Ian Barker

Cyber attacks on council workers increase over 200 percent

Local councils have faced the same pressure as commercial businesses to have people working at home during the pandemic. But a new report shows attacks on UK councils' remote workers rose by 213 percent from March 2020 compared to the previous year.

Freedom of Information (FOI) requests made by technology solutions provider Insight, show that on average councils switched 74 percent of their employees -- more than double the UK average -- to remote working during the pandemic.

Continue reading

How streaming can help developers improve their handling of data [Q&A]

Data is increasingly important to companies, but making effective use of it presents a number of challenges.

NoSQL database company DataStax has recently launched its new Astra Streaming service. Based on Apache Pulsar this aims to make it easier for developers who want to run their application streaming alongside their database instances like Cassandra.

Continue reading

36 percent of organizations have suffered a serious cloud breach in the last year

cloud lock

A new survey of 300 cloud professionals finds that 36 percent of organizations have suffered a serious cloud security data leak or a breach in the past 12 months.

The study conducted by security and compliance automation firm Fugue and developer tools company Sonatype finds eight out of ten are worried that they're vulnerable to a major data breach related to cloud misconfiguration.

Continue reading

97 percent don't recognize the security limitations of containers

open digital lock

A new study finds that only three percent of respondents recognize that a container, in and of itself, is not a security boundary, suggesting that the default security capabilities of containers are overestimated.

The survey, from cloud security company Aqua Security of 150 cloud native security practitioners and executives from IT, Security and DevOps teams, across sectors and geographies, also shows that only 24 percent of respondents have plans in place to deploy the necessary building blocks for runtime security.

Continue reading

Over half of exploits sold on underground forums are for Microsoft products

Dark web hacker

A new study from Atlas VPN shows that 51 percent of exploits sold on underground cybercriminal forums are for Microsoft products.

Microsoft Office exploits make up 23 percent while Windows accounts for 12 percent of exploits sold on hacker forums. Remote Desktop Protocol (RDP) exploits make up 10 percent, with Internet Explorer and Share Point taking three percent each.

Continue reading

Stability is key to success of mobile apps

Stability is key to the success of mobile apps according to a new report from Bugsnag which shows that a drop of just one percent in stability can lead to a loss of a star in app store ratings.

Users rate apps on the Google Play and Apple App Stores based on their overall experience with factors like usefulness, design, engagement and stability. While the median stability across analyzed apps within the report is 99.8 percent, more stable apps are found to have a competitive advantage, resulting in higher ratings.

Continue reading

Culture not tech is a barrier to DevOps success

DevOps

While 83 percent of IT decision makers say their organizations are implementing DevOps practices, many have stalled at a mid-stage of evolution.

A report from infrastructure automation company Puppet shows that it isn't technology but rather cultural blockers which remain the biggest hurdle to reaching DevOps maturity.

Continue reading

Critical vulnerabilities found in cloud-based ICS management systems

refinery industry

There are lots of good reasons for moving industrial control systems to the cloud including better telemetry and analysis of device performance, management of logic and remote device configuration, improved diagnostics and troubleshooting, a centralized view of processes.

But as more operational technology and lCS make the move, they become increasingly vulnerable to threats. ICS security specialist Claroty has unveiled its new Team82 research arm along with a report on critical vulnerabilities found in cloud-based management platforms for ICS.

Continue reading

Companies risk data exposure as employees leave

Employee leaving

New research from SASE company Netskope reveals the risk of critical data exfiltration linked to employees leaving their jobs.

The report finds that some departing employees present a disproportionately significant cloud security risk. In their last 30 days of employment, workers have been shown to be uploading three times more data than usual to personal cloud apps.

Continue reading

Organizations are losing the war on phishing

According to a new study of over 1,000 enterprise IT professionals around the world, 40 percent of organizations confirm they have fallen victim to a phishing attack in the last month, with 74 percent experiencing one in the last year.

The research from automation platform Ivanti also shows that 80 percent of respondents say they have witnessed an increase in volume of phishing attempts, with 85 percent saying those attempts are getting more sophisticated.

Continue reading

Personal devices could pose a risk as workers go back to the office

Executive social media

New research shows that 61 percent of employees intend to bring their personal devices into the office as they return to more conventional working patterns.

A study of 2,000 UK employees, conducted by Censuswide on behalf of asset visibility and security platform provider Armis, shows 61 percent of employees use their personal mobile phone and 44 percent use their own laptop for business purposes.

Continue reading

How real live phishing emails can help protect users [Q&A]

Phishing

Phishing remains one of the most popular attack vectors for cybercriminals. But traditional defenses relying on filtering or raising user awareness via training aren't always effective.

We spoke to Lior Kohavi, chief technology officer at enterprise SaaS security specialist Cyren to discover how a new approach is using genuine attacks to help both educate users and keep phishing emails out of our inboxes.

Continue reading

Firewalla goes Purple to protect gigabit networks

Regular readers will recall that last year we reviewed the Firewalla, a little box that provides protection for your network.

We tested the Blue version that provides protection for networks up to 500Mbps in speed. Now the company is launching a new Purple version that works at gigabit speeds and has extra features too.

Continue reading

Roll up, roll up! Spot a scam to win a prize!

Cybersecurity is one of the biggest challenges for small and medium-sized businesses and employees are often the weakest link when it comes to preventing data breaches.

In order to improve awareness of phishing scams -- and hopefully stop people falling for them -- ESET is launching an interactive phishing derby to allow people to test their scam-spotting skills and get the chance to win real prizes.

Continue reading

Why a safer future depends on protecting IoT devices [Q&A]

Internet of things

There's been a huge proliferation of Internet of Things devices in recent years, but along with this has come a whole range of new security and privacy concerns.

How are IoT devices secured -- if they are at all -- and what are they doing with our data? We spoke to Rob Shavell, co-founder and CEO of Aine/DeleteMe to talk about security gaps, privacy concerns and more.

Continue reading

© 1998-2021 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.