BetaNews Staff

Why mobile security is more critical today, but still just as challenging

Today our lives are inextricably tied to our mobile devices. We use them just like mini-computers, handling sensitive personal and work-related matters throughout the day. This trend is concerning because mobile devices were not designed with security in mind and are now arguably the biggest threat to both consumer and enterprise security.

Just like we have seen with the evolution of computer threats, cybercriminals are catching onto the new opportunities mobile presents. This past year, we have witnessed a dramatic spike in mobile-first cyberattacks like social media and SMS phishing, malicious apps and even robocalls. These attacks are also only going to increase with the bring your own device workplace.

Continue reading

Mobile and contactless payments growing in popularity in UK

Credit card hand

The UK is continuing to embrace mobile and contactless payments as the impact of cash continues to decline, new figures have revealed.

British consumers and businesses are increasingly shunning physical money in favor of card and online payments, according to the UK Cash and Cash Machines 2017 report from watchdog UK Finance.

Continue reading

Peek enables you to locate local activities on your next vacation

Travel to any destination, whether for leisure or business or leisure, and the question we ask ourselves is what should we do when we’re there. Leave it late and you find yourself scrambling online and looking for tour guides to find what there is to do when you’ve arrived. Then there is the issue of finding the best value for the experience you desire.

Peek is an all in one app which enables you to discover and book incredible activities. Whether you want to go spearfishing in Cabo San Lucas, doing the Haunted Ghost walking tours in New Orleans, an electric bike tour around Paris, or a culinary walking tour around one of many cities, Peek has you covered and so much more.

Continue reading

HPE and NASA sending a supercomputer to space

The computers the human race currently work with aren't built for space, and can't last long in off-planet environments. Astronauts aboard the ISS need new machines every month, as the old ones get destroyed by various factors that don't exist on Earth, like solar flares, radiation, subatomic particles, and irregular cooling.

Considering that SpaceX is currently preparing for a mission to Mars, it is paramount that the astronauts that eventually head out there have durable, working machines. Now, HP has announced it is working with NASA to create such a computer.

Continue reading

The benefits of intrusion prevention systems in security

Cloud data security

There’s a penchant by many to measure the quality of IPS (Intrusion Prevention System) solutions by the number of threat signatures supported by the vendor. Checkpoint points to how it delivers "1,000s of signature, behavioral and preemptive protections." Fortinet claims its FortiGuard IPS service inspects "over 8,000 signatures consisting of 15,649 rules." Cisco IOS Inline IPS "supports more than 7000 signatures."

Presumably, the more signatures the more thorough the IPS. But is that really the right measure for today’s defending against today’s threat landscape?

Continue reading

The importance of proactive defense in enterprise security

business security

The moment a cybercriminal targets an organization, the victim enters a race against time. Every minute that the attacker is able to operate undetected is more time for them to compromise systems, steal data, and cause more harm to their target. The ability to detect an attack and shut it down quickly can make the difference between a minor security incident and a huge breach that costs millions of pounds, or even brings an end to the company itself.

The good news is that organizations seem to be making great strides in detecting security breaches, according to our 2017 Trustwave Global Security Report, which examines the results of thousands of our investigations into security incidents. Across the incidents we investigated in 2016, the median time from intrusion to detection of a compromise had fallen to 49 days, down from 80.5 days in 2015.

Continue reading

Why you should be moving to the cloud

Whilst not a brand-new phenomenon, the cloud has dominated headlines in the technology sector in recent years, as more businesses migrate and harness the benefits associated with it.

Cloud computing involves businesses hosting data, applications and virtual machines (VMs) on servers in remote data centers, which are connected to devices and users through the internet or private networks.

Continue reading

Don't dismiss insider threats when assessing security

Security

When we think of a cyberthreat, we often imagine a nation state hacking group, or a virus trying to work its way into our company network. After all the media is full of depictions of incidents of this very nature -- how many times has North Korea or Russia been blamed for hacking the West?

The funny thing is, the cyberthreat that we should be worrying about actually resides in a place that’s a lot closer home, often found within the company building. What I’m talking about is the insider threat. And it’s about time we paid closer attention to it.

Continue reading

Four tips to make bots successful at customer support

Bots are at a tipping point in customer care, and many large bands, including RBS and Vodafone, are already bringing AI and bots to life for millions of their customers. But the hype around bots has also introduced many misconceptions. If implemented poorly, bots could have a disastrous effect on the customer experience.

From our work with many of the world’s leading bot-makers and largest brands over the last few years, we have learned there are four "secrets" to making bots successful in customer care, without which bot projects are more likely fail.

Continue reading

The value of analytics and big data in digital transformation

Big data and analytics are topics firmly embedded in our business dialogue. The amount of data we’re now generating is astonishing. Cisco predicts that annual global IP traffic will reach 3.3 ZB per year by 2021 and that the number of devices connected to IP networks will be more than three times the global population by 2021, while Gartner predicts $2.5M per minute in IoT spending and 1M new IoT devices will be sold every hour by 2021. It’s testament to the speed with which digital connectivity is changing the lives of people all over the world.

Data has also evolved dramatically in recent years, in type, volume, and velocity -- with its rapid evolution attributed to the widespread digitization of business processes globally. Data has become the new business currency and its further rapid increase will be key to the transformation and growth of enterprises globally, and the advancement of employees, "the digital natives."

Continue reading

Containers have long-term value in the enterprise

Cloud management

In an era where the preferred application platform is the cloud and DevOps is set to drive performance in today’s digital economy, industry skeptics still view containers as "over-hyped," with no long-term value in the enterprise.

However, with large investments from Amazon, Google and Microsoft, the option of containers is becoming a viable solution -- and over the next three years, predictions are that it’s set to see a huge rise in its implementation.

Continue reading

How the connected world is testing the testers

With the emergence of IoT, everything becomes connected; there is a continuous blurring between real world and digital world where everything is moving to become predominantly digital. Apps are location-aware, context-aware, and aware of everything around them (supply chain, logistics network) and that’s bringing the custom device world into mainstream industry-wide. Bring together any device (custom or mainstream, mobile or fixed) and everything is connected and focused on the experience of the end user.

In this new world, mobile apps are being rolled out continuously and at a far greater speed. Change is fast, and customer expectation sky high. Add to that we are living in a diverse and fragmented technology world across different platforms and devices with increasing adoption of AI and machine learning, with security as an ongoing and ever-increasing challenge.

Continue reading

Manufacturers are cybercriminals' biggest target

hacker

Cyber-attacks all over the world are becoming increasingly sophisticated, according to a new report by the NTT Group company. According to the same report, these attacks are also growing in frequency.

The Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report says cyber-attacks were up by 24 percent globally, in the second quarter of 2017.

Continue reading

Giveaway: Get Auslogics File Recovery 7 ($29.95 value) FREE for a limited time

You give your computer a spring clean by removing a ton of files you’ve stored for years. Then you realize a few weeks later that you accidentally deleted important documents or old photos and there’s no quick and obvious way of retrieving them.

The solution is a dedicated file recovery application. There are few better than Auslogics File Recovery 7 and we’re offering you the full version, worth $29.95, across this weekend. It’s always worth having a file recovery program within your suite of system tools.

Continue reading

Refurbishing servers: 5 great reasons why you need to consider it

Cloud server

If you work in IT solutions as a provider for managed services, cloud services, or internet services you are going to need servers that meet your needs in terms of both price and performance. So how can you keep your costs down and find the solutions that your clients and customers are looking for?

When it’s time to replace your servers, buying refurbished is the obvious solution. Hard on the heels of that thought though is a common fear of zombies -- getting stuck with zombie servers to be more specific. These comatose entities will suck not only your wallet but also your operating budget dry while providing zero value.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.