Ubuntu Linux gets certified for secure and regulated workloads

secure payments lock

Canonical is announcing today that Ubuntu is set to drive high security and regulated workloads thanks to gaining a new FIPS (Federal Information Processing Standards) certification.

Now the world's most popular operating system across private and public clouds, Ubuntu has received the FIPS 140-2, Level 1 certification for its cryptographic modules in Ubuntu 20.04 LTS, including OpenSSL 1.1.1.

Continue reading

ExtraHop provides deep threat insights for hybrid cloud

cloud magnifier

The expansion of cloud use and remote working have made protecting business systems much more complicated, with simple perimeter controls no longer enough.

ExtraHop is launching updates to its Reveal(x) 360 cyber defense platform that provide deep forensic insight into hybrid cloud networks to allow for advanced threat response.

Continue reading

Trickle down of nation state attack tools may harm businesses

Attack button

A new study from HP Wolf Security shows that 72 percent of IT decision makers worry that nation state tools and techniques could filter through to the dark net and be used to attack their businesses.

The survey, of 1,100 decision makers around the world, also finds 58 percent are worried their business could become a direct target of a nation state attack. A further 70 percent believe they could end up being 'collateral damage' in a cyber war.

Continue reading

Attack volume increases as hackers go phishing for cryptocurrency

Bitcoin phishing theft

There has been a 22 percent increase in phishing volume in the first half of 2021 compared to the same period last year. Though there was a dip in June following record highs in May.

A report from digital risk protection company PhishLabs shows that the cryptocurrency sector saw a 10 times increase in attacks in the last quarter compared to the previous one.

Continue reading

Confidential data leaked online following Gigabyte attack

Dark web hacker

Earlier this month Taiwanese hardware maker Gigabyte confirmed that it was under ransomware attack from a hacker group calling itself RansomEXX.

Now researchers at CyberNews have discovered that confidential data apparently belonging to Gigabyte has been leaked on a hacker forum.

Continue reading

Why threat intelligence is key to the future of cybersecurity [Q&A]

Threat intelligence

As threats continue to evolve security vendors must keep up. This means having up to date information and being able to act on it quickly.

The key to this is effective threat intelligence. We spoke to Anuj Goel, co-founder and CEO of Cyware to find out more about threat intelligence and why sharing is key to making the most of it.

Continue reading

Why unintentional insider data leaks are still a problem for businesses [Q&A]

Insider threat

Whilst threats to data are often seen as being down to external actors, it's often the case that leaks, both intentional and otherwise, can come from insiders.

Unintentional or accidental leaks remain a major problem, and one that’s been made worse thanks to more home working. We spoke to Rajan Koo, SVP, engineering and cyber intelligence at DTEX Systems to learn more about this type of threat and how businesses can address it.

Continue reading

Data warehouses not delivering return on investment

Data warehouse technology concept

A report from Dremio, based on a study by Wakefield Research, shows only 22 percent of data leaders have fully realized their return on data warehouse investment in the past two years, with most (56 percent) having no consistent way of measuring it.

Another startling finding is that in order to run analytics, enterprises are making multiple copies of their data -- 12 on average -- with 60 percent reporting that their company has over 10 copies of their data floating around.

Continue reading

Half of cyberattacks are from repeat offenders

Attack button

Half of attacks on organizations that caused severe business disruption were by repeat offenders, according to a new study carried out by Ponemon for threat intelligence firm Team Cymru.

What's more, 61 percent of the victims of these attacks say they were unable to remediate these compromises, leaving critical systems and data at risk.

Continue reading

More than half of US adults lack confidence in government's ability to fight cyberattacks

Cyber attack

According to a new study from third-party ID risk specialist SecZetta 53 percent of respondents lack confidence in the strength of the US government’s infrastructure to protect the American people from cyberattacks.

Also 88 percent say organizations and government entities must have better data security systems in place to protect them from the increase in third-party remote attacks.

Continue reading

The challenges of securing Active Directory [Q&A]

security meter

As we saw in the recent SolarWinds attack, Active Directory can be exploited as a means of attacking corporate networks.

But why is AD such an attractive target? And why are companies struggling to secure it even though it's hardly a new technology? We spoke to Carolyn Crandall, chief security advocate at AttivoNetworks to find out.

Continue reading

SMB developers trust big cloud providers -- but not completely

cloud worry

A new survey for cloud computing company Linode, carried out by ClearPath Strategies, looks at how much developers trust their third-party cloud providers.

Based on responses from 800 developers at small and mid-sized businesses, it finds that while developers generally say they trust their provider of choice in general, deeper examination uncovers some issues when it comes to major cloud providers.

Continue reading

Norton snaps up Avast in $8 billion merger deal

avast-magnifying-glass

Following on from news of merger talks last month, NortonLifeLock has confirmed that it is buying Avast in a deal that values the Czech-based and London stock exchange listed firm at up to $8.6bn (£6.2bn).

In a joint statement the companies say that the combined business will serve more than 500 million cybersecurity customers, including around 40 million direct customers.

Continue reading

Businesses need to focus on the basics to defend against ransomware

Ransomware skull

A new whitepaper released today by O'Reilly and based on a survey of tech professionals experiences of ransomware concludes that basic security practices like backups are key to surviving an attack.

Of 950 respondents to the study only six percent had experienced a ransomware attack directly in the organization they work for and, by and large, these organizations have strong security measures in place.

Continue reading

Banks speed up their AI adoption to combat money laundering

AI money

A third of financial institutions are accelerating their AI and machine learning adoption for anti-money laundering (AML) technology in response to COVID-19.

Meanwhile, another 39 percent of compliance professionals say their AI/ML adoption plans will continue, despite the pandemic's disruption, this is according to a new study by analytics company SAS, consultancy KPMG and the Association of Certified Anti-Money Laundering Specialists (ACAMS).

Continue reading

Load More Articles