Meeting the challenge of protecting data in a changing world [Q&A]

data protection

As a report last year showed, the change to working habits over the last few years has gone hand-in-hand with a rise in the theft of data.

We spoke to Cyberhaven CSO, Chris Hodson, to find out how enterprise CISOs can meet this challenge and keep their data safe.

Continue reading

Only 18 percent of staff think hybrid working has improved productivity

Home worker in pajamas

New research, from UK-based IT consultancy and services provider Doherty Associates, finds that only 18 percent of workers in two key sectors think that hybrid working has substantially improved productivity.

The survey of 889 employees working in the UK capital markets and legal industries looked to uncover how the working-from-home revolution and subsequent technological adoption have impacted productivity.

Continue reading

Smart communities and how they're changing the world [Q&A]

smart city

Smart communities and smart cities are set to deliver a number of benefits, including environmental sustainability, reducing the digital divide, and improving people's lives with smarter, personalized and more intuitive services and experiences.

But making them work involves a good deal of technology such as 5G, small cells and distributed antenna systems (DAS), as well as needing partnerships between governments and businesses. We spoke to Brendan O'Reilly, group chief technology officer at BAI Communications to find out more about smart communities and what makes them work.

Continue reading

New product helps find threats hidden in graymail

Email overload

'Graymail' refers to those emails that aren't quite spam but which aren't necessarily all that helpful either. Think things like newsletters, announcements, or advertisements that you may have opted into in the past but which have outlived their usefulness.

It presents a headache for security teams as it can be hard to distinguish from malicious content like reconnaissance attacks. Armorblox is launching a new product aimed at cutting the time security teams spend managing graymail and mitigating the security risks from malicious recon attacks.

Continue reading

Vulnerability management made harder by complex supply chains

Complex Maze

New research reveals that CISOs are finding it increasingly difficult to keep their software secure as hybrid and multicloud environments become more complex, and teams continue to rely on manual processes that make it easier for vulnerabilities to slip into production.

The study from Dynatrace shows 68 percent of CISOs say vulnerability management is more difficult because the complexity of their software supply chain and cloud ecosystem has increased.

Continue reading

Ubuntu 23.04 Lunar Lobster makes for easier enterprise deployment

Ubuntu Lunar Lobster

From today, Ubuntu 23.04 (Lunar Lobster) will be available for download, publisher Canonical has announced. The release marks a significant step forward for enterprise deployment and customization.

A unified Ubuntu server and desktop installation engine, Subiquity, supports the same autoinstall configuration workflows for both desktops and servers, making life easier for admins. The Ubuntu 23.04 installer has a refreshed user interface with a modern but familiar first-time user experience, along with new enterprise management capabilities.

Continue reading

Number of ransomware victims increases by 25 percent

ransomware laptop

A new report based on publicly available resources finds a 25 percent increase in ransomware victims from Q4 2022 and a 27 percent increase compared to Q1 of the same year.

The study from GuidePoint Security's Research and Intelligence Team (GRIT) tracked 849 total publicly posted ransomware victims claimed by 29 different threat groups in the first quarter of this year.

Continue reading

Record number of software security flaws uncovered in 2022

server vulnerability unlock

A record 26,448 software security flaws were reported by CISA last year, with the number of critical vulnerabilities (CVEs) up 59 percent from 2021 at 4,135.

The 2023 Annual Threat Intelligence Report, from the Deepwatch Adversary Tactics and Intelligence (ATI) team, also shows that the conflict between Ukraine and Russia has unleashed a flurry of amateur and state-sponsored attacks and breaches on organizations and critical infrastructure.

Continue reading

Microsoft and Talon launch enterprise-grade ChatGPT

Workplace

Enterprise browser specialist Talon Cyber Security has announced that it has integrated its secure enterprise browser with the Microsoft Azure OpenAI Service to provide enterprise-grade ChatGPT access to customers.

This allows organizations to maintain data protection, keeping data put into ChatGPT within their perimeter and preventing it from transferring to third-party services. When using ChatGPT in Azure OpenAI Service, the organization uses its own Azure resources, so sensitive data is not delivered to other locations, improving data security and reducing risk.

Continue reading

New tool makes it easier to manage machine identities

code software developer development

Thanks to increased cloud and container use there's a growing demand for machine identities, but delivering and managing those identities can present problems.

Machine ID specialist Venafi is launching a new tool called Firefly that enables security teams to easily and securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally and quickly across any environment.

Continue reading

Misconfigurations leave internet-facing servers open to attack

Business database

Issues with server configuration remain a major problem. Researchers at Censys have identified over 8,000 hosts on the internet misconfigured to expose open directories.

These directories contain potentially sensitive data, such as database information, backup files, passwords, Excel worksheets, environment variables, and even some SSL and SSH private keys. Exposure of these types of data in such an accessible manner can offer threat actors an easy way into an organization's network.

Continue reading

What if cloud data was stored on floppy disks?

Floppy disk box

In 2020 alone, 61 percent of businesses migrated their workloads to the cloud, with 48 percent actively choosing to store their most important data in the cloud.

But because cloud storage is out of sight it can sometimes be difficult to understand just how much data there is stored out there.

Continue reading

How enterprises can stay ahead of risks, threats and potential attacks [Q&A]

Risk dial

Businesses are engaged in a constant cat-and-mouse game with hackers, attackers, and bad actors in order to stay secure.

Dominic Lombardi, VP of security and trust at Kandji believes that in order to stay ahead it's necessary to master basic IT and security hygiene, update and communicate your risk register, and work steadily toward a zero-trust security model. We spoke to him to discover more.

Continue reading

Ransomware attacks can cost enterprises up to 30 percent of operating income

Business man with suitcase full of money

The financial impact of a ransomware attack can cost businesses up to 30 percent of their operating income, with smaller enterprises hit proportionally harder.

A new report from ThreatConnect looks at the financial impact of ransomware attacks on small ($500M), medium ($1.5B) and large ($15B) organizations within healthcare, manufacturing, and utilities.

Continue reading

Enterprises plan to increase cloud service investment as part of network transformation

Cloud money

In a drive for network transformation, 98 percent of enterprise IT leaders say they plan to increase their dependence and investment in cloud services.

The latest Enterprise Network Transformation report from SASE solutions company Aryaka finds that although an uncertain economy is impacting network and security team investments CIOs, CISOs and IT leaders are doubling down on investment in the cloud.

Continue reading

Load More Articles