Ian Barker

Demand for blockchain and security engineers soars

Blockchain

If you want to secure your future in the IT industry then it seems that blockchain and security are the areas you need to be in.

A report from career marketplace Hired shows that in the past year there has been a 517 percent increase in demand for blockchain engineers year on year, and a 132 percent jump for security engineers.

Continue reading

Home endpoints twice as likely to be infected as businesses

data threat

Despite the fact that in recent months we've seen cybercriminals focusing their efforts on businesses, 68 percent of infections are seen on consumer endpoints, compared to 32 percent on business endpoints.

This is one of the findings of the latest Webroot Threat Report, which also shows that legitimate websites are frequently compromised to host malicious content, with 40 percent of malicious URLs hosted on good domains.

Continue reading

40 percent of ticketing site traffic comes from bad bots

robot keyboard

If you've ever tried to book tickets for a concert, festival or event you will know that it can be something of a frustrating experience, and bots could be making it even more so.

New research from Distil Networks finds 39.9 percent of traffic on ticketing sites comes from bots used by brokers, scalpers, hospitality agencies, and sundry criminals to execute a number of attacks, including denial of inventory, spinning and scalping, scraping seat map inventory, fan account takeover, and fraud.

Continue reading

Isolating privileged access is critical to security

Admin login

A new study reveals that 87 percent of cybersecurity professionals believe separating privileged environments from corporate, internet-exposed environments is highly critical for protecting sensitive information.

But the Privileged Access Workstations (PAW) survey carried out by Cybersecurity Insiders for endpoint security company Hysolate also finds that time-consuming access processes and the inability to install apps, browse the web or plug in external devices, are key implementation roadblocks.

Continue reading

97 percent of companies struggle to deploy and manage public clouds

cloud worry

Public cloud adoption is growing fast, but it's not without problems. A new report from network verification company Veriflow uncovers a disconnect between network and other teams involved in the management and oversight of the public-cloud portion of their networks.

IT teams are struggling with network infrastructure challenges caused by the cloud, such as impaired visibility and more frequent security threats.

Continue reading

Optimizing cost is key priority for cloud users

cloud dollars

Optimizing existing cloud use for cost savings is the top initiative for users in 2019 for the third year in a row, increasing to 64 percent from 58 percent in 2018.

This is one of the findings of the RightScale 2019 State of the Cloud Report from Flexera. Among other highlights are that enterprises plan to spend 24 percent more on public cloud in 2019 compared to 2018.

Continue reading

Credential stuffing remains a major problem for retail sites

credential hacker

Thanks to the huge volume of stolen credentials now available online, credential stuffing has become a major issue for the retail industry.

A new report from edge platform specialist Akamai shows that hackers directed credential abuse attempts at retail sites more than 10 billion times from May to December last year.

Continue reading

Peer analytics offers better visibility into security performance

magnifier

It's useful for security and risk leaders to know their industry's security performance standards and be able to perform peer and sector-wide security benchmarking. But the information to be able to do that isn't always easily available.

Security ratings company BitSight is launching a new Peer Analytics feature on its platform that allows the comparison of security performance across global organizations.

Continue reading

How next generation technology is transforming the data center [Q&A]

Data center

The demands of digital transformation inevitably lead to additional stresses on the data center. It's no surprise then that enterprises are increasingly turning to technology solutions to improve their data center management and workload monitoring.

But what can these solutions deliver and how effective are they? We spoke to Jeff Klaus, GM of data center management solutions at Intel, to find out.

Continue reading

Mobile security platform combines biometrics and behavior to enhance security

mobile shield

Multi-factor authentication specialist Veridium is launching a new behavior analytics feature to better protect user identities and prevent malicious activity.

Incorporated in the VeridiumID authentication platform, InMotion increases the reliability of all native biometrics for authentication by pairing behavioral data captured on smartphones with users' biometrics, making it more difficult for malicious actors to spoof their fingerprints or faces to gain access to accounts.

Continue reading

Americans more likely to stop dealing with a brand after a breach but Brits hold a grudge for longer

US v UK

New research into consumer trust and spending habits by contact center payment security company PCI Pal shows 62 percent of Americans report that they will stop spending with a brand for several months following a hack or breach, versus 44 percent of Brits.

But when the British do react they do so for the long term, 41 percent of British consumers never return to a brand after a hack compared to only 21 percent of Americans.

Continue reading

The cloud moves too fast for security say 60 percent of security pros

cloud net

Cloud-based business initiatives are accelerating faster than security organizations' ability to secure them according to 60 percent of respondents to a new survey.

The study by network security company FireMon also finds that in many cases security personnel are not even included in cloud business initiatives.

Continue reading

Cybercriminals earn over $3 billion a year from social platforms

Cybercrime cash

Social media-enabled cybercrimes are generating at least $3.25 billion in global revenue annually according to a new report.

The study released by virtualization-based security company Bromium and  researched and written by Dr Mike McGuire, senior lecturer in criminology at the University of Surrey, looks at the range of techniques used by cybercriminals to exploit trust and enable rapid infection across social media.

Continue reading

'Hi, how can we scam you today?' -- Office 365 phishing site comes with live chat support

Phishing password

An increasingly common -- and frankly rather annoying -- feature of many commercial websites is the little chat box that pops up in the bottom right corner and asks if you need any help.

Security researcher Michael Gillespie has revealed that an Office 365 phishing site is using this live support technique to give its page an air of legitimacy.

Continue reading

New platform helps enterprise networks get closer to the edge

Edge computing

Driven by the growth of mobile computing, IoT devices and the upcoming 5G rollout, edge networking is on the rise and leading businesses to take a fresh look at their networking strategies.

But going from a traditional approach to a virtualized, cloud-native, and software-driven network that connects headquarters to multiple branches and deploys new services like SD-WAN, Virtualized Customer Premises Equipment (vCPE), and IoT devices isn’t easy.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.