Ian Barker

OnMail launches new feature to help with email fatigue

OnMail Inbox Break

We all know the feeling, you're happily working away when an email pings into your inbox, you look at it, you might even answer it, but then you have to refocus back to what you were doing before.

It can be a problem in your personal life too, when quality time with the family is interrupted by business emails. Annoying, isn't it? Well email service OnMail clearly thinks so because it's introducing a new feature that allows you to take designated 'inbox breaks'.

Continue reading

Cado offers enterprises a free cloud security investigation

magnifier

The rapid shift to cloud and remote working environments has raised security concerns for businesses and also meant hackers have increasingly turned their attention to cloud-native systems.

In response to this, digital forensics platform Cado Security is offering enterprises unlimited access to its Cado Response platform, including container and memory forensics, for 14-days, allowing them to carry out a free investigation.

Continue reading

Poor security practice leaves industry open to cyber threats

Despite a marked increase in concerns around malware attacks and third-party risk, only eight percent of organizations with web applications for file uploads have fully implemented the best practices for file upload security.

This is among the findings of the latest Web Application Security Report from critical infrastructure protection specialist OPSWAT.

Continue reading

UK unveils post-Brexit data plans to boost digital trade and end annoying cookie confirmation pop-ups

Brexit flags

In the first signs of UK data policy starting to diverge from the EU, the government has today announced a package of measures to help it seize the opportunities of data to boost growth, trade and improve public services.

Plans include 'data adequacy' partnerships with 10 countries including the US, Australia and Republic of Korea, and the appointment of a new Information Commissioner to oversee the changes.

Continue reading

Real-time analysis critical for detecting phishing threats

Phishing

The latest analysis of phishing data from the Cyren Incident and Response team shows that 88 percent of evasive threats were detected using real-time techniques like machine learning.

Of the remainder six percent were found with proprietary threat intelligence or readily matched patterns from previous attacks, and the remaining six percent were suspicious messages that required human analysis to confirm the detection.

Continue reading

Protecting Kubernetes from ransomware [Q&A]

Ransomware

Many organizations have been quick to adopt containerization and particularly Kubernetes. But while there are advantages in scale and flexibility, it also raises issues around cloud-native data protection practices.

So how can businesses adopt the technology but still protect their information? We spoke to Gaurav Rishi, VP product, at Kubernetes backup specialist Kasten by Veeam to find out.

Continue reading

98 percent of UK organizations plan to use zero trust architecture

Almost all UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations according to new research from Illumio.

The research also looks at the barriers that prevent organizations from adopting zero trust. The main technological barriers include legacy systems that can't be upgraded (29 percent) and cost constraints (22 percent).

Continue reading

IT leaders struggle to support unstructured data in the cloud

rain cloud

The majority of organizations are managing more than 1PB of data and spending more than 30 percent of their IT budgets on data storage and protection, according to a new report into unstructured data from data management company Komprise.

Based on responses from 300 IT storage decision makers at companies in the US and UK, it finds 65.5 percent of organizations spend more than 30 percent of their IT budgets on data storage and management.

Continue reading

Un-managed SaaS data access creates risk

SaaS

According to a new report 40 percent of all SaaS assets are un-managed, leading to a greater degree of internal, external, and public access to sensitive data.

The report from data access company DoControl categorizes data by insider and external threats. It finds that, in companies analyzed, an average of 400 encryption keys are shared internally to anyone with a link.

Continue reading

Businesses boost SecOps staffing to guard against threats

Security

A report out today shows that 85 percent of enterprises have increased their budget investment in security operations during the pandemic, while 72 percent have increased their staffing and 79 percent have increased their adoption of advanced security technologies.

The study from the CyberRes arm of Micro Focus also reveals that security operations centers (SOCs) have increased their adoption of the cloud, with 95 percent now deploying their solutions in hybrid-cloud environments.

Continue reading

How 'bending reality' can deliver business success [Q&A]

success v failure

What makes tech pioneers successful? What’s the key to becoming a business billionaire? Leadership adviser Victoria Song thinks it's because they have the ability to 'bend reality' to what they want it to be.

What's more she believes that with a simple meta-framework that underlies peak performance, self-development, and meditation anybody can become a success in the same way.

Continue reading

Productivity tools don't always make life easier

While communication apps like Microsoft Teams are growing in popularity, they also present productivity pitfalls for employees who need to search across an increasing number of platforms.

New research from enterprise search specialist Sinequa finds three-quarters of Teams users like the application because it offers a quick and easy way to collaborate with colleagues.

Continue reading

IBM unveils new chip designed to detect fraud with AI

IBM is releasing details of its new Telum Processor, designed to bring deep learning to enterprise workloads and help address fraud in real-time.

Telum is IBM's first processor to contain on-chip acceleration for AI inferencing while a transaction is taking place. Three years in development, the breakthrough of this new on-chip hardware acceleration is designed to help customers achieve business insights across banking, finance, trading, insurance applications and customer interactions.

Continue reading

With the rise of zero trust, is the VPN really dead? [Q&A]

VPN tiles

As a big chunk of the world suddenly started to work from home during the pandemic, many companies turned to VPNs as a means of securing remote access.

However, as more systems are now in the cloud and secured using zero trust network access (ZTNA) is the age of the VPN over? We spoke to Robert Byrne, field strategist at One Identity to find out.

Continue reading

Value of personal data increases 1,800 percent in 20 years

Man with cash

If you use the internet it's almost impossible to avoid exposing at least some of your personal information to the sites you use. What you may not be aware of is just how valuable this personal data is to businesses.

New research from marketing specialist MIQ Digital shows that in 2001 an average user generated around $1.97 (£1.45) worth of Google Ads revenue, in 2021 this is up to $35.40 (£26), an 1,800 percent increase.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.