Ian Barker

US companies may need to provide GDPR rights to all, not just EU citizens

GDPR touchscreen

With GDPR implementation just over a week away, a report from US law firm Attorney.IO suggests that rights under the legislation may be available to others besides EU citizens.

Based on the answers 129 law professors gave to questions on the GDPR, it points out that GDPR doesn't just apply to citizens of an EU country. It applies to anyone who at any time set foot in an EU country and transmitted their data to a covered internet company.

Continue reading

How blockchain is set to change the world

Blockchain header

In most people's minds blockchain technology is associated with cryptocurrency, but it has potential to be useful in a whole range of other areas.

Consumer research company The Opinion Economy has produced an infographic to highlight the potential of blockchain in a whole range of areas.

Continue reading

Publicly disclosed vulnerabilities continue to rise

Attack route

The first quarter of 2018 has shown a 1.8 percent increase in the number of disclosed vulnerabilities over the same period in 2017, with 5,375 unique vulnerabilities reported.

This is one of the findings of Risk Based Security's latest Vulnerability QuickView Report, which suggests that unless the rate of increase slows down 2018 will be another record year.

Continue reading

UK Reported security incidents increase ahead of GDPR

Report button

When GDPR comes into force next week, organizations will have 72 hours to report security breaches to a regulator once they become aware of them.

Ahead of the new legislation, the UK's Information Commissioner's Office (ICO) has released details of the latest data security trends. Reported incidents in the final quarter of 2017 showed a 17 percent increase over the previous quarter, perhaps indicating that companies are taking a more proactive approach to reporting as GDPR approaches.

Continue reading

100 percent of organizations have active insider threats

insider threat

A new study from user behavior intelligence specialist Dtex Systems has uncovered active insider threats in all of the organizations it assessed.

Failure to gain visibility is allowing malicious and negligent employees to engage in undetected high-risk activities on every endpoint, on and off the network.

Continue reading

Push notification tool helps marketers engage with mobile users

mobile push notification

Mobile marketing and analytics specialist Flurry is launching a new push notification tool to help companies engage and retain users across Android and iOS platforms.

Flurry Push is a free offering within the new Flurry Marketing Suite that lets app developers send out targeted messages to grow business and build revenue.

Continue reading

Cryptomining malware targets unpatched servers

server vulnerability

Cybercriminals are increasingly targeting unpatched server vulnerabilities to infect machines with cryptomining malware, according to a new report.

The study from Check Point Software Technologies sees cryptomining malware dominate Check Point’s Top Ten Most Wanted Malware Index, the Coinhive variant retains the top spot with a global reach of 16 percent. Cryptoloot -- another crypto-mining malware -- is close behind with a global reach of 14 percent, while the Roughted malvertising malware came in third (11 percent).

Continue reading

Shadow devices put enterprise networks at risk

Shadow IT

A new study finds that enterprise networks have thousands of shadow personal devices including laptops, tablets and mobile phones, as well as Internet of Things devices -- such as digital assistants and smart kitchen appliances -- connecting to them.

The report from network control company Infoblox shows 35 percent of companies in the US, UK and Germany reported more than 5,000 personal devices connecting to the network each day.

Continue reading

CRM technology isn't keeping pace with business needs

CRM

CRM systems should make communication with customers easier, but a new report from ProsperWorks, the CRM tool for Google's G Suite, suggests CRM technology isn't keeping pace with the needs of the digital workforce.

ProsperWorks commissioned research firm Lab42 to conduct a survey on sales relationships and CRM pain points from those that frequently use CRM systems. The findings show that the way companies interact with customers is changing but CRM technology is too manual, hasn't evolved and is not focused enough on fostering relationships.

Continue reading

Mobile ad fraud almost doubles compared to 2017

mobile shield

A new report from mobile measurement company Adjust reveals that in the first quarter of this year mobile ad fraud nearly doubled over the same period in 2017.

Adjust measured 3.43 billion app installs and over 350 billion events, processing and analyzing 125 terabytes of data per day from 20,000+ apps over the first three months of 2018.

Continue reading

Companies can turn GDPR compliance into competitive advantage

GDPR touchscreen

GDPR comes into force on May 25th and will have an effect on all companies that collect user data even if they are outside the EU.

Independent identity research and strategy company One World Identity has produced a report that aims to serve as a definitive primer on what companies need to do to comply, and help them turn that compliance into a competitive edge.

Continue reading

Iran could launch cyber attacks in response to renewed sanctions

Iran flag

President Trump's re-imposition of sanctions against Iran could lead the country to respond by launching cyber attacks on Western businesses within months, according to a new report.

Threat intelligence company Recorded Future has today released new research and analysis into the Iranian cyber threat.

Continue reading

Most companies not putting adequate investment into application security

open digital lock

According to a new survey from Arxan, only 25 percent of respondents say their organization is making a significant investment in solutions to prevent application attacks.

This is despite awareness of the negative impact of malicious activity. A worrying 65 percent of companies say they would be spurred to increase application protection measures only after an end user or customer was negatively affected.

Continue reading

Data breach activity declines sharply in 2018

data breach

The number of data breaches disclosed in the first three months of this year fell to 686 compared to 1,444 breaches reported in the same period of 2017, according to a new report.

This still represents the exposure of some 1.4 billion records, although this figure too is down from 3.4 billion in the same quarter last year.

Continue reading

Younger generations lack understanding of cybersecurity careers

Red and blue security padlock

It's been accepted wisdom for some time that an injection of extra talent is needed to solve the cybersecurity skills shortage.

Further confirmation of this comes in the form of a report from ProtectWise looking at the survey responses of 524 technology-savvy millennials and post-millennials in the US, conducted by Enterprise Strategy Group (ESG), to see if there were potential answers to the security skills shortage.

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy.