Ian Barker

Cloud-based security service offers web app and API protection

Intelligent APIs

Web app and API exploits are among the leading threats to business at the moment. Organizations with a major web presence face malicious traffic and sophisticated bots trying to damage their brands.

In order to protect against these threats, Instart is launching a new Web App and API Protection (WAAP) platform. This is a cloud-based platform, powered by a single rules engine and a unified threat intelligence system, to defend against application vulnerabilities, sophisticated bots, and browser-based attacks.

Continue reading

Parents' lack of cybersecurity knowledge holds back children's career choices

Man shrugging shoulders

The majority of UK parents are in the dark when it comes to advising their children on a career in cybersecurity, research from cybersecurity training provider, SANS Institute, shows.

Although IT remains one of the top choices of career that parents would make for their children, parents have very little idea about the lucrative area of cybersecurity. This is exacerbating the skills gap in cyber security that the UK is currently facing -- with the industry not doing enough to promote itself.

Continue reading

Artificial intelligence -- for good or evil?

AI security

AI is popping up in all sorts of things at the moment, but what happens when it goes wrong or is used for questionable purposes?

A new report from Malwarebytes Labs looks at how AI is being used, with a particular emphasis on cybersecurity, and at the concerns that are growing surrounding its use.

Continue reading

Linux Mint vs Windows 10 -- which is best for small business productivity?

Business speed

If you're using an old computer in your small business, the likelihood is that you don't have a great deal of money to splash on powerful hardware.

You might therefore be tempted to look for extra performance by using Linux -- and save on the cost of buying the OS into the bargain. But is there really that much of an advantage? James Mawson of Australian site DXM Tech Support has conducted a series of tests to find out.

Continue reading

Security assurance needs a business-focused approach

security meter

Business leaders want to be confident that their operations will continue running as normal without information being compromised. But in today’s fast-moving, interconnected world where the threat landscape is constantly evolving, security assurance programs often provide a false level of confidence.

The Information Security Forum (ISF) is releasing a new report, Establishing a Business-Focused Security Assurance Program which explores how individuals responsible for providing security assurance in their organization can meet the specific needs of business stakeholders.

Continue reading

New platform brings together technologies to improve enterprise cybersecurity

business security

Cybersecurity tools are often designed to work in isolation from each other and that can leave enterprise security operations fragmented as well as difficult and expensive to manage.

A new integrated platform called GreyMatter from ReliaQuest, launched today, aims to bring together technologies, processes and teams to provide greater visibility and control over enterprise security operations.

Continue reading

The impact of data privacy on the healthcare industry

Healthcare data

Healthcare companies are constantly consuming and sharing information to build better patient profiles and improve outcomes. Yet a new report reveals that only 70 percent are very or extremely confident in knowing exactly where their sensitive data is.

The study from data privacy specialist Integris shows that of these 50 percent update their inventory of personal data once a year or less, and a mere 17 percent of respondents are able to access sensitive data across five common data source types.

Continue reading

The biggest data breaches of the last 15 years

hosting tribunal breaches header

We've become pretty well accustomed to large scale data breaches over recent years. But that doesn’t mean that the numbers involved aren't still significant.

Web hosting comparison site HostingTribunal has put together an infographic looking at the 15 biggest breaches of the last 15 years.

Continue reading

Humans are still the weakest link in information security

web threats

According to a new report, more than half of all C-suite executives (53 percent) and 28 percent of small business owners who suffered a data breach say that human error or accidental loss by an external vendor/source was the cause.

The annual data protection report from information security service Shred-It also finds 21 percent of executives and 28 percent of small business owners admit deliberate theft or sabotage by an employee/insider was the cause of the data breach.

Continue reading

Organizations urged to patch for BlueKeep as latest malware charts are revealed

malware alert

Check Point Research, has released its Global Threat Index for May 2019 and is warning organizations to check and patch for the BlueKeep Microsoft RDP flaw in Windows 7 and Windows Server 2008 machines, to prevent the risk of it being exploited for ransomware and cryptomining attacks.

BlueKeep affects nearly a million machines accessible to the public internet and many more within organizations' networks. The vulnerability is critical because it requires no user interaction in order to be exploited. RDP is already an established, popular attack vector which has been used to install ransomware.

Continue reading

Computer downtime is biggest workplace irritant


Computer downtime ranks as the most significant irritant in the workplace according to a new survey.

The study of employees at 500 UK businesses carried out by YouGov for Cherwell Software finds 41 percent naming downtime, ahead of forgotten passwords (23 percent), the lack of parking spaces (22 percent) or stolen meeting rooms (15 percent).

Continue reading

Security startup aims to provide better visibility into the cloud

cloud magnifier

As businesses move more of their systems to the cloud to drive digital transformation and gain a competitive edge, IT security teams can struggle to retain the ability to secure data and manage risk.

Israeli startup Orca Security is announcing its Cloud Visibility Platform which uses patent-pending SideScanning technology to deliver comprehensive visibility into the security posture of an organization's cloud footprint in a matter of minutes.

Continue reading

New API network adapters allow for greater automation


Among the top networking challenges for enterprises are lack of skills, fragmented management tools and lack of end-to-end network visibility.

Network automation specialist Itential is launching new purpose-built API adapters for Cisco systems that offer support for third party management tools and provide enterprises and service providers with a single network API that simplifies integration and enables end-to-end automation across complex, multi-domain and multi-vendor environments.

Continue reading

LastPass Business brings single sign-on to over 1200 apps

Login key

Hundreds of cloud applications are being used in businesses and IT teams are pressured to achieve high levels of security without introducing complex authentication processes that may reduce workforce productivity.

LogMeIn, developer of the LastPass password management program is launching a new suite of LastPass Business solutions delivering a comprehensive identity offering, built for small and medium sized businesses.

Continue reading

New enterprise platform secures digital assets in transit

Crypto currency

Last month $40 million worth of Bitcoin was stolen in the Binance hack and it's estimated that more than $3 billion has been stolen over the last 18 months due to key theft and stolen credentials.

In order to guard against this type of theft, new company Fireblocks is launching an enterprise platform to protect crypto currency and other digital assets in transit.

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.