Ian Barker

Culture not tech is a barrier to DevOps success

DevOps

While 83 percent of IT decision makers say their organizations are implementing DevOps practices, many have stalled at a mid-stage of evolution.

A report from infrastructure automation company Puppet shows that it isn't technology but rather cultural blockers which remain the biggest hurdle to reaching DevOps maturity.

Continue reading

Critical vulnerabilities found in cloud-based ICS management systems

refinery industry

There are lots of good reasons for moving industrial control systems to the cloud including better telemetry and analysis of device performance, management of logic and remote device configuration, improved diagnostics and troubleshooting, a centralized view of processes.

But as more operational technology and lCS make the move, they become increasingly vulnerable to threats. ICS security specialist Claroty has unveiled its new Team82 research arm along with a report on critical vulnerabilities found in cloud-based management platforms for ICS.

Continue reading

Companies risk data exposure as employees leave

Employee leaving

New research from SASE company Netskope reveals the risk of critical data exfiltration linked to employees leaving their jobs.

The report finds that some departing employees present a disproportionately significant cloud security risk. In their last 30 days of employment, workers have been shown to be uploading three times more data than usual to personal cloud apps.

Continue reading

Organizations are losing the war on phishing

According to a new study of over 1,000 enterprise IT professionals around the world, 40 percent of organizations confirm they have fallen victim to a phishing attack in the last month, with 74 percent experiencing one in the last year.

The research from automation platform Ivanti also shows that 80 percent of respondents say they have witnessed an increase in volume of phishing attempts, with 85 percent saying those attempts are getting more sophisticated.

Continue reading

Personal devices could pose a risk as workers go back to the office

Executive social media

New research shows that 61 percent of employees intend to bring their personal devices into the office as they return to more conventional working patterns.

A study of 2,000 UK employees, conducted by Censuswide on behalf of asset visibility and security platform provider Armis, shows 61 percent of employees use their personal mobile phone and 44 percent use their own laptop for business purposes.

Continue reading

How real live phishing emails can help protect users [Q&A]

Phishing

Phishing remains one of the most popular attack vectors for cybercriminals. But traditional defenses relying on filtering or raising user awareness via training aren't always effective.

We spoke to Lior Kohavi, chief technology officer at enterprise SaaS security specialist Cyren to discover how a new approach is using genuine attacks to help both educate users and keep phishing emails out of our inboxes.

Continue reading

Firewalla goes Purple to protect gigabit networks

Regular readers will recall that last year we reviewed the Firewalla, a little box that provides protection for your network.

We tested the Blue version that provides protection for networks up to 500Mbps in speed. Now the company is launching a new Purple version that works at gigabit speeds and has extra features too.

Continue reading

Roll up, roll up! Spot a scam to win a prize!

Cybersecurity is one of the biggest challenges for small and medium-sized businesses and employees are often the weakest link when it comes to preventing data breaches.

In order to improve awareness of phishing scams -- and hopefully stop people falling for them -- ESET is launching an interactive phishing derby to allow people to test their scam-spotting skills and get the chance to win real prizes.

Continue reading

Why a safer future depends on protecting IoT devices [Q&A]

Internet of things

There's been a huge proliferation of Internet of Things devices in recent years, but along with this has come a whole range of new security and privacy concerns.

How are IoT devices secured -- if they are at all -- and what are they doing with our data? We spoke to Rob Shavell, co-founder and CEO of Aine/DeleteMe to talk about security gaps, privacy concerns and more.

Continue reading

Office workers welcome automation but worry about their jobs

Automation

Workers in IT, HR, finance and other roles welcome the use of tools that automate processes and improve productivity -- but many are concerned automation might someday make their jobs less relevant.

A study by Thirdera, specialist in services for ServiceNow users, finds 83 percent of workers are using AI-powered search, chatbots, self-service portals, mobile apps, AIOps, business intelligence and dynamic scheduling tools every day, and 46 percent have been doing so for at least a year.

Continue reading

Who is responsible for guarding against software supply chain attacks? Who knows!

Software supply chain attacks like that on SolarWinds have become more of a threat in recent months. But when it comes to defending against them businesses can't decide who is responsible according to a new report.

The study from machine identity management company Venafi is based on the opinions of over 1,000 information security professionals, developers and executives in the IT and software development industries.

Continue reading

Businesses fall victim to ransomware despite precautions

ransomware laptop

According to a new survey of 200 decision makers in businesses that had suffered a ransomware attack since 2019, more than half of victims had received anti-phishing training and 49 percent had perimeter defenses in place at the time of attack.

The study conducted by Sapio Research for Cloudian finds that phishing continues to be one of the easiest paths for ransomware, with 24 percent of attacks starting this way. Phishing succeeds despite the fact that 54 percent of all respondents and 65 percent of those that reported it as the entry point have conducted anti-phishing training for employees.

Continue reading

Critical manufacturing vulnerabilities soar in 2021

Industrial IoT

New research shows that critical manufacturing vulnerabilities rose 148 percent in the first half of 2021 with ransomware-as-a-service driving attacks.

The report from Nozomi Networks finds ICS-CERT vulnerabilities increased by 44 percent too. Manufacturing is the most susceptible industry with the energy sector proving vulnerable too.

Continue reading

AI goes mainstream for delivering service desk management

Using artificial intelligence to streamline their service desk operations is something that 93 percent of businesses are planning according to a new survey.

The study conducted by IDG for Freshworks shows 61 percent of IT managers have already deployed AI at some level and 32 percent are exploring the possibilities.

Continue reading

New solution helps manage identities and entitlements

identity management

Businesses are increasingly adopting the public cloud, but this brings with it a number of security challenges that traditional tools struggle to handle.

Identity specialist Attivo Networks is launching a new Cloud Infrastructure Entitlement Management (CIEM) solution designed to improve visibility and reduce the attack surface for identities and entitlements in the cloud.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.