Ian Barker

API attack traffic grows more than 300 percent

API

In the past six months overall API traffic has increased 141 percent but in the same time period, API attack traffic has grown by a startling 348 percent.

A new report from Salt Security reveals significant challenges in addressing API security, with all Salt customers experiencing API attacks, security topping the list of API program concerns, and very few respondents feeling confident they can identify and stop API attacks.

Continue reading

Cybersecurity skills crisis impacts more than half of organizations

Vacant chair

The cybersecurity skills crisis has impacted 57 percent of organizations, according to the fifth annual global study of cybersecurity professionals by the Information Systems Security Association (ISSA) and industry analyst firm Enterprise Strategy Group (ESG).

The survey of almost 500 security professionals finds the top effects of the skills shortage include an increasing workload for the cybersecurity team (62 percent), unfilled open job vacancies (38 percent), and high burnout among staff (38 percent).

Continue reading

Cloud migration shows no signs of slowing down

cloud migration

According to a new study 31 percent of companies have moved workloads to the cloud within the last six months compared to only 18 percent six months ago.

Based on a survey of almost 1,000 IT decision makers, the report from cloud migration specialist Next Pathway shows 36 percent are migrating to the cloud to prevent customers from leaving for more personalized solutions offered by competitors that are using the cloud to enable a superior digital experience.

Continue reading

Mainframe applications still key to business strategy

According to a new study from the IBM Institute for Business Value, 71 percent of executives surveyed say mainframe-based applications are central to their business strategy.

Also, in three years, the percentage of organizations using mainframe assets in a hybrid cloud environment is expected to increase by more than two times.

Continue reading

Cybercriminals work together to drive greater profits

Cybercrime is getting more organized than ever, as threat actors increase collaboration and adapt methods to drive greater monetization, selling access to breached systems to organized criminal groups and ransomware gangs.

The latest HP Wolf Security Threat Insights Report, reveals a 65 percent rise in the use of hacking tools downloaded from underground forums and file sharing websites between the second half of 2020 and the first half of 2021.

Continue reading

Businesses continue to struggle with app security

Threats to web, mobile and API-based apps are developing rapidly and the average time taken to fix them isn't improving, with critical vulnerabilities remaining open on average for 202 days.

NTT Application Security has released its latest AppSec Stats Flash report looking at the current state of application security and the wider threat landscape. It finds the utilities sector the worst, with with 66 percent of applications in the industry having at least one serious exploitable vulnerability throughout the year.

Continue reading

IT leaders think remote workers are more at risk but struggle to protect them

home working security

A new survey of enterprise IT security leaders shows almost 80 percent believe remote workers are at more risk from phishing attacks now because they're isolated from their organizations' security teams.

The study from Egress also reveals that more than 59 percent of respondents feel solutions such as video training (27 percent), email reminders (20 percent), and VPNs (12 percent), are sufficient by themselves to keep organizations safe from the biggest security breach fears: damage to brand and reputation, and legal jeopardy.

Continue reading

What to do after a ransomware attack [Q&A]

Ransomware

Ransomware is a major problem and ideally while you'd like to avoid being attacked, the chances are that at some point you're going to be a target.

So, what happens following an attack and what should organizations be doing immediately afterwards to lessen the impact? We spoke to Ed Williams, EMEA director of SpiderLabs at Trustwave, to find out and to get some tips on how to proactively secure against ransomware attacks in future.

Continue reading

Enterprise endpoint protection needs to move to zero trust

As enterprise boundaries have become more flexible, older authentication models of security have begun to look increasingly outmoded.

A new survey of 150 IT security decision makers carried out by ThycoticCentrify finds that 71 percent of contributors agree that a distributed workforce makes a zero trust security strategy even more critical.

Continue reading

Cyber attacks on council workers increase over 200 percent

Local councils have faced the same pressure as commercial businesses to have people working at home during the pandemic. But a new report shows attacks on UK councils' remote workers rose by 213 percent from March 2020 compared to the previous year.

Freedom of Information (FOI) requests made by technology solutions provider Insight, show that on average councils switched 74 percent of their employees -- more than double the UK average -- to remote working during the pandemic.

Continue reading

How streaming can help developers improve their handling of data [Q&A]

Data is increasingly important to companies, but making effective use of it presents a number of challenges.

NoSQL database company DataStax has recently launched its new Astra Streaming service. Based on Apache Pulsar this aims to make it easier for developers who want to run their application streaming alongside their database instances like Cassandra.

Continue reading

36 percent of organizations have suffered a serious cloud breach in the last year

cloud lock

A new survey of 300 cloud professionals finds that 36 percent of organizations have suffered a serious cloud security data leak or a breach in the past 12 months.

The study conducted by security and compliance automation firm Fugue and developer tools company Sonatype finds eight out of ten are worried that they're vulnerable to a major data breach related to cloud misconfiguration.

Continue reading

97 percent don't recognize the security limitations of containers

open digital lock

A new study finds that only three percent of respondents recognize that a container, in and of itself, is not a security boundary, suggesting that the default security capabilities of containers are overestimated.

The survey, from cloud security company Aqua Security of 150 cloud native security practitioners and executives from IT, Security and DevOps teams, across sectors and geographies, also shows that only 24 percent of respondents have plans in place to deploy the necessary building blocks for runtime security.

Continue reading

Over half of exploits sold on underground forums are for Microsoft products

Dark web hacker

A new study from Atlas VPN shows that 51 percent of exploits sold on underground cybercriminal forums are for Microsoft products.

Microsoft Office exploits make up 23 percent while Windows accounts for 12 percent of exploits sold on hacker forums. Remote Desktop Protocol (RDP) exploits make up 10 percent, with Internet Explorer and Share Point taking three percent each.

Continue reading

Stability is key to success of mobile apps

Stability is key to the success of mobile apps according to a new report from Bugsnag which shows that a drop of just one percent in stability can lead to a loss of a star in app store ratings.

Users rate apps on the Google Play and Apple App Stores based on their overall experience with factors like usefulness, design, engagement and stability. While the median stability across analyzed apps within the report is 99.8 percent, more stable apps are found to have a competitive advantage, resulting in higher ratings.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.