Ian Barker

Biggest hindrance to enterprise network visibility is lack of IT staff

Tech suport

Network performance monitoring specialist AppNeta has released its 2019 State of Enterprise IT Report, which finds that as enterprise IT deals with fundamental changes networking infrastructure teams are being stretched to the limit.

The biggest hindrances to network visibility are seen as lack of IT staff (25.6 percent), poor network management tools, (24.8 percent) and lack of visibility into app delivery paths (24.7 percent).

Continue reading

Dark net malware becomes more targeted

hacker laptop

The dark net has become a haven for custom-built, targeted malware, with threats tailored to specific industries or organizations outnumbering off-the-shelf varieties by two to one, according to a new study.

The research from application containment company Bromium also finds four in 10 dark net vendors are selling targeted hacking services aimed at FTSE 100 and Fortune 500 businesses.

Continue reading

SecureAuth enhances identity management with intelligent cloud service

identity login

Secure identity company SecureAuth is launching enhancements to its solution with the announcement of Intelligent Identity Cloud.

This gives CISOs and IT professionals the ability to deploy the same capabilities in the cloud, on-premises, or as a hybrid of the two, addressing business demands of agility and dramatically improving identity security.

Continue reading

Microsoft and Oracle connect their clouds

cloud link

Two of the giants of enterprise cloud technology have today announced a cloud interoperability partnership, enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.

Enterprises can now seamlessly connect Azure services, like Analytics and AI, to Oracle Cloud services, like Autonomous Database. By enabling customers to run one part of a workload within Azure and another part of the same workload within the Oracle Cloud, the partnership delivers a highly optimised, best-of-both-clouds experience.

Continue reading

iOS app developers take shortcuts on security

Shortcut

Despite Apple mandating developers to build end-to-end encryption into their apps, a high number of apps don't comply, according to a new report.

The study from mobile security company Wandera analyzed more than 30,000 of the iOS apps most commonly used by employees and found that more than two-thirds of apps don't enable App Transport Security (ATS).

Continue reading

Secure contact center payment solution comes to the cloud

Cloud dollars

Contact center data security specialist Semafone is making its Cardprotect available as a cloud solution in the US for the first time.

Companies now have the choice of running Cardprotect on premise, as a managed appliance, in a hybrid could or fully cloud solution. The new, cloud version enables a much faster, more scalable, flexible and cost-effective deployment, as there is no need for contact centers to purchase or manage equipment.

Continue reading

64 percent of organizations believe they have suffered a breach due to privileged access

insider threat

A global survey of over 1,000 IT security decision makers by privileged access management specialist BeyondTrust reveals that 64 percent believe they've had either a direct or indirect breach due to employee access in the last year, and 62 percent believe they've had a breach due to vendor access.

Employee behavior continues to be a challenge for a majority of organizations. Writing down passwords, for example, is cited as a problem by 60 percent of organizations, while colleagues telling each other passwords was also an issue for 58 percent of organizations in 2019.

Continue reading

Data breaches exposed 2.8 billion consumer records in 2018

data breach

New data from digital identity platform ForgeRock reveals that data breaches cost US organizations over $654 billion as well as exposing more than 2.8 billion consumer records.

Personally identifiable information (PII) was the most targeted data for breaches in 2018, accounting for 97 percent of all breaches, with unauthorized access encompassing 34 percent of all attacks.

Continue reading

Phishing attacks grow in sophistication to evade defenses

Phishing

Despite businesses investing in next-gen technologies, phishing threats continue to become more sophisticated and effective according to a new report.

The study from intelligent phishing defense company Cofense shows how threat actors, armed with an ever-growing arsenal of tactics and techniques, continue to tweak their campaigns and enhance their capacity to deliver malware, ultimately getting more messages past perimeter controls to user inboxes.

Continue reading

81 percent of SMEs think AI is crucial to cyber security

pixel padlock

New research from threat detection specialist Senseon looking at the state of cyber security in SMEs reveals increasing uncertainty about whether the investment into the security solutions they’re currently using is worth the cost.

The survey also reveals that SMEs have been slow to implement AI solutions, despite the vast majority of SMEs surveyed (81 percent) thinking that AI will be fundamental to the future of cyber security.

Continue reading

Staff break IT rules in order to do their jobs with management the worst offenders

furtive

A new survey of more than 3,000 people around the world finds 46 percent of employees access personal documents on their work device without the IT department's permission.

The study from Snow Software also shows 41 percent of global employees are going behind IT's back to get professional software and applications.

Continue reading

Why digital transformation must be optimized for speed and success [Q&A]

digital transformation

Companies worldwide across all industries are enacting digital transformation (DX) initiatives -- and for good reason. If completed successfully, modern technology implementation drives competitive advantage and makes business operations much more real-time.

However, the journey to the DX finish line is unfortunately sometimes much more of sprint than a marathon, as speed is the currency for organizations to complete the process.

Continue reading

New tool allows files to be encrypted and shared wherever they’re stored

Encryption

One of the best ways of preventing sensitive files from falling into the wrong hands is to encrypt them, but the process of encrypting and decrypting can be a chore, especially if you want to share the information.

VPN service NordVPN is set to launch its own NordLocker security tool, designed to safeguard files whether they are stored locally or in the public cloud, and make them easy to share.

Continue reading

More than 70 percent of consumers fear becoming ID theft victims

ID theft

The more the internet has become essential to our daily lives, the more people are waking up to the threats that it poses to their safety.

In a new study by F-Secure, 71 percent of respondents say they feel that they will become a victim of cybercrime or identity theft, while 73 percent express similar fears about their children.

Continue reading

Identity and access management proving too difficult for many businesses

unknown identity

According to a new study, businesses find identity and access management (IAM) and privileged access management (PAM) among their most difficult operational tasks.

The survey, by access management firm One Identity, of 200 attendees to the 2019 RSA Conference, finds that while a third of respondents say PAM is the most difficult operational task, only 16 percent of respondents cite implementing adequate IAM practices as a top-three concern when it comes to securing the cloud.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.