, with the FBI recently reporting a 62 percent year-on-year increase for the period ending July 31.
Unpatched vulnerabilities, device misconfigurations, internet-facing assets and unauthorized software rank consistently among the top attack vectors, but how can businesses track them down?
New storage solution cuts data costs and keeps organizations in control


As the quantity of unstructured data generated globally continues to grow exponentially, the storage needed to cope with it needs to grow too and that adds to cost.
What's more much of this data will be 'cold' -- inactive data that must be stored, protected, and kept accessible for years or decades because of compliance requirements or the value it contains.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.