Ian Barker

Illumio partners with BT to offer businesses micro segmentation


Zero trust and micro segmentation have gained in prominence in the past year as working patterns have shifted to a remote model. Illumio has announced that its micro-segmentation solution, Illumio Core, is to be made available as part of telecoms giant BT's portfolio of security solutions

Illumio Core provides application visibility, micro-segmentation, and control of all network communications across any data center, container, VM, or cloud environment. its micro-segmentation technology, delivered with BT Security’s support and services, enables a broad range of customers to prevent lateral movement and the spread of breaches within their networks.

Continue reading

Remote work is here to stay say business leaders

working from home

New research from mobile workforce specialist Motus shows that 67 percent of business leaders expect work-from-home policies to remain in place for the long-term or even permanently.

The report also shows businesses thriving in remote environments, with 83 percent of company leaders reporting the shift to remote work has been successful for their organization. This sentiment has increased 14 percent since June 2020 and reinforces the position among 68 percent of hiring managers that remote work is becoming easier as time goes on.

Continue reading

New authentication service spells the end for customer passwords


A new authentication service is completely password-free, needs no software or dedicated hardware on the customer's part and can be used across any channel or device.

Launched today by identity specialist Transmit Security, BindID allows users to authenticate and access their accounts using the embedded fingerprint or face scanner in their devices, or use their mobile device to securely and easily authenticate to other devices and channels that don't have an embedded biometric reader.

Continue reading

SaaS applications and what they mean for security management [Q&A]


The move to using SaaS applications has been accelerated by the pandemic, with many businesses turning to the cloud to enable their staff to work remotely.

But this raises new issues around keeping the business secure. We spoke to Shailesh Athalye, vice president of compliance at security and compliance platform Qualys to discover more about the issues and how to approach them.

Continue reading

Google funds two Linux kernel developers to focus on security

Linux kernel

Google and the Linux Foundation are prioritizing funds to underwrite two full-time maintainers for Linux kernel security development.

Gustavo Silva and Nathan Chancellor will focus on maintaining and improving kernel security and associated initiatives in order to ensure the world's most pervasive open source software project is sustainable for decades to come.

Continue reading

Enterprises at risk from malware delivered by cloud apps

Cloud risk

New research shows that the majority of all malware is now delivered via cloud applications, showing how attackers increasingly abuse popular cloud services to evade legacy security defenses, putting enterprise data at risk.

The report from Netskope reveals that 61 percent of all malware was delivered via a cloud app, up from 48 percent year-over-year.

Continue reading

How cybercrime has adapted to the pandemic

A new report from BlackBerry shows that as our digital habits have changed over the past year cybercriminals have become increasingly successful at finding and targeting vulnerable organizations.

The greater adoption of digital offerings has exposed companies to inadequate protections for employees and customers amongst an ever-growing and under-secured attack surface.

Continue reading

A quarter of people use work emails or passwords to login to other sites

Hacker typing username and password

Employees working from home on a company-provided computer are putting businesses at risk with one in four consumers admitting to using their work email or password to log in to consumer websites and apps such as food delivery, online shopping and even dating apps.

A new study from automation platform Ivanti surveyed 1,000 Americans working from home during the pandemic on a company-provided computer to examine how consumer and enterprise cybersecurity habits have changed.

Continue reading

New breed of cybercriminal breaches organizations then sells access

money exchange

Entrepreneurial cybercriminals are operating as middlemen by breaching as many companies as possible and then selling on access to the highest bidder rather than infiltrating systems themselves.

New research from Digital Shadows reveals that these 'Initial Access Brokers' are flourishing during the pandemic as employees increasingly log in to systems remotely.

Continue reading

Cloud misconfigurations take an average 25 days to fix

Weather cloud

On average it takes 25 days for companies to fix cloud infrastructure misconfigurations, according to a new report from cyber resilience specialist Accurics.

The research highlights security risks identified in cloud native environments. It shows that even organizations that establish a secure baseline when infrastructure is provisioned will experience 'drift' over time, when configuration changes occur in runtime, and these take an average of eight days to fix.

Continue reading

Final quarter of 2020 sees massive spike in ransomware

Ransomware sign

The last quarter of 2020 saw a 10,000 percent increase in ransomware activity according to a new report from managed security services provider Nuspire.

The company's latest Year in Review Threat Landscape Report -- sourced from its 90 billion traffic logs -- outlines new cybercriminal activity and tactics, techniques and procedures.

Continue reading

Why enterprises aren't properly addressing supply chain threats [Q&A]

supply chain

Supply chain threats like the recent SolarWinds attack are becoming more of a concern as businesses are more reliant on smoothly functioning links with suppliers and customers.

A successful attack can have a devastating effect on an organization and its reputation, but by their very nature these are not easy threats to deal with.

Continue reading

Executives' social media accounts put enterprises at risk

Executive social media

Information security often focuses on what's going on within the enterprise perimeter, but as businesses invest more in executive communication programs, there are risks which are sometimes overlooked.

According to a new survey from SafeGuard Cyber oversight of executive social media use is lacking, record-keeping is often manual, and the responsibility for risk management isn't clear.

Continue reading

New platform helps protect video conferencing sessions

video conference

As more work has moved online the security security issues surrounding collaboration and video conferencing applications have been thrown into the spotlight.

StrikeForce Technologies is launching a new desktop privacy protection suite called PrivacyLok, designed to address the problem by preventing unwanted applications from accessing sensitive data while protecting users from a range of threats.

Continue reading

60 percent of network resources expected to be at the edge by 2022

Networked computers

A new study from IDC and Limelight Networks predicts that by next year 60 percent of all network resources will be deployed at remote edge or service provider locations, up from just 20 percent in 2020.

The survey of 1,100 analysts worldwide shows 73 percent view edge as a strategic investment, while another 17 percent say it's required by business operations.

Continue reading

© 1998-2021 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.