Less than a fifth of organizations are effectively stopping cyberattacks
Just 17 percent of organizations worldwide are considered 'leaders' in cyber resilience, meaning under a fifth are effectively stopping cyberattacks and finding and fixing breaches fast enough to lower the impact, according to a new report from Accenture.
Based on a survey of more than 4,600 enterprise security practitioners, Accenture's report looks at how businesses prioritize security, the effectiveness of their current security efforts, and the impact of new security-related investments.
UK SMEs see their future in the cloud
Cloud computing features strongly in the plans of SMEs for the coming year, with 57 percent planning increased adoption, according to a new report.
The study from UK IT services provider OGL Computer shows that 59 percent plan on increasing the use of applications such as Microsoft Office 365, Teams and SharePoint.
IBM launches new open source tool to label images using AI
Images for use in development projects need to be correctly labeled to be of use. But adding labels is a task that can involve many hours of work by human analysts painstakingly applying manual labels to images, time that could be better spent on other, more creative, tasks.
In order to streamline the labelling process IBM has created a new automated labeling tool for the open source Cloud Annotations project that uses AI to 'auto-label' images and thus speed up the process.
New application delivers easier data access for business analysts
Businesses are collecting more data than ever, but ensuring that employees have easy and reliable access to information they need for their jobs can prove difficult.
Now though Kloud.io has raised $4 million in seed funding for its spreadsheet-based application that enables financial analysts to directly access data from multiple sources, such as Salesforce, Oracle, Netsuite, and hundreds more.
New solution allows businesses to find and protect sensitive documents
Modern businesses have large numbers of documents, many of which contain information that is commercially sensitive. But poor file management, incorrect permissions and uncontrolled sharing can put that information at risk.
The unstructured nature of this data makes it notoriously difficult to keep track of. Now though California-based Concentric is launching a new solution to allow enterprises to identify and protect these documents.
How eCommerce fraud is evolving [Q&A]
Online fraud has gained in sophistication in recent years. As consumers have moved to using mobile devices and have come to expect a consistent shopping experience across platforms, so the fraudsters have never been far behind.
We spoke to Michael Reitblat, co-founder and CEO of eCommerce fraud prevention specialist Forter, which recently published its latest Fraud Attack Index, to find out more about the fraud landscape and how businesses can protect themselves.
People are a key element in securing systems
With attackers often targeting individuals and their credentials to gain unauthorized access to accounts, people are increasingly at the center of security.
This is one of the conclusions of a new report from identity solutions provider Okta which finds that when deploying security tools a third of businesses start with a tool focused on protecting their people, as opposed to devices, infrastructure, and networks.
Why everyone needs to be speaking the same language on data privacy [Q&A]
Today is Data Privacy Day and with CCPA coming into force at the start of this month, the focus is very much on personal data, how it's used and how it needs to be protected.
One of the issues is that there are lots of definitions and terms involved which means it’s vital that everyone understands what they’re dealing with.
New low-code environment helps deliver network automation
With more programmable features and APIs being introduced, networks have shifted in recent years from being hardware-focused to software-centered functions.
This has changed the network management techniques and skillsets required to keep pace with the changing environment. To address this, network automation specialist Itential is launching its Automation Studio which allows developers and network engineers to manage increasingly complex networks regardless of their level of knowledge or coding skills.
Cisco launches Industrial IoT security architecture
Increasingly the boundaries between operational technology and business networks are breaking down as businesses seek access to the real time data that industrial IoT devices hold.
But that leads to increased risk to critical infrastructure as devices become more exposed. To combat these threats, Cisco is introducing an IoT security architecture that provides enhanced visibility across both IT and OT environments, and helps protect industrial processes.
Avast free antivirus sends browser history to marketers
When you install an antivirus program -- even a free one -- you have a reasonable assumption that it's going to help keep your data safe.
But a joint investigation by Motherboard and PCMag has discovered that Avast's free antivirus is harvesting user data. Although this is supposedly 'de-identified' it is being sold to marketers in a way that can be linked back to an individual.
Businesses gain from strong data privacy practices
Data privacy is very much in people's minds at the moment with the introduction of CCPA and other legislation around the world.
Businesses can sometimes see privacy regulations as a necessary evil that they have to comply with, but new data from Cisco reveals growing, tangible benefits for businesses that adopt strong privacy practices.
Breakthrough technology allows voice biometrics to be used at the edge
The use of voice for authentication has been limited in IoT applications and devices because of storage and processing limitations.
But new technology from ID R&D looks set to change that, offering voice biometric optimization with an AI-based SDK of under 1MB, enabling voice biometrics to be implemented at the edge.
How CCPA will impact on enterprises and individuals [Q&A]
With the California Consumer Privacy Act (CCPA) having come into force at the beginning of the year, and Data Privacy Day coming up next week, privacy is very much in the news at the moment.
But how much of an impact will the new legislation have? And what do organizations need to do to make sure they don't lose consumer trust? We spoke to Chad McDonald, VP of customer experience at Arxan to find out more.
Budget constraints and cyberattacks are top concerns for SMBs
SMB network security specialist Untangle has released the results of a survey of its channel partners looking at current trends and barriers that they face when protecting clients against emerging threats.
It also examines how these companies will shape future strategic business decisions for Managed Security Providers (MSPs) and Value-Added Resellers (VARs).
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.