Consumers want personalized experience but worry about sharing the data that drives it

digital marketing

European consumers want the personal touch in marketing communications, but are reluctant about sharing the data that enables it.

A new report, from customer engagement platform Twilo, shows 51 percent of European consumers say they will become repeat buyers after a good personalized experience, while 49 percent will tell a friend or family member, and 33 percent will become a member of the brand's loyalty program for deals and rewards.

Continue reading

Memory-based attacks increase as attackers dodge cloud defenses

Cloud network security

A new report shows a 1,400 percent increase in fileless or memory-based attacks, which exploit existing software, applications, and protocols to perform malicious activities against cloud-based systems.

The research from Aqua Security's Nautilus research team collected honeypot data over a six-month period and shows that more than 50 percent of the attacks focused on defense evasion.

Continue reading

Hacking and why it can be good for cybersecurity [Q&A]

Text sign showing Ethical Hacking.

Hacking tends to have something of a bad name, but there are many hackers who do good work, identifying flaws before they can be exploited in cyberattacks.

However, many of these people operate in the shadows for fear of being prosecuted for violating legislation. We talked to Laurie Mercer, director of sales engineering at security platform HackerOne, to discuss whether ethical hackers need to be more open about their activities in order to bring about change and how ethical hacking is making organizations safer.

Continue reading

Preparing the workforce for AI [Q&A]

Enterprise AI

Artificial intelligence isn't all that new, but recently the availability of tools like ChatGPT has catapulted it into the public consciousness. When it comes to introducing AI in the workplace though it's inevitable that some people will perceive it as a threat.

We talked to Khadim Batti, Whatfix CEO and co-founder, to discover how enterprise leaders can prepare their workforces for AI and overcome the challenges that it presents.

Continue reading

We're all techies now say enterprises

Enterprise technology

Three years on from the pandemic forcing businesses to digitize in a hurry, more and more enterprises now identify as 'tech companies.'

Research from product experience platform Pendo finds nearly 49 percent of 'traditional' enterprises in the UK now consider themselves as technology companies, and are adopting more 'tech-like' strategies, roles and tools to drive innovation and growth.

Continue reading

'Shadow AI' could lead to a wave of insider threats

Insider threat

Poor data controls and the advent of new generative AI tools based on Large Language Models (LLMs) will lead to a spike in insider data breaches over the coming year, says cybersecurity company Imperva.

As LLM-powered chatbots have become more powerful, many organizations have implemented complete bans or restricted what data can be shared with them. However, since an overwhelming majority (82 percent) have no insider risk management strategy in place, they remain blind to instances of employees using generative AI to help them with tasks.

Continue reading

Construction and transport are most targeted by cybercriminals

website-construction

The construction sector (with an average of 226 incidents annually) is the most targeted by cyber criminals closely followed by transport (167), wholesale trade (138), manufacturing (116) and retailers (105).

A new report from ReliaQuest, based on data from 35,000 incidents affecting its clients, shows the most detected attack technique is the attempted exploitation of exposed remote services, such as virtual private networks (VPNs) and remote desktop protocol (RDP).

Continue reading

Cybercriminals use AI to make malware less detectable

Malware shield

Cybercriminals are using AI-created malware that is adept at avoiding detection by traditional antivirus models, according to the latest report from Acronis.

The report also finds email attacks and ransomware cases have exploded relative to last year. Acronis-monitored endpoints are picking up valuable data about how cybercriminals operate and how some attacks have become more intelligent, sophisticated, and difficult to detect.

Continue reading

Dropbox introduces new AI-powered productivity features

1-dash-stacks-2560xauto

Cloud storage provider Dropbox is launching two new AI-powered productivity tools -- though they're not available to everyone just yet.

Dropbox Dash is a universal search that connects all of your tools, content, and apps in a single search bar to help you easily find what you need. There's also Dropbox AI, a new feature that lets customers quickly summarize and get information from their Dropbox files.

Continue reading

Attackers exploit the growing use of mobile devices

mobile-security

The growth in mobile device and app usage has created a growing attack surface, with 60 percent of global web traffic now coming from mobile devices. So it's not surprising that increasing numbers of cybercriminals and nation state actors want to exploit these areas of vulnerability.

The latest Global Mobile Threat Report from Zimperium finds that 80 percent of phishing sites now either specifically target mobile devices or are built to function on both mobile devices and desktops.

Continue reading

Proton Pass free password manager emerges from beta

PASS-imagedark-3-nologo

Although alternative technologies continue to make inroads, most of us are still heavily reliant on passwords to secure our digital identities.

Proton, the company behind Proton Mail, Proton VPN and other products, launched a new, free password manager called -- you'll have guessed already -- Proton Pass in beta a couple of months ago.

Continue reading

Why CSOs are prioritizing PKI infrastructure as they adapt to post-quantum cryptography [Q&A]

Blue of ring and gears with key lock inside

A growing number of machine identities leaves organizations with the task of managing increasingly complex PKI infrastructure.

We spoke to Chris Hickman, CSO of Keyfactor, about how organizations can go about reducing PKI complexity as well as other trends to keep in mind as they adapt to an era of post-quantum cryptography.

Continue reading

Majority are worried about the safety and accuracy of ChatGPT

ChatGPT

As generative AI tools continue to make the news there are growing concerns over safety and security as well as the accuracy of information produced.

Most people don't trust ChatGPT and have worries about its security and safety according to a new survey from Malwarebytes. The research shows that 81 percent are concerned about security and safety risks.

Continue reading

DDoS attacks more than doubled in 2022

DDoS attacks

New research from Nexusguard shows that last year DDoS attacks worldwide increased by 115.1 percent over the 2021 level.

Attackers have also continued to alter their threat vectors by targeting the application platforms, online databases, and cloud-based storage systems within Internet Service Providers (ISPs). This has resulted in a significantly greater impact globally as organizations continue to move more of their workloads to the cloud.

Continue reading

Enterprise SIEMs miss 76 percent of attack techniques

Attack route

Security information and event management systems (SIEMs) are missing detections for 76 percent of MITRE ATT&CK techniques that adversaries use to breach their environments, according to a new report.

Produced by CardinalOps, the study analyzes real-world data from production SIEMs -- including Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic -- covering more than 4,000 detection rules, nearly one million log sources, and hundreds of unique log source types.

Continue reading

Load More Articles