Is this the right time to look for a job in crypto? [Q&A]

Cryptocurrency coins

The cryptocurrency markets have been going through a hard time of late with a bear market and big swings in value. So is now the time to apply for a crypto job?

Crypto technology isn't going away, and many more companies are getting involved. We spoke to Bijan Shahrokhi, fintech expert and creator of Product Management Exercises, to find out whether this is a good time to apply for a job in crypto and how to improve your chances of getting one.

Continue reading

Women feel discouraged from pursuing tech careers

woman tech outsider

According to a new report 67 percent of women say they have experienced discouragement or setbacks while pursuing a career in technology.

The global study from managed service provider Ensono also reveals 45 percent have faced discouragement in pursuing a STEAM career in high school or earlier. 44 percent report feeling as if the career path is male-dominated and 36 percent being told the career path is too challenging for women.

Continue reading

Why the time is right for passwordless authentication [Q&A]

web authentication

Although the death of passwords has been predicted for a long time, the move to other forms of authentication has until recently been glacially slow.

The shift to remote working driven by the pandemic has increased interest in securing wider networks and that has put passwordless authentication into the spotlight. We spoke to Tom Bridge, principal product manager at JumpCloud, to find out more about the technology and the benefits it offers.

Continue reading

Vendor fraud techniques used to bypass Office 365 security

Malicious email

Financial fraud email attacks are increasing year-on-year at 73 percent, with 44 percent of these representing sophisticated, targeted attacks such as wire, invoice, or vendor fraud, according to a new report from Armorblox.

The research has uncovered two vendor fraud attacks targeting approximately 4,000 inboxes each. In these the attackers used 'Look-alike Domain' attack techniques to bypass Microsoft Office 365 email security and impersonate trusted vendors with emails that looked like legitimate requests for payments.

Continue reading

Enterprises change their backup approach to deal with cloud risks

Backup key

Companies are increasingly recognizing the increasing need to protect their SaaS environments, with almost 90 percent of Microsoft 365 customers now using supplemental measures rather than relying solely on built-in recovery capabilities.

The latest study from data protection specialist Veeam finds 98 percent of organizations use a cloud-hosted infrastructure like Backup-as-a-Service or Disaster Recovery-as-a-Service as part of their data protection strategy.

Continue reading

Automated threats responsible for 62 percent of eCommerce security incidents

Christmas robot

Automated threats, ranging from account takeover, credit card fraud, web scraping, API abuses, Grinch bots, and DDoS attacks, are a persistent challenge for the eCommerce industry, according to a new report.

Cybersecurity company Imperva has conducted a 12-month analysis of threats targeting the retail industry. A continued barrage of attacks on retailers’ websites, applications, and APIs throughout the year and during peak holiday shopping times is a continued business risk for the retail industry.

Continue reading

Metaverse? Meh!

Bored gamer

A large majority of consumers in the UK say they have never heard of or are bored by Web3 (89 percent) and the Metaverse (84 percent), according to a new study.

Research from digital agency Studio Graphene surveyed 2,000 UK adults and finds technologies that hit the market more than a decade ago have high levels of consumer understanding and use, but this drops off sharply when looking at more recent innovations.

Continue reading

ID fraud levels still high despite post-pandemic drop

identity theft mask

A Freedom of Information request by identity verification company ID-Pal reveals that complaints to the Financial Ombudsman Service in the UK regarding identity fraud soared over the COVID-19 pandemic, finishing 2020 at 44 percent higher than 2019.

Even as the pandemic came to an end numbers in 2021 were still over 18 percent higher than pre-pandemic levels in 2019. Figures so far this year suggest that if identity fraud continues at the same pace, 2022 will see a 10 percent increase in complaints compared to 2021.

Continue reading

HP uses virtual machine technology to secure sensitive data

Laptop security

Privileged data and credentials are prime targets for attackers. Protecting this information is a challenge, particularly as systems have moved to the cloud and networks have become more diverse.

Larger organizations have often turned to things like privileged access workstations, but that means that access can only be made from a limited number of machines. HP Wolf Security has launched a new Sure Access Enterprise (SAE) product to protect users with rights to access sensitive data, systems, and applications but allow them to use a normal endpoint.

Continue reading

How digital IDs are set to shake up the way we access services [Q&A]

Digital eye

Around the world governments are increasingly keen on introducing digital identity systems for their citizens. These are seen as a secure way for people to access government and other services as these move online.

We spoke with Philipp Pointner, chief of digital identity at Jumio, to find out more about digital ID and its implications for security and privacy.

Continue reading

Alternative authentication methods take hold in response to digital dangers

two-factor authentication 2fa

As global problems spill over into the digital realm and hybrid working has taken hold, businesses are increasingly looking beyond the password in order to secure accounts.

The latest Trusted Access Report from Cisco company Duo shows a 50 percent increase in the percentage of accounts allowing WebAuthn passwordless authentication and a fivefold increase in WebAuthn usage since April 2019.

Continue reading

IT outages cost over $12,000 a minute

Technical Difficulties message on a black keyboard

The average cost of an IT Outage is $12,913 per minute according to a new report from AIOps automation specialist BigPanda.

Produced in conjunction with Enterprise Management Associates (EMA), the report also finds a correlation between IT outage costs and the size of an organization, as businesses with more than 20,000 employees lose an average of $25,402 per minute due to outages, translating to more than $1.5 million per hour.

Continue reading

Nudge, nudge, block no more...

Bossy Woman

Why do people try to circumvent security controls -- for example to access an unapproved SaaS application or cloud service?

New research from Nudge Security suggests it may simply be down to poor user experience of the security process. "We now have evidence to suggest that improving the employee experience of security can actually lead to better security outcomes," says Russell Spitler, CEO and co-founder of Nudge Security.

Continue reading

Enterprises urged to be transparent about employee monitoring

employee snoop

With larger numbers of people working remotely, employers are keen to understand the effect this has on productivity. They're using technology like facial recognition and other tools to monitor the use of apps and gather other information.

However, software adoption platform Pendo is calling on companies to be more transparent with employees about what they do and don’t monitor, and why.

Continue reading

What popular culture gets wrong about hacking [Q&A]

hacker

It's safe to say that Hollywood and pop culture have not always been kind to the tech and cybersecurity industry.

Throughout the years, movies and TV shows have established a stereotype of how IT and security experts should look, with one of the biggest stereotypes being the representation of a hacker.

Continue reading

Load More Articles