Ian Barker

Zero trust access, VPN, both? The changing face of remote network access [Q&A]

Networked computers

Virtual private network (VPN), software defined perimeter (SDP), zero trust network access (ZTNA), there are plenty of technologies around for protecting remote access to enterprise networks.

This is an area that's been thrown into sharper focus this year, but what's the best option for keeping remote access secure? We spoke to Scott Gordon, CISSP for Pulse Secure to discuss the value of the different options available.

Continue reading

Employees' home networks could lead to SMEs failing security assessments

Home network

With the pandemic forcing more people to work from home, businesses in the UK -- particularly smaller ones -- may not have considered the fact that their employees' home networks now fall under the scope of regulatory and certification requirements.

According to a report from support solutions company A&O IT Group, if an individual works from home more than half of their time, their network must be compliant with current regulations.

Continue reading

How the banking sector is adapting to security and regulatory requirements [Q&A]

computer piggy bank and cash

Banks and other financial services institutions have been moving more and more towards digital in order to streamline processes and improve customer service.

The pandemic has accelerated this process but has also brought a rise in cyberattacks. Regulators have also begun to take more notice of security practices surrounding accounts. We spoke to Michael Magrath, director, global regulations and standards, at specialist in anti-fraud and digital identity solutions for financial institutions OneSpan, to discover more.

Continue reading

More than 5,000 Black Friday-related scam sites registered in November

Black Friday

While the holiday season is a peak time for retailers, it also represents an opportunity for cybercriminals. This is particularly true of 2020 when more people than ever are likely to be shopping online.

Research from Comparitech analyzed around 30 million websites registered this month to identify efforts by cybercriminals to trick consumers looking for holiday shopping deals.

Continue reading

Skills shortages blamed for problems with SAP cloud migration

cloud migration

SAP remains one of the most commonly used enterprise resource planning tools and many businesses are looking to migrate their SAP to the cloud from on-premise systems. But this is being held back by a shortage of skills.

New research from Ensono shows just four percent of UK IT leaders say they have completed their SAP to public cloud migration strategy. 80 percent of those who haven't completed projects say they have postponed or canceled their migration of SAP applications to the public cloud due to the SAP skills shortage and 74 percent have taken a similar decision due to a lack of public cloud skills.

Continue reading

Ubuntu Linux maker Canonical publishes curated container images to help secure software supply chains

cloud containers

A good deal of software development now relies on open source images, but it can be hard for businesses to know if they're introducing security flaws by using them.

Canonical -- the company behind Ubuntu Linux -- is addressing this by publishing the LTS (Long Term Support) Docker Image Portfolio, a curated set of secure container application images, on Docker Hub.

Continue reading

Human-centered approach is key to better security

Security

Individual behavior is an important factor in security, but according to the Information Security Forum there's a growing recognition that security awareness in isolation rarely leads to sustained behavior change.

The ISF argues that organizations need to proactively develop a robust human-centred security program to reduce the number of security incidents associated with poor security behavior and is releasing a new digest to help.

Continue reading

Privacy and security still major concerns for consumers

privacy key

Although 59 percent of consumers have accessed more online services than usual this year, they still have worries about the security and privacy of their data.

A new report from identity verification and authentication provider Onfido shows the top concerns are that data will be passed on to third parties (53 percent), the security of the information (50 percent), and asking for too much information (37 percent).

Continue reading

Vectra improves cloud services to protect complex hybrid networks

Network

With more people working remotely, plus high numbers of IoT devices accessing corporate and cloud networks, traditional network security solutions struggle to cope and are blind to activity and data in cloud applications.

Network threat detection and response company Vectra has launched a new range of cloud services with broader and deeper cloud capabilities to track and link accounts and data in hybrid environments.

Continue reading

Record web traffic and cyber threats set to disrupt holiday shopping

holiday shopping

A new threat intelligence report from Imperva Research Labs looks at the varying cybersecurity attack risks facing the retail industry.

The findings suggest peak levels of traffic will be seen throughout the holiday shopping season as large numbers of consumers turn to online channels to purchase goods. Shortly after stay-at-home orders were issued, web traffic to retail sites spiked by as much as 28 percent over the weekly average.

Continue reading

Is it time to rethink legacy firewalls? [Q&A]

Firewall

A new report from Guardicore and the Ponemon Institute reveals that more than 60 percent of organizations believe that legacy firewalls are ineffective in preventing damaging cyberattacks against applications, data centers, and data in the cloud.

We spoke to Dave Burton, VP marketing at Guardicore to find out more.

Continue reading

Businesses upgrade to better kit to boost home working

working from home

Since March, use of devices with newer generation chips has increased by 13.7 percent according to a new study from digital experience management company Aternity.

The use of machines with newer (8th, 9th, and 10th generation CPUs) corresponds with a 10.8 percent decline in use of 6th or earlier generation devices, and a small 2.9 percent drop in usage of 7th generation CPU-based machines.

Continue reading

Software usage data improves product decisions and cuts revenue loss

Developer team

Software suppliers are showing an ongoing interest in collecting and understanding usage data to help with both change management and use-based pricing models.

A new report from Revenera reveals that 60 percent collect usage data today and more than 75 percent will do so in the next two years.

Continue reading

UK security pros worry about breaking the law when defending against attacks

business fear

A new report released today by the CyberUp Campaign and techUK has found that 80 percent of UK security professionals worry about breaking the law in the process of defending against cyberattacks.

The Computer Misuse Act (1990) is the law that governs the activities of cyber security professionals in the UK and the survey finds a near-unanimous (93 percent) belief that the Act -- written before the advent of modern cyber security -- does not represent a piece of legislation fit for this century.

Continue reading

Businesses positive about data governance but still struggle with privacy concerns

Diagram of Data Governance

According to new research 72 percent of enterprises believe data governance is an enabler of business value rather than a cost center.

However, the study from enterprise search specialist Sinequa also shows that data privacy concerns are ranked as a top barrier to being more data-driven as an organization.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.