Ian Barker

Alexa, have you changed your hair?

virtual assistant

People tend to anthropomorphize their virtual assistants, assigning them personalities and physical features such as age, facial expressions and hairstyles according to research from Canada's University of Waterloo.

But giving these qualities to virtual assistants could cause people to reveal more personal information to the companies that own them than they otherwise would, says the study.

Continue reading

How the cloud can help enterprises break free from vendor lock-in [Q&A]

cloud button

In the IT industry, software vendors naturally focus their efforts on developing easier ways to onboard new customers and provide unique functionality on their platforms, but they rarely devote development cycles to making it easy to export workloads. As a result, it can be difficult to extract workloads and move between competing platforms. This is commonly referred to as 'vendor lock-in' and is especially concerning with databases and enterprise applications.

But, according to Chris Patterson, senior director of product management at Navisite, an RDX company, cloud computing offers an unusual opportunity for companies to break free from vendor lock-in. He believes cloud migration could alter the status quo, because when organizations decide to migrate their databases to the cloud, it also creates an opportunity to change to new alternatives, such as Amazon Aurora and Azure SQL.

Continue reading

Security concerns and the benefits of 5G -- IoT and edge predictions for 2020

2021 predictions

Internet of Things devices are now an accepted part of our home and business lives. They've led to increased focus on edge computing too thanks to the large volumes of data they generate, but what do industry experts think is going to happen in this sector in 2020?

Karl Sigler, threat intelligence manager at Trustwave SpiderLabs thinks the dev-security lifecycle will become the Achilles heel for IoT devices. "IoT devices are not getting any safer. With the huge influx of IoT devices in homes and organizations, the attack surface targeted by criminals is just getting larger and more diverse. Manufacturers and developers need to take the security reins. But today's IoT solutions are often missing security quality assurance during their product development lifecycle. High bandwidth, direct connections to the internet via 5G will increase the threat of Mirai-like botnets. These direct connections will also provide attackers the ability to bypass perimeter protections that are normally in place in homes and organizations. All manufacturers should add security vetting to their product development lifecycle, especially with the cloud and 5G in mind, to get IoT device security in check before the number of vulnerable devices in the market becomes overwhelming."

Continue reading

Compliance struggles and more legislation -- privacy and data predictions for 2020

2020 keyboard

With the California Consumer Privacy Act (CCPA) set to come into force in January, privacy and how companies use data is set to be one of the big themes of 2020. What do some of the industry’s leading figures think this will mean?

Peter Reinhardt, CEO and co-founder of Segment believes, "Though the GDPR roll-out should have given American companies a good taste of what was to come, it's still likely that most will do the bare minimum to comply with the CCPA until the US government starts enforcing it in 2020.

Continue reading

Improved business cases, skills shortages and a dark side -- AI predictions for 2020

robot hands crystal ball

Artificial intelligence is making its way into more and more areas of our lives. But what can we expect to see happen in this area in 2020? Some industry experts share their views on the latest AI trends.

Synthetic data specialist ARM Insight believes, "There will be a huge investment return gap between those using basic analytics or simplistic machine learning on data from those that are using true artificial intelligence. Machine learning simply won’t cut it any more. Artificial intelligence will be the only path to maximum data value."

Continue reading

30 percent of Americans not confident they could spot a machine voice pretending to be human

robot voice megaphone

With deepfake voice fraud an increasing threat, new research shows that 30 percent of Americans are not confident they would be able to detect the difference between a computer generated voice and a human one.

The study from ID R&D, a provider of AI-based biometrics and voice and face anti-spoofing technologies, shows only just over a third (36 percent) are confident they could spot a fake.

Continue reading

The decline of passwords, the rise of encryption and deepfakes -- cybersecurity predictions for 2020

crystal ball

It's the time of year again where the great and good of the tech sector like to consult the tea leaves, gaze into the crystal ball, read the runes -- and of course draw on their industry knowledge -- to give their predictions for the year ahead.

So, what do they think is in store for cybersecurity in 2020?

Continue reading

Financial services companies over confident about protecting data

Financial services business tend to be attacked more than those in any other sector, but a new study finds that 75 percent of respondents in this industry are over confident in their data management practices.

A worrying 24 percent of respondents to Integris Software's 2019 FinServ Data Privacy Maturity Study only update their personal data inventory once a year. Even more concerning, 13 percent only inventory sensitive data when audited or in response to regulation requests.

Continue reading

Few businesses use network segmentation to guard against breaches

Segmentation

Security segmentation limits the ability for attacks to move laterally inside an organization by breaking data center and campus networks or clouds into smaller segments. But a new study reveals that only 19 percent currently implement segmentation solutions today.

The study of 300 IT professionals carried out by Virtual Intelligence Briefing for Illumio also shows that while approximately 25 percent are actively planning a project, more than half are not protecting with segmentation at all or planning to in the next six months.

Continue reading

Why businesses need an omni-channel approach to protecting customer data [Q&A]

identity protection

In the retail sector particularly the line between online and offline worlds is increasingly blurred. But how can businesses protect their customer data effectively in this world?

We spoke to, Gary Barnett, CEO of secure payment systems specialist Semafone to discuss this, the effect of the upcoming CCPA legislation and more.

Continue reading

Professionals skeptical about cybersecurity vendor claims

Skeptical businessman

A new survey of almost 300 IT security professionals in large enterprises finds 53 percent of respondents say most or all cybersecurity vendors rely on unclear, opaque, and ambiguous data to promote their products.

In addition the study from Valimail, a provider of identity-based anti-phishing solutions, finds 42 percent of respondents say cybersecurity products deliver value 'sometimes,' but it is difficult or impossible to prove that value.

Continue reading

Secure cloud helps deliver data-driven innovation

Cloud data security

Data usage and analysis are now key drivers of innovation and competitive advantage, but increased data use raises issues surrounding security, privacy and compliance.

Israeli company Satori Cyber is launching a new Secure Data Access Cloud to offer continuous visibility and control of data flows across all cloud and hybrid data stores.

Continue reading

DNS amplification attacks continue to grow

DNS

DNS amplification attacks have grown by over 4,000 percent over the last year according to Nexusguard's latest threat report.

DNSSEC (Domain Name System Security Extensions) remains the main source of growth in DNS amplification attacks in the quarter, but Nexusguard analysts have also detected a sharp and concerning rise in TCP SYN Flood attacks.

Continue reading

Majority of leaked records in 2019 came from financial services firms

hack money

According to a new report, more than 60 percent of all leaked records in 2019 were exposed by financial services organizations, despite only six percent of breaches affecting these organizations.

The 2019 Financial Breach Report from Bitglass says these figures are at least partially due to the Capital One breach, which compromised more than 100 million records.

Continue reading

What Google's focus on web frameworks means for front-end development [Q&A]

home working

If the recent Chrome Dev Summit was evidence of what Google thinks is hot in web development, then frameworks were one of the clear winners. More specifically, client-side frameworks and libraries like Angular, Vue and React, and larger web frameworks like Next.js.

We spoke to Tim Neutkens, lead developer of Next.js -- which Google mentioned in its talk on Advancing the Web Framework Ecosystem -- to learn more about the rise of front-end frameworks and their general promise to get web developers out of the infrastructure weeds and focus more on building websites and apps.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.