Ian Barker

Multi-cloud is fastest growing enterprise technology

cloud link

Enterprise adoption and deployments of multi-cloud technology have grown 50 percent year-on-year according to a report from continuous intelligence specialist Sumo Logic.

As customers adopt multi-cloud, Kubernetes adoption has significantly risen too with enterprises backing the container solution to drive their multi-cloud strategies. According to the study 20 percent of customers in AWS-only environments use Kubernetes.

Continue reading

Phishing attacks against the Apple brand reach 1.6 million in six months

Phishing

There have been 1.6 million phishing attacks targeting the Apple brand name in the first half of 2019. This is up nine percent on the total number of attacks seen last year, revealing a growing trend.

These figures come from Kaspersky's Threats to Mac Users Report 2019, released this week, which shows the number of cases where users faced fraudulent web pages utilising the Apple brand as a decoy has increased significantly in the first six months of the year.

Continue reading

98 percent of top US websites not prepared against attacks

web address bar

Most websites within the Alexa 1000 ranking in the US are not prepared to face advanced client-side attacks like Magecart according to analysis carried out by Tala Security.

Findings from the Tala 2019 State of the Web Report show the average website relies on 31 third-parties. Nearly two-thirds (63 percent) of the externally loaded JavaScript code executed in the browser is either written by and/or managed by third-parties.

Continue reading

SD-WAN is one of the most disruptive business technologies

Network security

Software defined wide-area networking (SD-WAN) is twice as disruptive as other technologies like the cloud in the latest phase of enterprise digital transformation, according to a new report looking at every next-generation solution disrupting the IT landscape for the next six to 12 months.

The study from AVANT Analytics also finds that while SD-WAN is displacing Multiprotocol Label Switching (MPLS) in smaller companies and at the enterprise edge, both technologies are still growing at the enterprise core. In addition the average share of broadband traffic in an SD-WAN network was about 63 percent in 2018 and is projected to grow to 70 percent in 2019.

Continue reading

Automated Business Glossary makes enterprise data more available

Business technology

Data is a resource all enterprises have, but it's only valuable if it's accessible, searchable and understandable. As the amount of data we accumulate grows getting it into a usable form can be a real challenge.

Metadata automation specialist Octopai is looking to make data more easily accessible with the launch of its Automated Business Glossary. This uses machine learning to synthesize data across enterprises and provide one authoritative source for all business operations.

Continue reading

China-based espionage group attacks high level targets

China flag keyboard

The China-based Thrip group was first exposed in 2018 and has carried out attacks across South East Asia, mainly targeting military organizations and satellite communications operators.

New research from Symantec shows that since June 2018 Thrip has attacked 12 targets located in Hong Kong, Macau, Indonesia, Malaysia, the Philippines, and Vietnam. Analysis of the attacks shows close links to another long-established espionage group called Billbug making it likely the two are the same.

Continue reading

Training program helps find future cybersecurity talent [Q&A]

Cyber discovery

The shortage of cybersecurity talent is well known and among attempts to address it in the UK is the Cyber Discovery program, backed by the Department for Digital, Culture, Media and Sport (DCMS) and delivered by the SANS institute.

Over 46,000 teenagers have taken part in the last two years, so as the program returns for its third year we spoke to James Lyne, CTO of the SANS institute to find out more about its aims and achievements to date.

Continue reading

How tablets have been embraced by business

tablet worker

Until the first iPad launched in 2010 nobody knew they wanted a tablet. In the last few years though tablets have become one of the most popular pieces of kit.

Not only are tablets popular at home, allowing you to slouch on the sofa and update Facebook while you watch TV, they're increasingly being used in the business world too. Mobile device management company Scalefusion has produces an infographic looking at how and why business users have embraced the tablet.

Continue reading

IT security professionals don't trust politicians to produce effective regulations

politician

Trust in politicians is at something of a low at the moment and at the same time we regularly see them calling for cyber measures, like backdoors to encryption, without seemingly understanding the implications.

The results of a new survey therefore shouldn't come as too much of a surprise.

Continue reading

Google open sources its differential privacy framework

Google HQ logo

Google has today announced the launch of an open-source version of the differential privacy framework that powers many of the company’s data analysis systems.

Differentially-private data analysis is an approach that enables organizations to learn from the majority of their data while simultaneously ensuring that those results don't allow any individual's data to be distinguished or re-identified.

Continue reading

Consumers prefer bots to humans

robot call center

Consumers increasingly prefer to interact with bots rather than humans, especially when it comes to researching products, learning about new services or making customer service queries.

A new study from the Capgemini Research Institute finds almost 70 percent saying they will progressively replace visits to a store or bank with their voice assistant within three years’ time.

Continue reading

SMBs focused on improving IT security

Business security

Improving security remains the top priority for mid-sized businesses, but they need to be more proactive in their approach to managing IT according to a new report.

The 2019 State of IT Operations for Small and Midsize Businesses report from infrastructure management specialist Kaseya shows 32 percent of respondents experienced a security breach in the past five years, down slightly from 35 percent in 2018 with at least 10 percent of respondents reporting that they were hit by a breach in the past year.

Continue reading

Yahoo! suffers worldwide mail fail

Yahoo mail fail

Yahoo users attempting to log into their mailboxes this morning have been faced with a screen that says the site is experiencing "technical difficulties".

Downdetector indicates that the site went down in the early hours of this morning and the issue is affecting users around the world.

Continue reading

Kaspersky helps enterprises protect blockchain projects

Blockchain

Blockchain is being widely touted as the technology to secure transactions and run large-scale, data-driven projects with more transparency and efficiency.

But projects which work with sensitive data will eventually become integrated with other business-critical systems and when that happens there’s a need to run security check and approvals. This is why Kaspersky is launching a new service that helps enterprises discover and fix security issues and discrepancies in smart-contract business logic while the blockchain project is on its way from internal innovation to part of actual business processes.

Continue reading

Integration with MITRE ATT&CK framework delivers improved security skills training

training key

Traditional cyber security training is often based on out-of-date attack methodologies which means the skills learned quickly becoming outdated. While cybercriminals are continuously innovating, training for security professionals is lagging behind.

Skills development platform Immersive Labs has announced an integration that allows organizations to base cyber skills training on MITRE ATT&CK, meaning organizations can map and manage specific people’s skills, to actual risks.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.