Ian Barker

Should businesses prepare for ransomware with a cryptocurrency stash? [Q&A]

ransomware key

An increasing number of enterprises are considering pre-purchasing cryptocurrency in anticipation of potential ransomware attacks. But is this a valid risk-reduction strategy for enterprises?

To get some views on this controversial issue, we spoke with Mike Doran, senior security consultant with the enterprise incident management team at cybersecurity specialist Optiv, and former computer forensics examiner with the St. Louis Metropolitan Police Department.

Continue reading

Two out of three worry about identity theft but half still engage in risky behavior

identity theft

A new survey from identity management specialist SailPoint in conjunction with US National Cybersecurity Awareness Month finds two out of three professionals are extremely concerned about their personal identity being stolen.

Yet despite this half admit that they would participate in the types of risky behavior that increase the threat of leaked information and a potential breach.

Continue reading

94 percent of big-business leaders would consider moving off mainframes

Black and white mainframe

A new survey of senior IT decision makers at some of the world's largest organizations that still rely on legacy mainframe systems reveals that most want to move away from the technology due to the high cost and inflexibility that it has brought to their business.

The study from Microsoft and LzLabs surveyed IT leaders in the US, Canada, UK, France and Germany, and finds concerns about the skills crisis limiting number of mainframe professionals left in the market, and the importance of being able to leverage cloud deployment, agile development, and open source initiatives.

Continue reading

Hackers, geeks and thieves -- analysis of dark web communities reveals varied motives

cyber criminal

When we talk about the dark web it's easy to think of it as an amorphous malevolent blob. But new research from Recorded Future reveals some key differences between dark web communities in different parts of the world.

The company's Inskit Group of researchers has actively analyzed underground markets and forums tailored to Russian and Chinese audiences over the past year and has discovered a number of differences in content hosted on forums, as well as differences in forum organization and conduct.

Continue reading

Carbon Black launches advanced threat hunting from the cloud

Insider threats

Most endpoint detection tools collect only a limited set of data, which can make it hard for teams to track down and combat threats.

To address this issue, endpoint security specialist Carbon Black is launching a new threat hunting tool as part of its Predictive Security Cloud (PSC).

Continue reading

68 percent of enterprises are not ready to cope with DNS attacks


A new study reveals that 68 percent of the top 50 companies on the Fortune 500 rankings are not adequately prepared for the next major DNS attack.

The Global DNS Performance Report by network intelligence company ThousandEyes shows that DNS best practices are not widespread in major enterprises and SaaS providers, leaving them needlessly vulnerable.

Continue reading

Half of new app development requests end in failure

success v failure

In the US and across European countries, 50 percent of all new app development requests end in failure -- either by not being delivered at all, or being delivered without meeting the original business need.

According to research carried out by IDG for low-code development platform Appian, 16 percent of new development projects requested by EMEA enterprises never even get started.

Continue reading

Symantec delivers integrated approach to cloud security

cloud security

Companies increasingly rely on cloud applications and infrastructure for their critical systems. Protecting these is vital and to help businesses do so, Symantec  is launching an expansion to its cloud security portfolio.

Symantec’s Cyber Defense Platform offers a broad range of protection, providing visibility and control for virtually any cloud app and integrations with CloudSOC CASB, Cloud Workload Protection (CWP) and Data Loss Protection (DLP).

Continue reading

77 percent of CISOs get conflicting advice on changing regulation

devil angel conflict

A new report released ahead of the Infosecurity North America event to be held next month, shows that the majority of chief information security officers (CISOs) are receiving conflicting advice about new or changing regulation.

In addition, when asked what regulatory bodies should do to help promote a smooth rollout of privacy regulations, 35 percent of respondents say that regulators should provide clearer communication about compliance requirements.

Continue reading

Basic identity and access management tasks are still a struggle for many

Admin login

One in three organizations rely on outdated and manual methods, like spreadsheets, to manage privileged accounts, and there's widespread lack of confidence among IT professionals in access control and privileged account management programs.

This is among the findings of a new report from One Identity which also shows one in 20 organizations have no way of knowing if users retain access even after they’ve left the organization.

Continue reading

Attacks on IIS web servers soar over the last quarter


Attacks targeting IIS servers have shown a massive 782 times increase, from 2,000 to 1.7 million, over the last quarter according to a new report.

The report from threat protection specialist eSentire reveals that most attacks targeting IIS web servers originated from China-based IP addresses.

Continue reading

4.5 billion records compromised in first half of 2018

data breach

The first half of 2018 saw 945 data breaches which led to 4.5 billion data records being compromised worldwide, according to a new report.

The latest Breach Level Index from digital security company Gemalto shows that compared to the same period in 2017, the number of lost, stolen or compromised records increased by a massive 133 percent, though the total number of breaches slightly decreased, suggesting attacks are getting more severe.

Continue reading

Arcserve launches cloud solution for business continuity

cloud data cable

The more enterprises rely on technology the more they suffer when systems fail. Data protection provider Arcserve is aiming to reduce the impact of unplanned downtime with a new cloud solution.

Arcserve Business Continuity Cloud eliminates the need for other data protection tools and management consoles with fully-integrated capabilities to protect and restore applications and systems in any location, on-premises and in public and private clouds.

Continue reading

Artificial intelligence used to identify social engineering risks


Security awareness training company KnowBe4 is launching a new version of its platform using artificial intelligence to identify evolving risks.

It includes a Virtual Risk Officer that helps security or IT professionals identify risks at the user, group or organizational level, resulting in better decision making for their security awareness plans.

Continue reading

Understanding the privacy paradox


In the modern world people often say they care about privacy, but their actions don't reflect their words. Exploring this privacy paradox is a new infographic from privacy app company Keepsafe.

It shows that 35 percent of people have concerns when making purchases on their mobile devices, but 43 percent do so anyway in the name of convenience.

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.