Ian Barker

The biggest data breaches of the last 15 years

hosting tribunal breaches header

We've become pretty well accustomed to large scale data breaches over recent years. But that doesn’t mean that the numbers involved aren't still significant.

Web hosting comparison site HostingTribunal has put together an infographic looking at the 15 biggest breaches of the last 15 years.

Continue reading

Humans are still the weakest link in information security

web threats

According to a new report, more than half of all C-suite executives (53 percent) and 28 percent of small business owners who suffered a data breach say that human error or accidental loss by an external vendor/source was the cause.

The annual data protection report from information security service Shred-It also finds 21 percent of executives and 28 percent of small business owners admit deliberate theft or sabotage by an employee/insider was the cause of the data breach.

Continue reading

Organizations urged to patch for BlueKeep as latest malware charts are revealed

malware alert

Check Point Research, has released its Global Threat Index for May 2019 and is warning organizations to check and patch for the BlueKeep Microsoft RDP flaw in Windows 7 and Windows Server 2008 machines, to prevent the risk of it being exploited for ransomware and cryptomining attacks.

BlueKeep affects nearly a million machines accessible to the public internet and many more within organizations' networks. The vulnerability is critical because it requires no user interaction in order to be exploited. RDP is already an established, popular attack vector which has been used to install ransomware.

Continue reading

Computer downtime is biggest workplace irritant

frustrated

Computer downtime ranks as the most significant irritant in the workplace according to a new survey.

The study of employees at 500 UK businesses carried out by YouGov for Cherwell Software finds 41 percent naming downtime, ahead of forgotten passwords (23 percent), the lack of parking spaces (22 percent) or stolen meeting rooms (15 percent).

Continue reading

Security startup aims to provide better visibility into the cloud

cloud magnifier

As businesses move more of their systems to the cloud to drive digital transformation and gain a competitive edge, IT security teams can struggle to retain the ability to secure data and manage risk.

Israeli startup Orca Security is announcing its Cloud Visibility Platform which uses patent-pending SideScanning technology to deliver comprehensive visibility into the security posture of an organization's cloud footprint in a matter of minutes.

Continue reading

New API network adapters allow for greater automation

network

Among the top networking challenges for enterprises are lack of skills, fragmented management tools and lack of end-to-end network visibility.

Network automation specialist Itential is launching new purpose-built API adapters for Cisco systems that offer support for third party management tools and provide enterprises and service providers with a single network API that simplifies integration and enables end-to-end automation across complex, multi-domain and multi-vendor environments.

Continue reading

LastPass Business brings single sign-on to over 1200 apps

Login key

Hundreds of cloud applications are being used in businesses and IT teams are pressured to achieve high levels of security without introducing complex authentication processes that may reduce workforce productivity.

LogMeIn, developer of the LastPass password management program is launching a new suite of LastPass Business solutions delivering a comprehensive identity offering, built for small and medium sized businesses.

Continue reading

New enterprise platform secures digital assets in transit

Crypto currency

Last month $40 million worth of Bitcoin was stolen in the Binance hack and it's estimated that more than $3 billion has been stolen over the last 18 months due to key theft and stolen credentials.

In order to guard against this type of theft, new company Fireblocks is launching an enterprise platform to protect crypto currency and other digital assets in transit.

Continue reading

Over three billion fake emails sent out daily

Email attack

At least 3.4 billion fake emails are sent around the world every day, according to a new report from email verification company Valimail, with the majority of suspicious emails coming from US-based sources.

The report shows that email impersonation -- accounting for 1.2 percent of all email sent in the first quarter of 2019 -- is a phishing attacker's primary weapon to gain access into an organization's network, systems, intellectual property and other sensitive assets.

Continue reading

Wi-Fi past, present and future

Wi-Fi

Wireless networking is something we've come to take for granted in recent years. ISPs often give away a wireless router when you sign up for an internet connection with the consequence that Wi-Fi is now in most homes.

Networking specialist Netgear has produced an infographic looking at the origins of Wi-Fi, how it's developed and where it’s going in future.

Continue reading

Want someone's personal data? Give them a free donut

Donut

While you might expect Homer Simpson to hand over personal details in exchange for a donut, you wouldn't expect cybersecurity professionals to do the same.

However, technology services provider Probrand has carried out a study at a cyber expo attended by UK security professionals, where attendees voluntarily shared sensitive data including their name, date of birth and favourite football team -- all to get their hands on a free donut.

Continue reading

Biggest hindrance to enterprise network visibility is lack of IT staff

Tech suport

Network performance monitoring specialist AppNeta has released its 2019 State of Enterprise IT Report, which finds that as enterprise IT deals with fundamental changes networking infrastructure teams are being stretched to the limit.

The biggest hindrances to network visibility are seen as lack of IT staff (25.6 percent), poor network management tools, (24.8 percent) and lack of visibility into app delivery paths (24.7 percent).

Continue reading

Dark net malware becomes more targeted

hacker laptop

The dark net has become a haven for custom-built, targeted malware, with threats tailored to specific industries or organizations outnumbering off-the-shelf varieties by two to one, according to a new study.

The research from application containment company Bromium also finds four in 10 dark net vendors are selling targeted hacking services aimed at FTSE 100 and Fortune 500 businesses.

Continue reading

SecureAuth enhances identity management with intelligent cloud service

identity login

Secure identity company SecureAuth is launching enhancements to its solution with the announcement of Intelligent Identity Cloud.

This gives CISOs and IT professionals the ability to deploy the same capabilities in the cloud, on-premises, or as a hybrid of the two, addressing business demands of agility and dramatically improving identity security.

Continue reading

Microsoft and Oracle connect their clouds

cloud link

Two of the giants of enterprise cloud technology have today announced a cloud interoperability partnership, enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.

Enterprises can now seamlessly connect Azure services, like Analytics and AI, to Oracle Cloud services, like Autonomous Database. By enabling customers to run one part of a workload within Azure and another part of the same workload within the Oracle Cloud, the partnership delivers a highly optimised, best-of-both-clouds experience.

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.