Ian Barker

How cloud-based training can help address the cybersecurity skills gap [Q&A]

training key

It's widely acknowledged that there's a skills shortage in the cybersecurity field. Many businesses are looking to address this by training their own security talent, but this in itself can be a challenge.

We spoke to Zvi Guterman, founder and CEO of virtual IT labs company CloudShare to find out how the cloud can help address security training issues.

Continue reading

Five vendors account for nearly a quarter of all vulnerabilities

World map with code

Just five major vendors account for 24.1 percent of disclosed vulnerabilities in 2019 so far, according to a new report from Risk Based Security.

The report also reveals that 54 percent of 2019 vulnerabilities are web-related, 34 percent have public exploits, 53 percent can be exploited remotely and that 34 percent of 2019 vulnerabilities don't yet have a documented solution.

Continue reading

Interest in VMWare Cloud use on AWS grows

Cloud management

A new survey of over 1,100 IT professionals carried out by managed service provider Faction reveals growing usage of and interest in VMware Cloud on AWS.

According to the study 64 percent of respondents say they have workloads in Azure, 57 percent AWS, 25 percent VMware Cloud on AWS, and 26 percent Google. But 29 percent of respondents plan to increase workloads on VMware Cloud on AWS in the next 12 months, while 15 percent plan to start running workloads and 14 percent plan to increase the number of workloads.

Continue reading

Hacktivism in decline as it returns to its roots

Hacktivist

Hacktivism has its origins in small groups of people banding together to achieve common goals. In recent years, however, it's become associated with larger groups and even nation states using the guise of hacktivism for geopolitical purposes.

A new report from the Insikt Group at Recorded Future though suggests that overall hacktivism is in decline.

Continue reading

What makes enterprises more efficient at patching vulnerabilities?

Patch download

The companies most effectively managing security vulnerabilities are those using a patch tool, relying on risk-based prioritization tools, and having multiple, specialized remediation teams that focus on specific sectors of a technology stack.

A new report from cyber risk specialist Kenna Security, produced in conjunction with the Cyentia Institute, reveals that businesses with mature, well-funded vulnerability management programs are more likely to patch vulnerabilities faster.

Continue reading

IBM extends its commitment to open hardware

IBM logo

IBM has used the Linux Foundation Open Source Summit today to announce that it will contribute key technologies to the open community.

The company is opening up the POWER Instruction Set Architecture (ISA), the definitions developers use for ensuring that hardware and software work together on POWER.

Continue reading

Almost a third of healthcare workers haven't had cybersecurity training

Healthcare data

Because of the volumes and types of data that it holds the healthcare industry is a prime target for cybercriminals.

So it's a little concerning that a new survey of healthcare staff from Kaspersky shows 32 percent of respondents in North America say that they have never received cybersecurity training from their workplace.

Continue reading

Thycotic launches automated solution for managing service accounts

Background security

Service accounts are specialized non-human accounts used by applications or other services to access data and network resources to perform specific tasks.

Because they tend to be set and then forgotten they often slip under the radar of conventional account management processes. Privileged access management specialist Thycotic is launching a new Account Lifecycle Manager to automate the management of these accounts.

Continue reading

Deception technology speeds up detection of attacks

Deception man woman

Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network.

New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in use compared to an average of 78 to 100 days for those not using the technology.

Continue reading

Over 3,800 data breaches reported in the first half of 2019

Data breach

2019 is on track to be another 'worst on record' year for data breaches according to a new report from Risk Based Security which finds the number of reported breaches has gone up by 54 percent and the number of exposed records by 52 percent compared to the first six months of 2018.

It shows 3,813 breaches have been reported in the first six months of 2019, exposing more than 4.1 billion records. Eight breaches alone have exposed over 3.2 billion records, 78.6 percent of the total, between them.

Continue reading

Executives believe AI will help businesses cope with changing environments

Artificial intelligence

A new study by management consultancy AT Kearney reveals that confidence is growing among C-suite executives that technology will help businesses navigate a complex and rapidly changing environment.

In an age of increasing automation and artificial intelligence (AI), leaders recognize the differentiating role of non-technical and interpersonal skills such as creativity and leadership -- skills that are not only difficult to find but also expected to become even more important. 42 percent for example say that creativity and innovation skills are hard to find.

Continue reading

60 percent of UK consumers not happy with their data being used for analytics

personal data

Customers are more worried than ever about the way their data is used and shared by companies, particularly for analytics, according to a new report.

The Customer State of Mind survey from data protection specialist Trūata shows 60 percent of UK customers are uneasy with companies using their personal data for analytics. Recent high-profile data leaks have also added to this negative perception of the way personal data is managed by brands.

Continue reading

Norman the Cryptominer uses sophisticated techniques to avoid discovery

cryptocurrency mining

Researchers at Varonis have released information on a new cryptominer variant, which the team has dubbed 'Norman', that uses various techniques to hide and avoid discovery.

Norman was discovered during investigations of an ongoing cryptomining infection that had spread to nearly every device at a midsize company.

Continue reading

Education is top target for cyberattacks

teacher and students

The education sector has become one of the most sought after targets for cybercriminals, according to the latest report from Malwarebytes Labs.

In the first half of 2019, the top three largest categories of threats identified among education institutions' devices are adware (43 percent), Trojans (25 percent) and backdoors (three percent). However, ransomware dropped to less than one percent in this period -- though it was higher both before and after the study.

Continue reading

Free VPN apps pose a privacy risk on both Android and iOS

VPN tiles

Both Apple and Google are allowing numerous potentially unsafe free VPN apps to remain in their app stores, despite being aware of privacy risks according to research from Top10VPN.com.

Among the string of serious privacy issues uncovered but not acted upon is the discovery that nearly 60 percent of the most popular free VPN apps are secretly Chinese-owned.

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.