Ian Barker

European information security execs face major challenge from insider threats

Insider threat

New research shows that 35 percent of employees across the UK, France, Germany and Italy admit to have been involved in a security breach.

This presents CISOs with a significant challenge when it comes to protecting company data, particularly in light of the forthcoming European General Data Protection Regulation (GDPR) which comes into effect in early 2018.

Continue reading

How consumers are using AI and how they see its future

artificial intelligence

AI is starting to worm its way into our homes and workplaces, but a new study reveals that many consumers are currently unaware of the role it already plays in their lives.

The survey of almost 2,000 US consumers by predictive sales platform InsideSales.com shows that in both their personal and work lives, people are split in their use of AI. Outside the office, more than half (55 percent) report that they have used AI before, but only about 10 percent can be considered early adopters, using AI on a regular basis.

Continue reading

Three-quarters of organizations not confident in dealing with SSL-based attacks

steal-data-binary-hand

Despite 39 percent of businesses suffering an SSL-based attack in 2016, only 25 percent feel confident in their ability to deal with one according to a new study.

The report from cyber security company Radware shows that cyber attacks are becoming the norm, with 98 percent of organizations experiencing some form of attack in 2016.

Continue reading

Uncovering the cost and profitability of DDoS attacks

DDoS keyboard

DDoS attacks are a popular cyber criminal technique, used either to cause a distraction for a different crime or demand a ransom for calling off or not launching an attack.

New research from Kaspersky Lab reveals how profitable this activity can be. Researchers studied the DDoS services on offer on the black market and looked at how far the illegal business has advanced, as well as the extent of its popularity and profitability.

Continue reading

New generation of cyber highwaymen could threaten parcel drones

ParcelHero pirate drone

Robbing the mail has a long and dishonorable history dating back to the days of the stagecoach. But UK-based online parcel broker ParcelHero is warning that automated delivery drones and droids could see the rise of a new breed of high-tech highwaymen.

The development of devices that alter the drone or droid's instructions, or simply stop them dead, is seen as inevitable. With UK online retail sales now worth more than £130 billion a year, if deliveries are to become largely automated and just one percent of items are waylaid using new technology, that's over £1bn of goods stolen a year.

Continue reading

New platform protects industrial IoT devices

Internet of Things

Internet of Things devices are the latest threat vector that businesses have to deal with, introducing a potential extra weakness into corporate networks and leading experts to warn of increased risk.

To help guard against the threat, Mocana Corporation is introducing a new security platform designed to protect IoT devices and associated device-to-cloud communications.

Continue reading

71 percent of Android phones on major US carriers have out of date security patches

Android logo phone

Slow patching of security flaws is leaving many US mobile users at risk of falling victim to data breaches according to the findings of a new report.

The study from mobile defense specialist Skycure analyzed patch updates among the five leading wireless carriers in the US and finds that 71 percent of mobile devices still run on security patches more than two months old.

Continue reading

Malware campaign targets users in Latin America

malware

A modified version of a threat that first appeared in 2014 is successfully targeting users in Latin America according to the SPEAR research team at threat prevention specialist Cylance.

Attackers using the El Machete malware -- first identified by Kaspersky -- have moved to new C2 (command and control) infrastructure, based largely around dynamic DNS domains, in addition to making some minimal changes to the malware in order to evade signature-based detection.

Continue reading

How the best companies avoid downtime costs

Sungard DR header

On average downtime costs an enterprise $686,000 per hour, leading to lost revenue across the economy of more than $26 billion.

Hosting and disaster recovery specialist Sungard Availability Services has put together an infographic looking at the threat of downtime and how the best companies are better placed to deal with it.

Continue reading

The hidden impact of DNS on internet users

DNS

According to a new report, 92 percent of UK companies have limited visibility into the impact DNS performance is having on their internet users and visitors to their online resources.

The study by cyber security company Neustar and research firm Quocirca shows that although DNS is a fundamental utility supporting the internet, and relied on by all businesses, visibility is hampered by complexity with 45 percent of organizations having as many as eight different ways of provisioning their DNS infrastructure.

Continue reading

DevOps adoption changes approach to application security

cyber security

New research from software supply chain automation company Sonatype reveals that the adoption of DevOps is leading businesses to adopt a different approach to security.

The survey shows that mature development organizations are ensuring automated security is woven into their DevOps practice, early. But the results reveal that IT organizations continue to struggle with breaches as a nearly 50 percent increase was recorded between Sonatype's 2014 and 2017 surveys.

Continue reading

Jamf gives admins zero day support for the latest Apple OS releases

applelogoinhand

New releases always present a challenge for system admins and that applies to Apple just as much as other systems.

Device management specialist Jamf is offering zero day support for the latest spring releases of iOS (10.3), macOS (10.12.4), and tvOS (10.2).

Continue reading

Organizations remain vulnerable to brute force attacks

hammer

Gaining access to accounts is often done the old-fashioned way, using brute force guesses, but a new report reveals that many devices and accounts still have default usernames and passwords.

The study from visibility and testing company Ixia shows the top five username guesses as root, admin, ubnt, support, and user -- ubnt being the default username for AWS and other cloud services based on Ubuntu.

Continue reading

Archiving partnership aids financial services compliance

Archive

For the financial services industry, compliance is a major issue as there's a need to archive communication from many different sources.

To provide a solution to the industry's unique demands, financial services software specialist IPC Systems has announced a collaboration with communications compliance and archiving company Actiance. This will use Actiance's Alcatraz solution to offer IPC's financial services customers a holistic archival solution across a range of digital communications, including voice.

Continue reading

Microsoft Teams vs Slack -- how do they compare?

Teams v slack header

Last week Microsoft rolled out its Teams collaboration app to Office 365 users. Teams has been widely billed as a competitor for Slack, but how do the two big players in this space measure up against each other?

Internet marketing company TechWyse has put together an infographic giving an easy-to-follow overview of how the features of Teams and Slack compare. Slack is the more expensive option for paid users, but it does offer a Freemium model which Teams lacks.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.