Demand for blockchain and security engineers soars
If you want to secure your future in the IT industry then it seems that blockchain and security are the areas you need to be in.
A report from career marketplace Hired shows that in the past year there has been a 517 percent increase in demand for blockchain engineers year on year, and a 132 percent jump for security engineers.
Home endpoints twice as likely to be infected as businesses
Despite the fact that in recent months we've seen cybercriminals focusing their efforts on businesses, 68 percent of infections are seen on consumer endpoints, compared to 32 percent on business endpoints.
This is one of the findings of the latest Webroot Threat Report, which also shows that legitimate websites are frequently compromised to host malicious content, with 40 percent of malicious URLs hosted on good domains.
40 percent of ticketing site traffic comes from bad bots
If you've ever tried to book tickets for a concert, festival or event you will know that it can be something of a frustrating experience, and bots could be making it even more so.
New research from Distil Networks finds 39.9 percent of traffic on ticketing sites comes from bots used by brokers, scalpers, hospitality agencies, and sundry criminals to execute a number of attacks, including denial of inventory, spinning and scalping, scraping seat map inventory, fan account takeover, and fraud.
Isolating privileged access is critical to security
A new study reveals that 87 percent of cybersecurity professionals believe separating privileged environments from corporate, internet-exposed environments is highly critical for protecting sensitive information.
But the Privileged Access Workstations (PAW) survey carried out by Cybersecurity Insiders for endpoint security company Hysolate also finds that time-consuming access processes and the inability to install apps, browse the web or plug in external devices, are key implementation roadblocks.
97 percent of companies struggle to deploy and manage public clouds
Public cloud adoption is growing fast, but it's not without problems. A new report from network verification company Veriflow uncovers a disconnect between network and other teams involved in the management and oversight of the public-cloud portion of their networks.
IT teams are struggling with network infrastructure challenges caused by the cloud, such as impaired visibility and more frequent security threats.
Optimizing cost is key priority for cloud users
Optimizing existing cloud use for cost savings is the top initiative for users in 2019 for the third year in a row, increasing to 64 percent from 58 percent in 2018.
This is one of the findings of the RightScale 2019 State of the Cloud Report from Flexera. Among other highlights are that enterprises plan to spend 24 percent more on public cloud in 2019 compared to 2018.
Credential stuffing remains a major problem for retail sites
Thanks to the huge volume of stolen credentials now available online, credential stuffing has become a major issue for the retail industry.
A new report from edge platform specialist Akamai shows that hackers directed credential abuse attempts at retail sites more than 10 billion times from May to December last year.
Peer analytics offers better visibility into security performance
It's useful for security and risk leaders to know their industry's security performance standards and be able to perform peer and sector-wide security benchmarking. But the information to be able to do that isn't always easily available.
Security ratings company BitSight is launching a new Peer Analytics feature on its platform that allows the comparison of security performance across global organizations.
How next generation technology is transforming the data center [Q&A]
The demands of digital transformation inevitably lead to additional stresses on the data center. It's no surprise then that enterprises are increasingly turning to technology solutions to improve their data center management and workload monitoring.
But what can these solutions deliver and how effective are they? We spoke to Jeff Klaus, GM of data center management solutions at Intel, to find out.
Mobile security platform combines biometrics and behavior to enhance security
Multi-factor authentication specialist Veridium is launching a new behavior analytics feature to better protect user identities and prevent malicious activity.
Incorporated in the VeridiumID authentication platform, InMotion increases the reliability of all native biometrics for authentication by pairing behavioral data captured on smartphones with users' biometrics, making it more difficult for malicious actors to spoof their fingerprints or faces to gain access to accounts.
Americans more likely to stop dealing with a brand after a breach but Brits hold a grudge for longer
New research into consumer trust and spending habits by contact center payment security company PCI Pal shows 62 percent of Americans report that they will stop spending with a brand for several months following a hack or breach, versus 44 percent of Brits.
But when the British do react they do so for the long term, 41 percent of British consumers never return to a brand after a hack compared to only 21 percent of Americans.
The cloud moves too fast for security say 60 percent of security pros
Cloud-based business initiatives are accelerating faster than security organizations' ability to secure them according to 60 percent of respondents to a new survey.
The study by network security company FireMon also finds that in many cases security personnel are not even included in cloud business initiatives.
Cybercriminals earn over $3 billion a year from social platforms
Social media-enabled cybercrimes are generating at least $3.25 billion in global revenue annually according to a new report.
The study released by virtualization-based security company Bromium and researched and written by Dr Mike McGuire, senior lecturer in criminology at the University of Surrey, looks at the range of techniques used by cybercriminals to exploit trust and enable rapid infection across social media.
'Hi, how can we scam you today?' -- Office 365 phishing site comes with live chat support
An increasingly common -- and frankly rather annoying -- feature of many commercial websites is the little chat box that pops up in the bottom right corner and asks if you need any help.
Security researcher Michael Gillespie has revealed that an Office 365 phishing site is using this live support technique to give its page an air of legitimacy.
New platform helps enterprise networks get closer to the edge
Driven by the growth of mobile computing, IoT devices and the upcoming 5G rollout, edge networking is on the rise and leading businesses to take a fresh look at their networking strategies.
But going from a traditional approach to a virtualized, cloud-native, and software-driven network that connects headquarters to multiple branches and deploys new services like SD-WAN, Virtualized Customer Premises Equipment (vCPE), and IoT devices isn’t easy.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.