Businesses at risk from boom in IoT devices
New research from Forescout Vedere Labs reveals that 65 percent of devices across organizations are no longer traditional IT. Of these 11 percent are network equipment, while 24 percent are part of the extended IoT, such as IoT, OT and IoMT.
Financial services (54 percent), healthcare (45 percent) and oil, gas and mining (40 percent) are the sectors that have the highest percentages of non-IT devices.
Implementing runtime security for the cloud [Q&A]
Cloud-native platforms are built for speed with ephemeral workloads, rapid deployments, and plenty of third-party app dependencies.
This poses a real challenge to the deployment of runtime security tools. We talked to Bob Tinker, founder and CEO of BlueRock.io, to discuss how organizations can protect their cloud systems effectively.
SonicWall warns its cloud backup service users to reset credential after security incident
Following a previously acknowledged security breach last month, SonicWall has published an updated bulletin to customers having investigated the incident. The company says that it is now aware that an “unauthorized party accessed firewall configuration backup files for all customers who have used SonicWall’s cloud backup service”.
SonicWall has also published an extensive document to help customers with “containment, remediation and monitoring”. This includes advising everyone to reset various passwords.
90 percent of organizations face attacks involving lateral movement
A new report from Illumio, based on a survey of over 1,100 IT and cybersecurity decision makers, finds that almost 90 percent of leaders have detected a security incident involving lateral movement within the past 12 months.
Each incident involving lateral movement resulted in a global average of over seven hours of downtime. Alert fatigue, along with limited and fragmented visibility, especially across hybrid environments, are two of the top challenges to detecting lateral movement.
Why the cybersecurity industry needs to be more accessible [Q&A]
The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.
Organizations today are forced to juggle multiple tools, each with unique UI, costs, and maintenance headaches. They’re also often not able to buy the tools they need, because they are either too expensive or don't exist in the specific capacity they need.
Younger generations embrace the mainframe
Large enterprises have always relied on mainframe computing but with the rise of technologies like the cloud and AI many have predicted that those days are numbered.
Software solutions company BMC has released the results of its 20th annual BMC mainframe survey, which finds that in fact positive perception of the mainframe has reached an all-time high of 97 percent, highlighting that the mainframe remains a vibrant and growing platform.
Proton introduces emergency access to accounts
Imagine the scenario, you’re suddenly hospitalized or incapacitated following an accident but access to important information like insurance details is locked up in your computer and online accounts which no one else can access.
For this and other emergency situations Proton is launching an Emergency Access feature so that passwords and logins, documents and files will be recoverable by trusted individuals in case of an emergency.
Microsoft now saves all Word files to the cloud by default
Anyone who has used Microsoft Word for a number of years will remember the times they have been saved by the autosave feature. The move to the cloud complicated things slightly meaning that many people lost files when Microsoft changed the way the feature worked.
Now the company has announced a significant change to Word that will help to dramatically reduce the risk of documents being lost by accident or because of something like a power outage or hardware failure. All Word documents are now saved to the cloud by default.
Google Drive simplifies video editing
Google Drive is home to every type of file imaginable, and a decent proportion of those files are videos. It is with this in mind that Google has decided to make it easier to edit videos which have been uploaded to its cloud storage service.
Rather than adding video editing tools directly into Google Drive, the company is instead making it easier to access the option to do so using Google Vids.
Microsoft launches Windows 365 Reserve preview to reduce downtime
Microsoft has launched a limited public preview of Windows 365 Reserve, a new cloud-based service to help reduce downtime and disruption for business when disaster strikes.
Whether there is a system failure, a cyberattack, or something else goes wrong, Windows 365 Reserve provides access to a Cloud PC to help reduce disruptions. Microsoft says that it offers businesses “secure and on-demand Cloud PC access from anywhere when you need it most”.
New agentic AI platform helps teams fix cloud security problems faster
Security teams are often hampered by having to identify and fix issues while weeding out false positives. This is an area where AI can help and Sysdig has launched a new agentic platform designed to analyze cloud environments end-to-end and uncover hidden business risk so organizations can remediate crucial threats fast and deliver measurable improvements in their security posture.
Sysdig Sage, the company’s AI cloud security analyst, ultimately understands context from the entire business and provides clear, contextual remediation recommendations, reducing an organization’s exposure time to critical vulnerabilities.
Cloud accounts come under attack as identity threats rise
The latest Threat Detection Report update from Red Canary shows a rise of almost 500 percent in detections associated with cloud accounts during the first half of 2025.
This significant rise stems primarily from Red Canary’s expanded identity detection coverage and the implementation of AI agents designed to identify unusual login patterns and suspicious user behaviors. This includes identifying logins from unusual devices, IP addresses, and virtual private networks (VPNs), which significantly increases the detection of risky behaviors.
Sudden Dropbox Passwords closure leaves users seeking alternatives
Dropbox has suddenly announced that it plans to discontinue its password manager, Dropbox Passwords. With the discontinuation coming at the end of October, users are left with very little time to find an alternative service.
The company is best known for its cloud storage service, and in announcing the impending shuttering of Dropbox Passwords it says that it wants “to focus on enhancing other features in our core product”. More than just closing down the password management side of things, Dropbox is also bringing dark web monitoring to an end.
Why real-time visibility is key to runtime security [Q&A]
Cloud threats are evolving faster than most security teams can respond, and traditional security tools are struggling to keep pace. According to IBM’s 2024 Cost of a Data Breach Report it now takes an average of 258 days to detect and contain a breach -- giving attackers more than enough time to access sensitive data and move laterally through cloud infrastructure undetected.
We spoke to CEO of Upwind, Amiram Schacha, to learn why organizations need real-time visibility and protection at the runtime layer -- where threats actually occur -- in order to close this growing security gap.
Internet-exposed assets reveal industry vulnerability profiles
New analysis from CyCognito of over two million internet-exposed assets, across on-prem, cloud, APIs, and web apps, identifies exploitable assets across several key industries, using techniques that simulate real-world attacker behavior.
Techniques used include black-box pentesting using 90,000+ exploit modules, credential stuffing simulations, data exposure detection, etc. The study also used Dynamic Application Security Testing (DAST) to identify runtime web application vulnerabilities, as well as active vulnerability scanning of internet-facing services to detect CVEs, misconfigurations, and exposed assets.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.