Password stealing malware on the rise as 60 percent more users are targeted
Password stealing malware is a key weapon in the cybercriminals' armoury, seeking to grab data directly from users' web browsers using a range of methods.
According to new data from Kaspersky, the number of users, targeted by password stealers, has peaked from less than 600,000 in the first half of 2018 to over 940,000 during the same period in 2019.
New developer program helps strengthen IoT security
Securing Internet of Things devices is an ongoing problem for businesses, developers often have to sift through a raft of unorganized and disparate information to find the IoT security solution that works best for them.
Identity and security specialist GlobalSign is launching an IoT developer program designed specifically to assist developers with device identity integrations that strengthen security operations for IoT and industrial IoT (IIoT) ecosystems.
Enterprises are modernizing data architectures but still have major concerns
A new study of over 300 IT executives in large enterprises by database company DataStax reveals all are modernizing their data architecture, but most are still struggling with major challenges.
The results show 99 percent of IT execs report challenges with architecture modernization and 98 percent with their corporate data architectures (data silos). Vendor lock-in (95 percent) is also a key concern among respondents.
UK office workers waste 1.8 billion hours a year because of poor technology
Office workers across the UK are wasting 14 days per person each year -- or 1.8 billion hours a year in total -- because the technology they’re given isn't good enough.
A new study of 2,000 office workers from technology solutions company Insight shows 80 percent at some point have felt they don't have the technology they need to do their jobs properly. While 34 percent also say not being equipped with the right technology makes remote and flexible working difficult and stressful.
Enterprises struggle to support edge workloads
The use of edge computing is driving a need for more local computing power, but a new study reveals that enterprises are facing problems when it comes to supporting edge workloads.
The survey of more than 300 storage professionals from computational storage specialist NGD systems finds that while enterprises are rapidly deploying technologies for real-time analytics, machine learning and IoT, they are still using legacy storage solutions that are not designed for such data-intensive workloads.
New platform simplifies the creation of interactive online guides
As we carry out more of our day-to-day tasks online, there's increasing demand for guides and tutorials to help users get the best from services and products. But creating these guides can be time consuming and take developer time away from other tasks.
A new platform called Stonly seeks to let anyone create easy-to-follow guides called 'Stonlies' without any need to write code. Content including text, images and videos can be combined with interactive capabilities to ensure the viewer only gets relevant information.
IBM helps developers use open source and machine learning
As artificial intelligence and machine learning become more widespread, it's essential that developers have access to the latest models and data sets.
Today at the OSCON 2019 open source developer conference, IBM is announcing the launch of two new projects for developers.
Symantec launches new zero trust cloud access security technology
Increasing volumes of business network traffic are now directed at the cloud and companies need a cost effective way to secure them.
Symantec is announcing updates and innovations across its portfolio of products, giving enterprises the ability to enforce zero trust security policies across SaaS applications, corporate applications hosted in the cloud, email and the internet.
Businesses gain better control of cloud and mobile devices
Enterprises around the world are gaining control of previously unmonitored and unsupported cloud applications and mobile devices in their IT environments according to a new report.
The 2019 Trusted Access report from Duo Security looks at more than a million corporate applications and resources that Duo protects. Among the findings are that cloud and mobile use has resulted in 45 percent of requests to access protected apps now coming from outside business walls.
How cloud technology can help SMBs to compete [Q&A]
Smaller businesses have always found it hard to compete against their larger rivals, but that's starting to change as technology allows a leveling of the playing field.
So how can technology, and in particular the cloud, help to give smaller companies an edge? We spoke to John Buni, CEO and co-founder of the CleanCloud SaaS platform and founder of bespoke tailoring company Tailor Made London, to find out.
New platform streamlines cloud storage support and recovery
As businesses move more of their workloads to the cloud they depend on data and applications always being available and secure. But this can conflict with the need for regulatory compliance and effective backup regimes.
Quest Software is launching a new version of its QoreStor product that helps businesses to easily move, recover and store data from on premise and cloud locations.
Why application security should be a key part of development [Q&A]
As data protection legislation tightens and breaches continue to make headlines, there is increased pressure on businesses to implement security by design in their applications.
For many this has meant a move to DevSecOps. We spoke with Rusty Carter, vice president of product management at application security specialist Arxan to find out why this approach is becoming essential.
Two-thirds of organizations think they'll need AI to respond to future cyber threats
New data from the Capgemini Research Institute reveals that 69 percent of organizations believe that they won't be able to respond to critical cyber threats without AI.
Over half (56 percent) of executives say their cybersecurity analysts are overwhelmed by the vast array of data they need to monitor to detect and prevent intrusion. In addition, the type of cyberattacks that require immediate intervention, or that cannot be dealt with quickly enough by analysts, have increased
New platform simplifies handling multi-cloud environments
The rise of cloud adoption has led many businesses to adopt an environment where computing requirements are decoupled from storage and scale independently. But this leads to problems with accessibility and data management.
A new platform launched today by Alluxio provides improved orchestration for data engineers managing and deploying analytical and AI workloads in the cloud, particularly for hybrid and multi-cloud environments.
Summer heightens cyber security risks
You might think that cyber attacks are a constant year round activity, or perhaps that they are focused on peak shopping periods like Christmas. But a new study from threat protection specialist Lastline reveals many security professionals believe their organizations are more at risk in summer.
In a survey of 1,000 security professionals more than half believe cyber attacks are seasonal and 58 percent of those (30.5 percent overall) say that they see more attacks during the summer months.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.