Developers seen as crucial to pandemic recovery

DevOps

Developers are key to recovery from the pandemic according to 91 percent of UK businesses in a new survey, and 95 percent see them as crucial to digital transformation projects too.

But the study from cloud communications platform Twilio finds that the majority are not yet unlocking the full power of developers.

Continue reading

71 percent of Office 365 users suffer malicious account takeovers

Office 365

New research from network detection and response company Vectra AI shows that 88 percent of companies have accelerated their cloud and digital transformation projects due to COVID-19.

But it also finds that 71 percent of Microsoft Office 365 deployments have suffered an account takeover of a legitimate user's account, not just once, but on average seven times in the last year.

Continue reading

47 percent of workers spend their own money fixing home working technical issues

PC problem

Tech issues at home can be frustrating enough when you're trying to stream a movie or set up a video call with the family, but they're even more of an issue if you're trying to work from home too.

New research from comparison site InMyArea.com looks at how tech issues are affecting the home workforce. It finds that 47 percent of employees have spent their own money to solve technical problems, with 20 percent spending $100 or more.

Continue reading

Ransomware up 62 percent since 2019

ransomware key

Cybercriminals are using more sophisticated ransomware tactics and more dangerous variants, like Ryuk, to earn an easy payday. This has seen a 62 percent increase globally and a 158 percent spike in North America since 2019.

The latest Cyber Threat Report from SonicWall highlights how COVID-19 has provided threat actors with opportunities for more powerful, aggressive and numerous attacks, thriving on the fear and uncertainty of remote and mobile work forces navigating corporate networks from home.

Continue reading

Free tool helps enterprises assess their Active Directory security

security meter

Microsoft Active Directory (AD) is used by 90 percent of enterprises as the primary source of trust for identity and access, but it's also exploited in many cyberattacks.

Since AD is rarely safeguarded effectively, attackers have come to depend on weak configurations to identify attack paths, access privileged credentials and get a foothold in target networks.

Continue reading

29 percent of threats previously unknown as hackers update tactics

data threat

The latest Quarterly Threat Insights Report from HP shows that 29 percent of malware captured between October and December 2020 was previously unknown, due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection.

In addition 88 percent of malware was delivered by email into users' inboxes, in many cases having bypassed gateway filters. It took 8.8 days, on average, for threats to become known by hash to antivirus engines, giving hackers over a week’s head-start on their campaigns.

Continue reading

Avira launches new security product for Mac systems

Avira for Mac

German cybersecurity company Avira is launching a new security for Mac product with free as well as premium versions, developed from the ground up on Apple’s latest tech stack.

The all-in-one solution blocks and removes threats, enables worry-free browsing, shopping and payment through real-time protection, and protects data with VPN encryption.

Continue reading

Public key infrastructure and digital certificates essential to zero trust

Puzzle key

Public key infrastructure (PKI) and digital certificates are essential to achieving zero trust architecture according to 96 percent of North American enterprises.

However, only 39 percent use PKI as part of their zero trust security strategy today according to a survey from Pulse Research and PKI as-a-Service (PKIaaS) company Keyfactor.

Continue reading

Businesses more likely to buy from companies offering ongoing security

business security

Technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk are more likely to win business according to a new study from Intel.

The results show 73 percent of respondents say their organization is more likely to purchase technologies and services from technology providers that are proactive about finding, mitigating and communicating security vulnerabilities, while 48 percent say their technology providers don’t offer this capability.

Continue reading

Why security and observability are key to software development [Q&A]

software development

Developers are under increasing pressure to create real-time products that make the most of a wide range of digital resources.

This means that DevOps teams have to cope with information drawn from all sorts of different sources. But how can they ensure they are getting an accurate picture?

Continue reading

Why SASE is vital for the cybersecurity industry [Q&A]

Network security

One of the frameworks that has received greater attention since the acceleration of digital transformation is Secure Access Services Edge (SASE).

But what does its adoption mean for the security industry and how can enterprises best take advantage of SASE? We spoke to Mary Blackowiak, senior product marketing manager at AT&T Cybersecurity, to discover more.

Continue reading

Breaking down the silos between IT and business [Q&A]

Breaking barriers

Until the cloud and the idea of big data came along it wasn't unusual for different parts of a firm to have their own information separate from the rest of the business.

But digital transformation initiatives recognize that all information is important to the organization and that silos are increasingly a bad thing.

Continue reading

Cryptomining impacts 69 percent of organizations

cryptocurrency mining

In a new report into DNS security, Cisco Umbrella, which processes 620 billion DNS requests daily, finds that from January to December 2020 cryptomining generated the most DNS traffic out of any individual threat category with 69 percent of organizations discovering cryptomining connections.

In addition nearly 90 percent of organizations had at least one user attempt to connect to a phishing site, peaking drastically in the second half of the year.

Continue reading

Over two-thirds of enterprises fail to exploit valuable data

folder stack

Despite the fact that data is a key resource for business decision making, a new study reveals that many businesses are leaving it untapped.

The research by Dimensional Research for data integration company Fivetran shows that 44 percent of respondents say that key data is not yet usable for decision making and 68 percent say additional business insights could be extracted from existing data if they only had more time.

Continue reading

Secure web gateway allows isolation of mobile devices

Mobile lock

As mobile device usage continues to grow within enterprises the security risk increases too. Mobile browsers get patched less often and other threats come from phishing and malicious document downloads.

To combat these problems Menlo Security is extending its cloud-based Secure Web Gateway (SWG) to include web isolation for mobile devices.

Continue reading

Load More Articles