Digital cold war and other emerging threats we'll face in the next two years
A new report from the Information Security Forum looks at the threats organizations can expect to face over the next two years as a result of increasing developments in technology.
The Threat Horizon 2021 report highlights three major themes that will present particularly difficult cyber security challenges for businesses.
Next generation cyber defense driven by analytics and machine learning
The biggest problem for security teams is often too much data and many are addressing this by turning to analytics and machine learning, according to a new report.
The study from CyberEdge Group surveyed 1,200 IT security decision makers and practitioners and finds 47 percent intend to deploy advanced analytics solutions in the next year.
New solution delivers low-latency data for any sized cloud workload
In many ways, latency is now the new downtime, as digital demands have made extreme speed and scale a requirement no matter where systems run. This can be a particular problem when moving to the cloud.
A new solution from in-memory computing platform Hazelcast will allow organizations running critical workloads in the cloud to power the most time-sensitive and demanding applications at scale.
As Generation Z joins the workforce what does this mean for women in tech?
In recent years the tech industry has been concerned with the role of Millennials in the workplace, but that's about to change.
2019 marks the first year that members of Generation Z (those born from 1997 onward) will start to enter the jobs market in large numbers. New research from recruiting platform HackerRank surveyed over 12,000 women developers from around the world to get their views on jobs and employers.
61 percent of CISOs believe employees have leaked data maliciously
A new study reveals that 79 percent of IT leaders believe that employees have put company data at risk accidentally in the last 12 months, and 61 percent believe they have done so maliciously.
The research from data security company Egress also explores how employees and executives differ in their views of what constitutes a data breach and what is acceptable behavior when sharing data.
Unplanned service interruptions lead to stress for engineers
Unplanned service interruptions which can include outages, operational overload, slowdowns in delivery, notification fatigue and other unanticipated events represent a major issue according to a new global survey of site reliability engineers (SREs).
The study by digital experience monitoring specialist Catchpoint reveals that 49 percent say they have worked on an incident in the last week, while the same percentage state they have worked on outages longer than a day in their career.
Trend micro calls in artists to make cybersecurity beautiful
When you think of cybersecurity, art and beauty probably aren't the first things that come to mind. But if Trend Micro has its way that could be about to change.
The company has commissioned a number of artists to create what it calls The Art of Cybersecurity. This is a series of works based on security data, with the idea of shifting the perception of protecting systems from a burden, to something beautiful.
Panic Button secures data -- by destroying it
One of the biggest worries about someone gaining unauthorized access to your computer is that they can view and steal your data.
The CyberYozh security group has launched a product that protects your sensitive files, browser data and more, by taking the nuclear option of destroying it.
New vulnerability reporting platform aims to make open source safer
Vulnerabilities in open source code represent a risk for businesses, but the process of reporting them is cumbersome and that can leave software open to risk.
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process and turn to public lists or social media, where bad actors can easily find the details before fixes are created.
Windows Virtual Desktop preview goes public
Back in September last year Microsoft announced the launch of its Virtual Desktop to allow Windows to be run in the cloud.
At the time, however, it was only a private preview. Today the public preview launches, so anyone with an Azure subscription can try out the service.
SoftNAS vulnerability lets attackers bypass authentication
Researchers have uncovered a vulnerability in the SoftNAS Cloud data storage platform that could be used to gain access to the webadmin interface without valid user credentials.
Security technology company Digital Defense found the previously undisclosed vulnerability which arises if customers have not followed SoftNAS deployment best practices and have openly exposed SoftNAS StorageCenter ports directly to the internet.
Free tool protects businesses against ransomware and other threats
Ransomware and other threats like adware and cryptominers are still a major threat to businesses. But smaller companies may be struggling to find the resources to combat them.
To address this problem Kaspersky Lab is today releasing the next generation of its free Kaspersky Anti-Ransomware Tool for Business.
Insider threats pose the biggest security risk
According to a new study 91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions including Google Drive, Gmail and Dropbox.
The report from SaaS operations management specialist BetterCloud also shows 62 percent of respondents believe the biggest security threat comes from the well-meaning but negligent end user.
8 out of 10 top vulnerabilities target Microsoft products
Prioritizing vulnerabilities can be difficult if you don't know which ones are being actively exploited. The latest annual research from Recorded Future looks at the top vulnerabilities and which products they are targeting.
In 2018, the company observed more exploits targeting Microsoft products compared to Adobe ones. Eight out of 10 vulnerabilities exploited via phishing attacks, exploit kits, or RATs were targeting Microsoft products.
Mid-sized businesses lead the way in workplace technology
Medium-sized businesses now account for over 60 percent of US jobs, and are investing fast in technology, but they must ensure they have the skills and management in place to avoid falling behind.
A new study from Aruba looks at how mid-sized businesses around the world are currently adopting workplace technology,
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.