Without training one in three users fall for phishing scams

Phishing

New research finds that, if they haven't received security awareness training, one in three users will likely fall for a phishing or social engineering scam that could put their organization at risk.

The study from awareness training specialist KnowBe4 set out to measure organizations' phish-prone percentage (PPP) and found an initial baseline of 31.4 percent across all industries and sizes.

Continue reading

How stopping lateral movement can defend against ransomware [Q&A]

Ransomware

Over the last couple of years the number of ransomware attacks has soared. While high profile attacks make the headlines organizations of all sizes are at risk.

One of the keys to stopping attacks is to prevent them from moving laterally through networks. We spoke to Amit Serper, area VP of security research for North America at microsegmentation specialist Guardicore to get his view on how businesses can protect themselves.

Continue reading

Ransomware gangs get more professional

Computer Hacker in suit

Ransomware, and indeed malware generally, used to be something of a cottage industry, the preserve of individuals or small groups. But new research from threat intelligence company KELA shows that it's becoming a highly professionalized industry.

Many cybercriminals are now specializing in different areas, so that the coding, spreading, extracting and monetizing processes might all be carried out by different people.

Continue reading

Panasonic sets up a new business solutions arm

Panasonic logo

Electronics giant Panasonic is launching a new solutions-focused organization, Panasonic Connect Europe, to address the changing technology needs of European businesses.

The new business will offer diverse B2B technology solutions, alongside an enhanced services capability, to help customers maintain mission critical operations and organizations transform their business operations.

Continue reading

Insider data breaches can cost companies as much as 20 percent of revenue

insider threat

Data breaches from insiders can cost as much as 20 percent of annual revenue according to a new study from insider risk management company Code42.

Combine this with a recent Microsoft report showing that 40 percent of people are planning to switch jobs as we emerge from the pandemic, and clearly there's a risk as the very technologies that enable the free flow of data in an organization are also the ones that make it easy for insiders to exfiltrate data.

Continue reading

New tool helps businesses to find the right security applications

DevSecOps

Security teams need to be able to understand their company’s software assets and properly test them. This means the team needs to be familiar with the threats to its technology and choose the services and solutions that work best for its unique circumstances.

Application Security Posture Management (ASPM) solution, Enso Security is launching its new industry initiative, the AppSec Map. This is designed as an industry collaboration initiative by former security leaders at Wix.com, and offers a live map of vendors and community projects related to application security.

Continue reading

IBM CodeFlare simplifies the move to hybrid cloud

Cloud growth arrow

Enterprises are relying on data more than ever before, but that can come at a cost in terms of the time spent on building and managing the infrastructure to handle it.

In order to streamline the integration and efficient scaling of these big data and AI workflows into hybrid cloud environments, IBM Research is launching CodeFlare.

Continue reading

Why testing is vital to keep organizations secure [Q&A]

penetration testing

Everyone knows that businesses systems are a target for a range of attackers. But it's easy to become complacent about security and finding vulnerabilities can be difficult.

Testing your security is therefore vital, and can uncover things that you might not otherwise be aware of.

Continue reading

Enterprises see threat modeling as a top priority post-COVID

Threat concept

Threat modeling is a top priority in 2021 according to 79 percent of respondents to a new survey, yet many organizations are still falling short in taking action or updating their approach.

The research from Balanced Development Automation (BDA) platform Security Compass shows that traditional threat modeling practices are historically slow, and hinder an organization’s goals of getting applications to market quickly.

Continue reading

Why IoT developers need access to better tools [Q&A]

Internet of things

Internet of things devices pose a number of challenges for developers, not least security issues and having to work with limited hardware capability.

We talked to François Baldassari of connected device specialist Memfault to find out why it may be better if IoT device developers and engineers were to have the kinds of DevOps tools that only software teams have traditionally had access to.

Continue reading

The keys to executing an employee-centric return to the office [Q&A]

Office entrance

As businesses begin to announce their intentions to bring employees back into the office, many employees have publicly pushed back. People don't want to go back into work and incur all of the stresses that come with it, including lengthy commutes, parking fees, and a loss of work-life balance.

Zach Dunn co-founder and VP of customer experience at Robin has helped hundreds of companies, including Twitter, Peloton, and Toyota, to execute comprehensive return to office (RTO) strategies that have run smoothly and paved the path towards an effective hybrid workplace model.

Continue reading

Tracing the ransomware family tree

Ransomware

Ransomware is behind many of the latest cyber attacks and it can be hard for defenders to track the ever-growing number of variants and the botnets behind them.

Threat intelligence company DomainTools has been taking a look at the booming underground economy surrounding ransomware with a focus on the most prolific ransomware families.

Continue reading

Manufacturing and healthcare among top targets for phishing attacks

Phishing

A new report from cloud email and collaboration specialist Avanan shows healthcare and manufacturing as two of the top industries being targeted by hackers in the first half of the year.

The most attacked industries are IT, healthcare, and manufacturing. IT saw over 9,000 phishing emails in a one month span, out of an average of 376,914 total emails. Healthcare saw over 6,000 phishing emails out of an average of 451,792 total emails and manufacturing saw just under 6,000 phishing emails out of an average of 331,184 total emails.

Continue reading

How attackers can manipulate social media recommendations

Social media flags

Recommendations based on AI are something we encounter all the time. From shopping sites, streaming services and social media we're constantly shown stuff that the AI thinks we'll like.

But how easy would it be for an attacker to manipulate these recommendations to promote conspiracy theories or spread disinformation?

Continue reading

Google Cloud and Ericsson team up to deliver 5G and edge

5g smartphone

In a bid to help communications service providers (CSPs) digitally transform, and to unlock new enterprise and consumer use cases, Google Cloud and Ericsson have announced a partnership to jointly develop 5G and edge cloud solutions.

The two companies are working together to develop new solutions at Ericsson's Silicon Valley D15 Labs, a state-of-the-art innovation center where advanced solutions and technologies can be developed and tested on a live, multi-layer 5G platform.

Continue reading

Load More Articles