The wireless router is the number one technology US consumers can’t live without for more than day, according to managed services provider iQor.
A working router is necessary for consumers to enjoy smart devices and the connected lifestyle, including smart TVs and streaming devices, multiplayer gaming, tablets, voice controlled virtual assistants and smart speakers, IoT-enabled security systems, and more. According to the survey 64 percent of US adults say they couldn’t be without Wi-Fi for a day.
We all know cyber crime is a major problem, but just how big is its worldwide impact? A new report from McAfee and the Center for Strategic and International Studies (CSIS) reckons it costs businesses almost $600 billion a year or 0.8 percent of global GDP.
Global losses in 2014 were estimated at $445 billion and the report puts the increase down to criminals quickly adopting new technologies, the ease of engaging in cyber crime -- including an expanding number of cyber crime centers -- and the growing financial sophistication of top-tier criminals.
Organizations are facing an unprecedented variety of cyber risks that have the potential for devastating consequences, but a new study reveals that IT, security and compliance teams individually lack the resources to deal with them.
The study for communications compliance specialist Actiance and conducted by IDG Research finds enterprises moving towards a collaborative risk management model with increasing overlap between the different teams.
Robotic process automation is increasingly popular with businesses looking to streamline their operations and cut costs.
Specialist in this area Redwood Software is launching a new robotic process automation (RPA) platform that offers access to over 35,000 robotic tools for tasks like accounting, payroll, compliance, claims processing and more.
Analysis of the internet presence of 25 out of 50 top US banks reveals a worrying number of online security flaws.
Threat management company RiskIQ used its Digital Footprint product, which provides a real-time inventory of all internet-facing assets, including the components running on assets that may expose the organization to vulnerability risk. It also correlates newly discovered vulnerabilities with internet-exposed components and assets, highlighting those at risk to inform patching and remediation planning.
For enterprises to comply with GDPR it's vital that they have an understanding of where personal data is located in each of their systems.
Metadata discovery specialist Silwood Technology is releasing research into five of the largest and most widely used application packages to understand the scale of the challenge encountered by their customers when locating personal data.
According to Networking specialist Cisco, almost half of SMBs and enterprises in the US are outsourcing at least some of their security to managed security service providers (MSSPs) in order to counter the latest advanced threats.
The company is targeting this market by launching a set of new endpoint security solutions aimed specifically at MSSPs. These include three powerful cloud-based tools.
While Android ransomware is still growing, it's doing so at a slower rate than at its peak in 2016. However, it is using sneaky new techniques to trick users.
New findings from researchers at ESET reveal techniques like the misuse of Android's Accessibility services being used to infect devices. The most popular attack technique though remains screen-locking followed by a ransom demand. The most frequently detected variant being the Android/Locker family.
More than 20,000 new vulnerabilities were cataloged in 2017 according to breach analysis specialist Risk Based Security.
The figures from the company's own VulnDB eclipsed the total covered by MITRE's Common Vulnerability Enumeration (CVE) and the National Vulnerability Database (NVD) by more than 7,900.
While US government agencies are continuing to improve their security performance over time, the contractors they employ are failing to meet the same standards according to a new report.
The study by security rankings specialist BitSight sampled over 1,200 federal contractors and finds that the security rating for federal agencies was 15 or more points higher than the mean of any contractor sector.
As one of the major players in online advertising it might seem surprising that Google is introducing its own ad filtering feature to Chrome.
Partly though this is a fight back against the increasing use of ad blockers that block Google’s own ads and is aimed at the most annoying ad types like pop ups and autoplay videos. Internet marketing company TechWyse has put together an infographic explaining the thinking behind Google’s decision.
Malware seeking to steal processor time for crypto currency mining continues to be a problem, with 23 percent of organizations globally affected by a Coinhive variant in January.
These findings come from a study by Check Point which discovered three different variants of cryptomining malware in its top 10 most prevalent listing, with Coinhive ranking first.
With a wider threat landscape presented by cloud and digital transformation strategies, accurate and up to date threat intelligence is more important than ever to protect against attacks.
The dash to move data and applications to the cloud shows no signs of slowing down, but while the adoption of cloud solutions is up there are still major challenges.
A new report from cloud delivery specialist RightScale shows that 26 percent of enterprises (with more than 1,000 employees) are spending over $6 million a year on public cloud.