Ian Barker

The changing enterprise mobile threat landscape

mobile shield

As enterprises continue the shift towards mobile devices there's concern that the risks could begin to outweigh the benefits.

Mobile security specialist Wandera has released a new report on the mobile threat landscape which looks at the risks faced by enterprise mobile users.

Continue reading

83 percent of US organizations have accidentally exposed sensitive data

data magnifier

According to a new survey 83 percent of security professionals believe that employees have accidentally exposed sensitive customer or business data at their organization.

The study from data protection specialist Egress also finds that accidental data breaches are often compounded by a failure to encrypt data prior to it being shared -- both internally and externally.

Continue reading

Employees and contractors expose information online in 98 percent of organizations

web threats

Employees and contractors are exposing confidential and sensitive information online and in the cloud in some 98 percent of organizations. This is found primarily in Dropbox, Google, and Microsoft SharePoint.

This is among the findings of a new report from insider threat specialist Dtex Systems which has analyzed information from work-issued endpoints and more than 300,000 employee and contractor accounts.

Continue reading

Cloud data warehouses are key to digital transformation

cloud data cable

Cloud data warehouses (CDW) offer broader data capabilities, stronger performance, and greater flexibility than traditional on-premise databases according to a new survey.

But the study by TDWI on behalf of Talend also shows enterprises need to follow some best practices to overcome implementation challenges and increase investment return.

Continue reading

Formjacking is the new cash generator for cybercriminals

password theft

The latest Symantec Annual Threat Report reveals that cybercriminals are continuing to follow the money, but as ransomware and cryptojacking show falling returns they are turning to other techniques.

One of these is formjacking -- essentially virtual ATM skimming -- where cybercriminals inject malicious code into retailers' websites to steal shoppers' payment card details.

Continue reading

Branded calling solution seeks to rebuild trust in mobile calls

app frustration

A few months ago we reported on a study that found half of calls to mobiles would soon be scams without more effective protection measures being introduced.

First Orion the company behind that survey is addressing the problem with the launch of a new platform that gives consumers confidence in answering calls, but also helps businesses get their legitimate communications through.

Continue reading

New solution protects converged IT and OT environments

Industrial IoT

The line between information technology and operational technology is an increasingly blurred one. As companies drive towards digital transformation so OT environments increasingly interconnect with IT, resulting in a complex, sensitive and vastly expanded attack surface.

This means OT security responsibility is often moving to to the CISO. Yet traditional IT security solutions lack the ability to continuously discover and assess sensitive OT assets.

Continue reading

New access suite delivers a software defined perimeter for hybrid environments

Business security

The move to accessing applications from the cloud and provisioning resources dynamically has led to organizations moving to a zero trust strategy to guard against attacks and data leaks. However, this can be hard to achieve with hybrid environments.

Secure access specialist Pulse Secure is adding Software Defined Perimeter (SDP) architecture to its platform to extends its foundation of Zero Trust access for hybrid IT.

Continue reading

The speed and cost of internet around the world

Internet Worldwide Globe Connections

Within any given country, while you might have a choice of different internet providers, the speeds they offer and the prices they charge tend to be broadly similar.

UK-based comparison site Compare the Market has done some interesting research looking at the costs and speeds of broadband around the world. So prepare to be made jealous, or smug, depending on where you live.

Continue reading

How enterprises can cut the risk of cloud vendor lock in [Q&A]

cloud lock

While most CIOs have now identified the benefits cloud can have for their business, concerns over becoming locked in with a single vendor can still be a major barrier to rolling out projects.

We spoke to Richard Best, general manager at COMPAREX UK, to find out why this is the case and what companies can do to avoid vendor lock in.

Continue reading

How contact centers have become a prime target for hackers [Q&A]

call center

With growing security threats and compliance being taken seriously, companies are more aware than ever of the need to protect their data.

This means hackers must work harder to try to steal information and contact centers are in the front line. We spoke to Ben Rafferty, chief innovation officer at security and compliance specialist Semafone to find out how contact centers are under threat and what can be done to protect them.

Continue reading

Dark web tags harm website performance and put data at risk

Downloading

Website tags, small pieces of JavaScript code or small images, are often used to collect information about users. But they can add to load times and if misused can be a security risk too.

A new study from digital governance specialist Crownpeak reveals over 1,700 'dark web' tags found on websites belonging to companies in the Fortune 100, causing a total average website latency of 5.2 seconds.

Continue reading

Zoho launches next generation Office Suite with added AI

Zoho logo

Popular cloud-based office suite Zoho is launching a new version of its software complete with AI-powered personal assistant.

Zoho Office is made up of four cloud-based productivity software applications -- Zoho Writer, Zoho Sheet, Zoho Show, and Zoho Notebook. These are fully integrated with each other and with Zoho Mail the company’s messaging app Cliq.

Continue reading

Roses are red, violets are blue, Valentine scammers are out to trick you

Heart phone

A Nigeria-based gang of scam artists, known as Scarlet Widow, have been using romance scams to trick victims out of large amounts of cash.

Secure email company Agari has uncovered the scam which involves posting fake personas on the largest dating websites like Match, eHarmony, and OKCupid.

Continue reading

Mobile marketers increase their focus on data

Mobile ads

Data has become an increasingly popular resource for marketers, new research from marketing platform YouAppi reveals that 98 percent of respondents say they have increased their organizational investment in data.

What's more that investment is paying off, 97 percent say they have seen improvement, with more than half of those calling the improvements ‘significant.’

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.