Ian Barker

Securing serverless computing, the latest cloud paradigm [Q&A]

cloud padlock

The cloud-skills shortage has made security a major challenge for enterprises. In fact, virtually every data breach in the cloud today is due to human error, rather than brilliant hacking. Hackers don't even bother launching attacks in the public cloud; they simply look for misconfigured systems that leave data exposed.

Against this backdrop, a whole new cloud model is taking hold -- serverless computing. In a world where cloud certifications and security skills are already in short supply and causing chaos in the cloud, what will serverless computing do to compound that problem for enterprises? Is it possible for organizations to avoid making the same mistakes with this new paradigm that they are making in traditional cloud environments?

Continue reading

Cohesity launches as-a-service backup for Google Cloud

Backup key

As companies move more of their workloads to the cloud they want to ensure that their data is properly protected.

Storage specialist Cohesity is launching a new software as a service (SaaS) solution that delivers enterprise-grade backup and recovery for applications running on the Google Cloud platform.

Continue reading

BullGuard adds to its product line with a VPN

BullGuard VPN

Cybersecurity company BullGuard is launching its own VPN for Windows, Mac, Android and iOS, intended to make it simple for users to ensure their online privacy.

Designed to be easily used across multiple devices, BullGuard VPN features a simplified user interface and quick connect functionality, enabling consumers to fly under the radar and surf the internet in stealth mode while retaining complete anonymity via military-grade encryption.

Continue reading

Zoho launches new commerce and marketing platforms

Zoho logo

Cloud business system company Zoho is launching two new platforms. Commerce Plus uses Zoho's customer experience, finance, analytics, and intelligence software to provide businesses an interconnected, first-of-its-kind commerce experience platform.

The Zoho Marketing Platform can support over 20 different marketing channels, including websites, social, events, text, email, ads, offline, and more.

Continue reading

Digital transformation? Don't ask me

digital transformation

According to new research among British businesses, 57 percent of employees either don't understand (20 percent) or misinterpret (37 percent) the meaning of 'digital transformation'.

The research, conducted by YouGov among employees at 500 businesses with 50 or more employees, on behalf of service management Cherwell Software also finds that 64 percent say their employers only adopt new technology once it enters the mainstream.

Continue reading

Understanding the LockerGoga ransomware attacks

Ransomware eye

Last month Aluminum manufacturer Norsk Hydro was hit by a large scale ransomware attack that affected its systems across the globe and caused severe disruption to its operations with an estimated impact of more than $35 million..

The attack used the LockerGoga ransomware and the threat research team at Securonix has been monitoring the malware, which also caused problems for a number of other companies.

Continue reading

Credential stuffing attacks target media streaming services

PC film

The entertainment industry and in particular streaming services is among the biggest targets of credential stuffing attacks according to a new report.

The study from digital delivery platform Akamai, unveiled at the NAB Cybersecurity and Content Protection Summit in Las Vegas this week, focuses on credential abuse attacks against online video and music streaming services.

Continue reading

Fastly takes Azure closer to the edge

Edge computing

As businesses grow to serve complex user experiences, cooperation between network providers is vital. Enterprises want pain-free portability of application stacks and services optimized for their needs between multiple providers.

Edge cloud platform Fastly is announcing that it’s connecting its edge network with Microsoft Azure.

Continue reading

90 percent of critical infrastructure hit by cyberattacks

Powerlines

A new survey of professionals in industries using industrial control systems (ICS) and operational technology (OT) finds 90 percent of respondents say their environment has been damaged by at least one cyberattack over the past two years, with 62 percent experiencing two or more attacks.

The study commissioned by Tenable from the Ponemon Institute also finds 80 percent of respondents cite lack of visibility into the attack surface, knowing what systems are part of their IT environments, as the number one issue in their inability to prevent business-impacting cyberattacks.

Continue reading

Why bare-metal containers are scaring VMware [Q&A]

cloud containers

With a market capital of $73 billion and a stock price that has more than tripled in three years, VMware is one of the big hitters of the IT industry. The company has dominated the market since it introduced virtual machine server abstraction 19 years ago.

But some industry watchers cite the rise of containers as an existential risk to VMware. This new way of software deployment was popularized by developers via the Docker container format, and more recently is taking the data center by storm as enterprises take containers into production and standardize on Google’s Kubernetes orchestration platform.

Continue reading

New hybrid platform helps enterprises to maximize cloud use

cloud button

Cloud management company RackWare is launching its new Hybrid Cloud Platform, designed to remove the barriers to enterprise cloud adoption.

It allows enterprises to migrate to the cloud seamlessly, implement a cloud-based approach to disaster recovery and offers oversight and control of all cloud resources.

Continue reading

Spear phishing attack targets HR and payroll systems

Phishing

Payday should be a pleasurable time of the month, but thanks to a new spear phishing campaign, some employees are losing their pay checks to cybercriminals.

Email defense specialist Vade Secure uncovered the attack in which criminals initiate an email conversation with HR staff to get them to change bank details for receiving direct payroll payments.

Continue reading

Vulnerability in Xiaomi's pre-installed apps could affect more than 150 million devices

man-in-the-middle

A vulnerability that could allow man-in-the-middle attacks and the injection of malicious code has been found in a pre-installed app on devices manufactured by Xiaomi, one of the biggest mobile vendors.

The flaw, uncovered by researchers at Check Point is -- somewhat ironically -- in the pre-installed security app, 'Guard Provider', which is meant to protect the phone from malware.

Continue reading

Marketers have high hopes for artificial intelligence

Marketing

There's strong interest in and high expectations of AI from B2B marketing and sales professionals, with 84 percent of participants in a new study currently planning, evaluating, implementing or using it.

Account-based marketing company Demandbase has revealed the results of the survey conducted in conjunction with Salesforce Pardot and global research firm, Demand Metric.

Continue reading

The world of cybersecurity in numbers

TechJury graphic header

We all know that cybersecurity is a major issue, but it can sometimes be hard to grasp the scale of the problem and who is at risk.

Software reviews site TechJury has created an infographic to vizualize what is happening in the cybersecurity field as well as the top threats to look out for.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.