Ian Barker

61 percent of organizations are worried about email-borne threats

Holding email icon

Email is still the main vehicle for cybercriminals to deliver threats according to a new report, and 61 percent of IT decision makers think their organization will suffer a negative impact from an email-borne attack this year.

The study from email and data security company Mimecast shows that impersonation attacks have increased 67 percent in comparison to the results in last year's report.

Continue reading

GDPR one year on -- what have we learned and what happens next?

GDPR in Europe

This weekend marks exactly a year since the introduction of the EU's GDPR legislation shook up the world of data protection and sent businesses around the world into a flurry of compliance activity.

So, what has the industry learned over the past year and what are the ongoing challenges we can expect to see? We've gathered the views of some industry experts.

Continue reading

How microsegmentation can deliver zero trust security [Q&A]

Red and blue security padlock

With a never-ending supply of new security threats presenting themselves every day, it can be tough for IT departments to keep up.

While perimeter security continues to be important, the sheer volume of novel attacks means that, eventually, an attack will bypass defenses and gain a foothold in the interior. To harden the network interior, best practice now calls for microsegmentation to achieve a zero trust environment, but that’s not easy to do.

Continue reading

Quality issues with training data are holding back AI projects

machine learning AI

For many organizations, AI and machine learning are seen as a route to greater efficiency and competitive advantage.

But according to a new study conducted by Dimensional Research for Alegion  almost eight out of 10 enterprise organizations currently engaged in AI and ML report that projects have stalled, and 96 percent of these companies have run into problems with data quality, data labeling required to train AI, and building model confidence.

Continue reading

Why change management is essential to digital transformation projects [Q&A]

digital transformation

Digital transformation is currently an attractive option for many businesses. But to make it work it needs to be effectively managed.

We spoke to Nital Hooper, senior manager consulting at consultancy company Servita to find out about the importance of change management to successful digital transformation.

Continue reading

72 percent of cyber security professionals have considered quitting over lack of resources

Vacant chair

A new study from Censornet into the challenges facing cyber security professionals shows that 79 percent think their companies are suffering from a lack of resources, both in terms of people and technology, and 72 percent have considered leaving their jobs for this reason.

The survey also finds that security professionals are not being helped by their security solutions. 65 percent want more technology but the average number of security products used is already 33 and 57 percent report they are suffering from alert overload.

Continue reading

New solution helps enterprises manage growing numbers of IP devices

network

In the past managing IP addresses has been relatively easy, but with the rapid growth in connected devices, and lots more addresses becoming available under IPv6, it's set to become a whole lot more complex.

Traffic management company NS1 is launching a solution to the problem with its Enterprise DDI (combining DNS, Dynamic Host Configuration Protocol (DHCP) and IP address management).

Continue reading

DDoS attacks increase 84 percent in three months

DDoS attacks

The number of DDoS attacks during the first quarter of 2019 increased by 84 percent compared with the previous quarter according to a new report from Kaspersky Lab.

This reverses last year's trend of declining DDoS attacks as attackers shifted their attention to other sources of income, such as crypto-mining.

Continue reading

A traditional approach to security harms digital transformation efforts

cell keys

Half of security professionals who adopt a more traditional or reactive approach to their data protection and security don't believe they will reach their digital transformation goals in the next five years.

This is among the findings of a report from data protection company TITUS which conversely finds that nine out of 10 security professionals deploying a strategic approach believe their current efforts will address digital transformation needs within five years and that their organization would achieve its digital transformation goals in the same timescale.

Continue reading

Enterprises struggle with providing secure hybrid access

Secure cloud

As businesses move towards hybrid IT environments they increasingly face threats, gaps and investment challenges to keep their systems secure.

The study from secure access specialist Pulse Secure surveyed enterprises with 1000+ employees in the US, UK, Germany, Austria and Switzerland and finds that while they are taking advantage of cloud computing, all enterprises have on-going data center dependencies.

Continue reading

Most enterprises now run containers in production

cloud containers

New research from storage and data management company Portworx shows 87 percent of IT professionals are now running container technologies, with 90 percent of those running in production.

In addition seven out of 10 are running at least 40 percent of their application portfolio in containers -- an increase from two years ago, when just 67 percent of teams were running container technologies in production.

Continue reading

UK age verification rules could put users at risk

identity verification

With age verification checks for users of adult sites in the UK set to come into force this summer, cyber security company F-Secure says that the new rules could increase the risk of identity theft and other cyber crimes.

Under the new laws, British internet users will be required to verify their age in order to access adult content websites. This could be by sharing personal information such as passport, driving license, phone number or credit card details with third-party age verification platforms, or by buying a 'porn pass' at a store.

Continue reading

New self-service platform helps developers apply AI at the edge

Artificial intelligence

In the past AI has mostly depended on expensive solutions running in the cloud, restricting its use to a relatively small number of companies.

But with the growth of the IoT and ever greater volumes of information that need to be processed fast, there's more demand for AI at the edge. Xnor is launching a new self-service platform called AI2GO, that enables developers, device creators and companies to build smart, edge-based solutions without needing training or background in AI.

Continue reading

Application development industry faces major challenges

developer

Demand for application development is soaring, but the industry faces some major challenges according to a new report.

The study from OutSystems shows the number of applications slated for delivery in 2019 has increased by 60 percent, and 38 percent of respondents plan to deliver 25 or more apps this year.

Continue reading

Half of companies missed GDPR compliance deadline

GDPR touchscreen

Only half of companies achieved compliance with GDPR before the May 25, 2018 deadline, and most companies took seven months or longer to achieve readiness.

This is among the findings of a new report from privacy management platform DataGrail which also reveals that two-thirds of companies assigned dozens, or even hundreds, of employees to manage GDPR compliance.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.