Legacy systems harder to maintain due to skills shortage


A new study from IT services provider Advanced shows 89 percent of large enterprises worldwide are worried they won't have access to the right IT talent to maintain and manage their legacy systems.
But the skill to modernize these systems are also scarce. Almost two-fifths (37 percent) of senior professionals -- including CIOs and Heads of IT -- admit their modernization programs have failed because they lack the depth and breadth of skills required for newer technologies like the Cloud. In addition 38 percent blame a lack of planning for the success of modernization projects.
Companies back employee privacy but don't deliver it


In a new survey of over 1,200 IT and security practitioners 63 percent say it's important or very important to protect employees' privacy in the workforce, yet only 34 percent of organizations think they are effective or very effective in doing so.
The study, carried out by the Ponemon Institute for workforce cyber intelligence company DTEX Systems, also finds that most organizations have a difficult time balancing workforce privacy with the growing need to monitor employee engagement and internal risk, given the shift to remote work.
98 percent of companies experience cloud data breaches


In the last 18 months 98 percent of companies in a new survey have experienced at least one cloud data breach -- up from 79 percent last year.
The research, conducted by IDC for cloud infrastructure company Ermetic, reveals that of the 200 CISOs and security decision makers surveyed 67 percent report three or more breaches, and 63 percent say they had sensitive data exposed.
Smaller business' IT budgets prioritize remote work, security and cloud


The IT budgets of small and medium businesses will prioritize three things in the coming year: remote management (58.4 percent), security (55.9 percent), and cloud services (50.1 percent), according to a new report.
The latest State of the SME IT Admin Report from JumpCloud also reveals that 74 percent of the 400+ IT decision makers surveyed say remote work makes it harder for employees to follow good security practices.
How eCommerce has adapted to the pandemic [Q&A]


One of the side effects of the COVID-19 pandemic has been a boost to online shopping. This has increased pressure on companies offering eCommerce to adapt quickly to the new business model.
But how well have businesses -- particularly smaller ones -- coped with this and what should they be focusing on as we move forward?
A majority of email links lead to malicious sites


A new email security report from GreatHorn reveals that 30 percent of links received by email lead to malicious sites.
Spoofed email accounts or websites are the most experienced form of a business email compromise (BEC) attack as 71 percent of organizations acknowledge they have seen one over the past year. This is followed by spear phishing (69 percent) and malware (24 percent).
Connected device industry faces severe skills shortage


Demand for connected devices is causing a severe developer skills shortage and a crisis in wellbeing as developers come under increasing pressure.
New research for the Qt Company, carried out by Forrester Consulting, finds 75 percent of connected device manufacturers say that demand is outstripping supply. At the same time 65 percent are worried about the wellbeing of their developers.
AI will be used to unleash a global cyber incident in the next 12 months


New research from Deep Instinct finds that 78 percent of SecOps professionals are concerned that cyber adversaries will develop and deploy AI to cause a global cyber incident in the next 12 months.
The study of 600 IT and cybersecurity professionals finds more than half of respondents believe ransomware or zero-day attacks are the biggest threats to their organization.
Linux Foundation launches Open Voice Network


Many organizations are now relying on voice assistant systems to handle enquiries, but just as with other forms of information it's important to protect the consumer and the proprietary data that flows through voice.
The Linux Foundation is launching an Open Voice Network, an open source association dedicated to advancing open standards that support the adoption of AI-enabled voice assistance systems.
Only seven percent of IT security leaders report direct to the CEO


New research from SOC specialist LogRhythm finds that just seven percent of security leaders are reporting to the CEO, and only 37 percent say they or someone in their security function reports to the board of directors.
In addition 53 percent of security leaders claim their senior leadership doesn't understand their role, and 51 percent believe they lack executive support.
Sophisticated new attacks target container supply chains and infrastructure


New research reveals a continued rise in cyberattacks targeting container infrastructure and supply chains, and shows that it can take less than an hour to exploit vulnerable container infrastructure.
The latest threat report from cloud-native security company Aqua Security offers a detailed analysis of how bad actors are getting better at hiding their increasingly sophisticated attacks.
Facing the business challenge of open data [Q&A]


We're all familiar with the term 'big data' but not perhaps with 'open data'. Open data is information that can be freely reused and distributed, it's often linked with mixing datasets too.
But what challenges does dealing with open data present for enterprises? We spoke to Mo Ladha, product manager at content services platform Hyland, to find out.
Why open banking apps must stay secure to earn consumer trust [Q&A]


Traditional banks are realizing that they must develop more user-friendly open banking apps if they're not to lose customers to fintech startups.
But it's critical that these apps gain the trust of consumers if open banking is to succeed. We spoke to Jasen Meece, CEO of Cloudentity to discuss how financial services companies can ensure their open banking apps and partners adhere to compliance standards and protect consumer’s personal data.
Five percent of VPN solutions remain unpatched and vulnerable


In 2020 we saw a huge shift to remote working, with VPN often the technology of choice for keeping connections secure.
But a new Network Security Report from SpiderLabs at Trustwave reveals that this trend didn't go unnoticed by cybercriminals, with malicious actors targeting unpatched VPN vulnerabilities more frequently.
Why service mesh adopters are moving from Istio to Linkerd [Q&A]


Service mesh, in case you're unfamiliar with it, is an infrastructure layer that facilitates service-to-service communications between services or microservices via the use of a proxy.
This offers a number of benefits including secure connections and visibility of communications. The two main competitors in the service mesh space are Istio and Linkerd, and the market has recently seen a shift towards the latter. We spoke to William Morgan, CEO of Buoyant and co-creator of Linkerd, to find out more about service mesh and why the shift is happening.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.