Ian Barker

Password stealing malware on the rise as 60 percent more users are targeted

Hacker

Password stealing malware is a key weapon in the cybercriminals' armoury, seeking to grab data directly from users' web browsers using a range of methods.

According to new data from Kaspersky, the number of users, targeted by password stealers, has peaked from less than 600,000 in the first half of 2018 to over 940,000 during the same period in 2019.

Continue reading

New developer program helps strengthen IoT security

IoT security

Securing Internet of Things devices is an ongoing problem for businesses, developers often have to sift through a raft of unorganized and disparate information to find the IoT security solution that works best for them.

Identity and security specialist GlobalSign is launching an IoT developer program designed specifically to assist developers with device identity integrations that strengthen security operations for IoT and industrial IoT (IIoT) ecosystems.

Continue reading

Enterprises are modernizing data architectures but still have major concerns

Business database

A new study of over 300 IT executives in large enterprises by database company DataStax reveals all are modernizing their data architecture, but most are still struggling with major challenges.

The results show 99 percent of IT execs report challenges with architecture modernization and 98 percent with their corporate data architectures (data silos). Vendor lock-in (95 percent) is also a key concern among respondents.

Continue reading

UK office workers waste 1.8 billion hours a year because of poor technology

frustrated

Office workers across the UK are wasting 14 days per person each year -- or 1.8 billion hours a year in total -- because the technology they’re given isn't good enough.

A new study of 2,000 office workers from technology solutions company Insight shows 80 percent at some point have felt they don't have the technology they need to do their jobs properly. While 34 percent also say not being equipped with the right technology makes remote and flexible working difficult and stressful.

Continue reading

Enterprises struggle to support edge workloads

Edge computing

The use of edge computing is driving a need for more local computing power, but a new study reveals that enterprises are facing problems when it comes to supporting edge workloads.

The survey of more than 300 storage professionals from computational storage specialist NGD systems finds that while enterprises are rapidly deploying technologies for real-time analytics, machine learning and IoT, they are still using legacy storage solutions that are not designed for such data-intensive workloads.

Continue reading

New platform simplifies the creation of interactive online guides

Education

As we carry out more of our day-to-day tasks online, there's increasing demand for guides and tutorials to help users get the best from services and products. But creating these guides can be time consuming and take developer time away from other tasks.

A new platform called Stonly seeks to let anyone create easy-to-follow guides called 'Stonlies' without any need to write code. Content including text, images and videos can be combined with interactive capabilities to ensure the viewer only gets relevant information.

Continue reading

IBM helps developers use open source and machine learning

IBM logo

As artificial intelligence and machine learning become more widespread, it's essential that developers have access to the latest models and data sets.

Today at the OSCON 2019 open source developer conference, IBM is announcing the launch of two new projects for developers.

Continue reading

Symantec launches new zero trust cloud access security technology

Secure cloud

Increasing volumes of business network traffic are now directed at the cloud and companies need a cost effective way to secure them.

Symantec is announcing updates and innovations across its portfolio of products, giving enterprises the ability to enforce zero trust security policies across SaaS applications, corporate applications hosted in the cloud, email and the internet.

Continue reading

Businesses gain better control of cloud and mobile devices

Cloud

Enterprises around the world are gaining control of previously unmonitored and unsupported cloud applications and mobile devices in their IT environments according to a new report.

The 2019 Trusted Access report from Duo Security looks at more than a million corporate applications and resources that Duo protects. Among the findings are that cloud and mobile use has resulted in 45 percent of requests to access protected apps now coming from outside business walls.

Continue reading

How cloud technology can help SMBs to compete [Q&A]

SMB laptop

Smaller businesses have always found it hard to compete against their larger rivals, but that's starting to change as technology allows a leveling of the playing field.

So how can technology, and in particular the cloud, help to give smaller companies an edge? We spoke to John Buni, CEO and co-founder of the CleanCloud SaaS platform and founder of bespoke tailoring company Tailor Made London, to find out.

Continue reading

New platform streamlines cloud storage support and recovery

cloud button

As businesses move more of their workloads to the cloud they depend on data and applications always being available and secure. But this can conflict with the need for regulatory compliance and effective backup regimes.

Quest Software is launching a new version of its QoreStor product that helps businesses to easily move, recover and store data from on premise and cloud locations.

Continue reading

Why application security should be a key part of development [Q&A]

DevSecOps

As data protection legislation tightens and breaches continue to make headlines, there is increased pressure on businesses to implement security by design in their applications.

For many this has meant a move to DevSecOps. We spoke with Rusty Carter, vice president of product management at application security specialist Arxan to find out why this approach is becoming essential.

Continue reading

Two-thirds of organizations think they'll need AI to respond to future cyber threats

AI security

New data from the Capgemini Research Institute reveals that 69 percent of organizations believe that they won't be able to respond to critical cyber threats without AI.

Over half (56 percent) of executives say their cybersecurity analysts are overwhelmed by the vast array of data they need to monitor to detect and prevent intrusion. In addition, the type of cyberattacks that require immediate intervention, or that cannot be dealt with quickly enough by analysts, have increased

Continue reading

New platform simplifies handling multi-cloud environments

cloud link

The rise of cloud adoption has led many businesses to adopt an environment where computing requirements are decoupled from storage and scale independently. But this leads to problems with accessibility and data management.

A new platform launched today by Alluxio provides improved orchestration for data engineers managing and deploying analytical and AI workloads in the cloud, particularly for hybrid and multi-cloud environments.

Continue reading

Summer heightens cyber security risks

Beach sunset

You might think that cyber attacks are a constant year round activity, or perhaps that they are focused on peak shopping periods like Christmas. But a new study from threat protection specialist Lastline reveals many security professionals believe their organizations are more at risk in summer.

In a survey of 1,000 security professionals more than half believe cyber attacks are seasonal and 58 percent of those (30.5 percent overall) say that they see more attacks during the summer months.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.