BetaNews Staff

Most enterprise Windows environments are not secure enough

Security

A new survey, from the real-time IT management company ManageEngine, has revealed that 70 percent of global IT administrators believe that their Windows environments are at risk of malicious attacks.

The survey, titled "Global Active Directory and Windows Server Security -- Trends and Practices Survey, 2016", gathered the opinions of over 325 IT administrators from organizations around the world.

Continue reading

Anonymous teams up with GhostSquad to attack major banks

Anonymous has joined forces with GhostSquad to launch successful cyberattacks on eight international banks that were forced to shut down their websites.

The hacktivist collective alongside the hacker group GhostSquad have launched a new operation called Op Icarus which aims to punish corrupt banks and individuals in the financial sector.

Continue reading

Digital transformation: The biggest concerns

An Appian/YouGov survey analyzed 400 business executives, from companies with more than a billion dollars in revenue, about their digital business transformation plans, and the results are just in.

According to the survey, 14 percent have fully migrated to all intended areas. Another 48 percent managed to migrate partially, but not everything.

Continue reading

Outdated Internet Explorer versions still run on many business PCs

Businesses around the world don’t really enjoy updating their software, security researchers from Duo Security have found, exposing themselves, and their organization to risks of cyber-attacks, phishing, scams and malware.

Researchers looked at a sample of two million Windows devices used by businesses around the world and found that almost a quarter, and that’s 500,000 devices, are using an outdated and unsupported version of Internet Explorer.

Continue reading

Few businesses have an Internet of Things implementation

Internet of things

According to research released by Computing, only eight percent of IT decision makers believe that the Internet of Things (IoT) will be of no consequence to their organizations.

However over half (54 percent) of the respondents believe that IoT is ready to make its mainstream debut, despite their own organizations currently not having plans to adopt the technology. This corresponds with the 23 percent of IT decision makers who believe that the implementation of IoT is currently happening or will happen in the near future, although only 15 percent of them are actively involved with it at present.

Continue reading

Only a solid strategy can unlock the cloud's benefits

Cloud access

Switching to a cloud-based solution, either public, private or hybrid, can result in reduced cost, better data security and improve the overall bottom line, but only if it comes with a solid strategy, VMTurbo says.

The application performance control platform company says businesses will fail to realize the benefits of a cloud-based approach to business without a proper strategy. It has come to that conclusion following a poll of 1,368 organizations, where 57 percent said they had no multi-cloud strategy, 35 percent no private cloud strategy, and 28 percent no public cloud strategy.

Continue reading

Lenovo will make enterprise harware in Europe for EMEA customers

Chinese tech maker Lenovo has announced that it will start building enterprise hardware for its EMEA (Europe, Middle East, Africa) customers in Europe.

That way, customers can expect lower prices (sort of) and faster delivery times.

Continue reading

New security vulnerability affects one in four Android devices

A security vulnerability on Google’s Android OS has exposed users’ text messages, call histories and other sensitive data for the past five years.

The security firm FireEye has released a blog post detailing how it affects smartphones running Android 4.3 Jelly Bean as well as earlier versions of the OS. The bug, which has been indexed as CVE-2016-2060, allows apps to access sensitive user data by taking advantage of Android’s permission system.

Continue reading

Security concerns keeping IT pros up at night

cloud padlock

Security is still the main reason IT professionals are up at night, new reports from BCS, The Chartered Institute for IT say.

BCS has asked 444 IT experts about their thoughts and fears revolving their company in 2016. The results, released in the 2016 Digital Leaders survey, show a mix of "predictable" and "thoughtful" ideas, as the BCS puts it.

Continue reading

Microsoft invests in cloud company Pivotal

Cloud money

It was reported on Friday morning that Microsoft has invested in Pivotal, a San Francisco-based cloud-computing company. Besides Microsoft, Ford was also announced as a major investor.

The media reported that Pivotal’s Series C funding round hit $253 million, with Ford contributing with $182.2 million. It is not known exactly how much money Microsoft poured into the company. We do know, however, that the company’s value now sits at $2.8 billion.

Continue reading

IT departments need to adapt faster to change

The fast-changing IT environment of today is forcing companies to reconsider their approach to IT, as they believe that can help them stand out in the crowd of their competitors.

However, the process is quite challenging. Those are the general conclusions of a new research released by managed services provider Claranet.

Continue reading

Demand for open source talent on the rise

Developer

Open source talent is in high demand when it comes to recruiting new technology experts, and this trend is only going to grow, new reports say.

According to the latest 2016 Open Source Jobs Report, 59 percent of hiring managers will increase the number of open source talent in their organization within the next six months.

Continue reading

Google's AI is reading love novels to give 'humanized' answers

Soon enough, you can expect Google’s AI to start sending you love letters. And judging by the information you are just about to read, those might be some of the best love letters ever written, in the history of robotkind. Or humankind. Or both, I guess.

Here’s what’s going on. Google says its AI engine’s answers to human questions are too factual. Imagine the answers as being purely robotic. Subject, predicate, adverbial clause. Google, on the other hand, wants those answers to be more human -- it wants the robot to be able to answer the same question in different words, to change the tone and personality from time to time.

Continue reading

Crowdsource your security knowledge: A simple guide to OWASP Top 10

security guards

Over the past two years, the Internet has seen some of the biggest, most devastating data breaches in history. With each attack, millions of personal identifiable information records are stolen, leading to the possibility of identity theft, banking fraud, and in some of the most notable cases, that's right -- divorce.

From an internet security standpoint, what’s most interesting about these data breaches isn’t the various celebrities naive enough to sign up for Ashley Madison with their real names but rather that these breaches often come from some of the most common methods hackers have for accessing data. Shouldn’t these common methods be the most widely protected against? That’s what a large portion of the internet security community believes, and that’s where the Open Web Application Security Project (OWASP) comes in. OWASP is an open-source security community that publishes the most common attacks to help developers keep their software from being the source of a critical (and possibly humiliating) breach. Keep reading to find out what OWASP’s Top 10 Project is as well as what those Top 10 actually are.

Continue reading

Stick to the script: 5 ways to keep your software development outsourcing on track

The good news -- you’ve found a software development team that you’re comfortable with and work well alongside. They fit so well into your company’s culture, you even begin to view them as you would any internal employee. While this is all well and good, it’s not to say that you won’t run into challenges along the way -- from day-to-day communication gaps to even uncertainties in tracking of overall progress. Certainly no relationship is perfect, but it falls within your job description as the project manager or product owner to ensure outsourced projects stay on track and more importantly -- within budget.

The following list of management tips and tricks of the trade should be put in place to help keep risks down to a minimum and your outsourced relationships performing at their best.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.