Securing serverless computing, the latest cloud paradigm [Q&A]
The cloud-skills shortage has made security a major challenge for enterprises. In fact, virtually every data breach in the cloud today is due to human error, rather than brilliant hacking. Hackers don't even bother launching attacks in the public cloud; they simply look for misconfigured systems that leave data exposed.
Against this backdrop, a whole new cloud model is taking hold -- serverless computing. In a world where cloud certifications and security skills are already in short supply and causing chaos in the cloud, what will serverless computing do to compound that problem for enterprises? Is it possible for organizations to avoid making the same mistakes with this new paradigm that they are making in traditional cloud environments?
Cohesity launches as-a-service backup for Google Cloud
As companies move more of their workloads to the cloud they want to ensure that their data is properly protected.
Storage specialist Cohesity is launching a new software as a service (SaaS) solution that delivers enterprise-grade backup and recovery for applications running on the Google Cloud platform.
BullGuard adds to its product line with a VPN
Cybersecurity company BullGuard is launching its own VPN for Windows, Mac, Android and iOS, intended to make it simple for users to ensure their online privacy.
Designed to be easily used across multiple devices, BullGuard VPN features a simplified user interface and quick connect functionality, enabling consumers to fly under the radar and surf the internet in stealth mode while retaining complete anonymity via military-grade encryption.
Zoho launches new commerce and marketing platforms
Cloud business system company Zoho is launching two new platforms. Commerce Plus uses Zoho's customer experience, finance, analytics, and intelligence software to provide businesses an interconnected, first-of-its-kind commerce experience platform.
The Zoho Marketing Platform can support over 20 different marketing channels, including websites, social, events, text, email, ads, offline, and more.
Digital transformation? Don't ask me
According to new research among British businesses, 57 percent of employees either don't understand (20 percent) or misinterpret (37 percent) the meaning of 'digital transformation'.
The research, conducted by YouGov among employees at 500 businesses with 50 or more employees, on behalf of service management Cherwell Software also finds that 64 percent say their employers only adopt new technology once it enters the mainstream.
Understanding the LockerGoga ransomware attacks
Last month Aluminum manufacturer Norsk Hydro was hit by a large scale ransomware attack that affected its systems across the globe and caused severe disruption to its operations with an estimated impact of more than $35 million..
The attack used the LockerGoga ransomware and the threat research team at Securonix has been monitoring the malware, which also caused problems for a number of other companies.
Credential stuffing attacks target media streaming services
The entertainment industry and in particular streaming services is among the biggest targets of credential stuffing attacks according to a new report.
The study from digital delivery platform Akamai, unveiled at the NAB Cybersecurity and Content Protection Summit in Las Vegas this week, focuses on credential abuse attacks against online video and music streaming services.
Fastly takes Azure closer to the edge
As businesses grow to serve complex user experiences, cooperation between network providers is vital. Enterprises want pain-free portability of application stacks and services optimized for their needs between multiple providers.
Edge cloud platform Fastly is announcing that it’s connecting its edge network with Microsoft Azure.
90 percent of critical infrastructure hit by cyberattacks
A new survey of professionals in industries using industrial control systems (ICS) and operational technology (OT) finds 90 percent of respondents say their environment has been damaged by at least one cyberattack over the past two years, with 62 percent experiencing two or more attacks.
The study commissioned by Tenable from the Ponemon Institute also finds 80 percent of respondents cite lack of visibility into the attack surface, knowing what systems are part of their IT environments, as the number one issue in their inability to prevent business-impacting cyberattacks.
Why bare-metal containers are scaring VMware [Q&A]
With a market capital of $73 billion and a stock price that has more than tripled in three years, VMware is one of the big hitters of the IT industry. The company has dominated the market since it introduced virtual machine server abstraction 19 years ago.
But some industry watchers cite the rise of containers as an existential risk to VMware. This new way of software deployment was popularized by developers via the Docker container format, and more recently is taking the data center by storm as enterprises take containers into production and standardize on Google’s Kubernetes orchestration platform.
New hybrid platform helps enterprises to maximize cloud use
Cloud management company RackWare is launching its new Hybrid Cloud Platform, designed to remove the barriers to enterprise cloud adoption.
It allows enterprises to migrate to the cloud seamlessly, implement a cloud-based approach to disaster recovery and offers oversight and control of all cloud resources.
Spear phishing attack targets HR and payroll systems
Payday should be a pleasurable time of the month, but thanks to a new spear phishing campaign, some employees are losing their pay checks to cybercriminals.
Email defense specialist Vade Secure uncovered the attack in which criminals initiate an email conversation with HR staff to get them to change bank details for receiving direct payroll payments.
Vulnerability in Xiaomi's pre-installed apps could affect more than 150 million devices
A vulnerability that could allow man-in-the-middle attacks and the injection of malicious code has been found in a pre-installed app on devices manufactured by Xiaomi, one of the biggest mobile vendors.
The flaw, uncovered by researchers at Check Point is -- somewhat ironically -- in the pre-installed security app, 'Guard Provider', which is meant to protect the phone from malware.
Marketers have high hopes for artificial intelligence
There's strong interest in and high expectations of AI from B2B marketing and sales professionals, with 84 percent of participants in a new study currently planning, evaluating, implementing or using it.
Account-based marketing company Demandbase has revealed the results of the survey conducted in conjunction with Salesforce Pardot and global research firm, Demand Metric.
The world of cybersecurity in numbers
We all know that cybersecurity is a major issue, but it can sometimes be hard to grasp the scale of the problem and who is at risk.
Software reviews site TechJury has created an infographic to vizualize what is happening in the cybersecurity field as well as the top threats to look out for.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.