If we look at the world of cyber security through the eyes of the media, it’s a pretty frightening view. We hear story after story of security breaches hitting major companies and the next data leaks that follows affecting thousands of people. It’s enough to fill any business with trepidation.
With cyber security such a big talking point, we tend to see a lot of information floating around -- some of which is not in the least bit true. If a company wants to enhance its IT security it is imperative to be able to separate facts from fiction.
Almost 3 terabytes of data stolen in the Panama Gate scandal will shortly become searchable online. Mossack Fonseca, the breached legal firm behind one of the largest data leaks in the history, had numerous high-risk vulnerabilities in its front-end web applications, including its Client Information Portal. Actually, few hacking groups would spend money on expensive zero-days and complicated APTs, when the information can be easily stolen via insecure web applications. Moreover, even if your corporate website doesn’t contain a single byte of sensitive data, it’s still a perfect foothold to get into your corporate network.
Today many people, including cybersecurity professionals, underestimate the importance of web application security, focusing their attention rather on APT detection, enterprise immune systems and other activities applicable when it’s already "too late" to react to prevent the breach. A common-sense approach suggests that before installing expensive anti-burglar equipment and alarm in a house, the owner should first close the doors and the windows and probably build a fence around, otherwise you’re throwing money down the drain. Let’s have a look at five most common myths that exist today about web application security, leading to sensational data breaches, huge financial loses and CISO dismissals:
Blockchain is the most important innovation since the creation of the internet, almost two thirds (60 percent) of global financial services retailers with some knowledge of the technology said.
That’s a bold claim.
In an attempt to improve the daily lives of its customers, Three is planning to block ads for all of the customers using its network in the UK.
The company will block all mobile ads for its users for one day next month. The trial will last for 24 hours but if it is received successfully by Three customers, the company has hinted that it would be willing to expand its experiment.
Google wants to do away with traditional passwords on Android and replace them with "trust scores".
The company outlined how it is planning to make the transition away from passwords on its mobile platform by 2017 during its I/O conference last week. By using a variety of different metrics, Google’s Trust API technology would be able to replace traditional passwords and pins used to unlock its smartphones.
Ahh, the battle in the car industry is heating up. Quick, everyone, grab your popcorn!
After both Lyft and Gett found investors in the form of General Motors and Volkswagen, respectively, it is Uber’s turn to get funded, and the car making company with the pleasure is none other than Toyota.
Shadow IT, or stealth IT, is a practice still commonly used by European workers, according to a new Fuze report. It means employees are using either hardware or software that has not been directly approved of by the IT department, risking security breaches.
The report, entitled "App Generation report", argues that 40 percent of employees are using their personal devices for work. The same goes for software and apps.
Records management is once again back on the business agenda, driven by the new European Union General Data Protection Regulation (GDPR), which comes into effect in under two years from now. Through the GDPR, the European Commission intends to strengthen and unify data protection for individuals within the EU. This new directive represents a substantial leap in scope compared to previous versions of this regulation; and its non-compliance poses a major risk to businesses.
No organization can take lightly the risk of a sanction that can be up to four percent of its worldwide turnover.
Though stealing someone’s identity is illegal, there are plenty of sneaky but legal tactics scammers and hackers employ that can expose you to identity theft as well. The first step in preventing this distressing scenario is being aware of the more common data collection schemes used to leave you vulnerable.
Here, we’ll detail five strategies you should be aware of so you can keep your identity -- and sanity -- in check.
Pretty much every car will have connectivity features within the next four years, but consumers are still unaware of the benefits this new technology brings. Thirty-nine percent of drivers are unaware their car has connectivity features, at all. Manufacturers are also unsure how to use the opportunity to open new revenue streams, busting the doors wide open for technology giants.
Those are the results of a new study conducted by TNS and the BearingPoint Institute. It includes 3,700 owners of connected cars in Europe. One of the highlights of the report is that people are very excited about new features, especially navigation, driver assistance and in-car entertainment.
A new study from CommScope has revealed that millennials are so accustomed to constantly being connected that they would rather give up plumbing and heating before giving up connectivity and electricity needed to power their mobile devices.
The millennial generation will place a large burden on global network operators who will have to plan for continued capacity growth, greater flexibility, a larger array of services as well as corresponding billing models if they hope to meet the demand of those born between 1980 and 2000.
Business leaders understand the importance of data analytics, and will do what it takes to make sure their company’s data needs are met. However, they don’t think they should be anticipating future trends in order to take full advantage of any upcoming opportunities.
Those are the results of a new study conducted by The Economist Intelligence Unit (EIU), and sponsored by Microsoft Cloud. The study is entitled Transforming Business, and says that 67 percent of survey respondents (including IT leaders, HR leaders, finance and sales & marketing people), are "somewhat" or "very" confident about their department’s ability to use data.
That half-naked butt-selfies millennials sometimes take on top of their washing machine in the bathroom are coming back to haunt them, as they start looking for their first (or new) job, a new survey says.
The survey by cyber-security firm Norton and recruitment firm Reed says UK millennials (18 - 34 year-olds) are now concerned how their social media activity might interfere, and damage, their professional careers.
Security researchers have discovered that DDoS attacks are now available to purchase on the Internet for as little as $5 an hour.
The researchers, who work for the security firm Imperva, were able to find distributed denial of service attacks (DDoS) for as low as $5 an hour on the online professional services marketplace Fiverr. A year ago these same services cost $38 an hour and could only be found on the dark web.
It’s a jungle out there in the big, bad world of ecommerce. You’re having a hard enough time bringing potential customers to your website in the first place, what with your competitors striving to undercut your prices and outrank you in Google searches. That means when people do visit your site, you want to do everything you can to encourage them to stay there -- and ultimately, to convert.
Fortunately, there are a few techniques -- some tried and trusted, others a little more advanced -- that you can adopt to boost your conversion rate. Read on for our top five tips to transform your website into a deadly selling tool…