Dark web tools spotlight dangers of poor password management


Tools like checkers and brute forcers freely available on the dark web are helping unskilled criminals launch automated attacks against organizations' websites.
A new report by Recorded Future also reveals the industries most affected by these tools are software, media and entertainment, eCommerce, finance, and telecommunications.
Security teams overconfident about detecting cyberthreats


A new report shows that 82 percent of security operations centers are confident in their ability to detect cyberthreats.
This is despite just 22 percent of front line workers tracking mean time to detection (MTTD), which helps determine hacker dwell time, and 40 percent of organizations still struggling with SOC staff shortages and finding qualified people.
New identity tool helps combat digital fraud


Spotting potentially fraudulent customers and transactions is difficult. But a new tool from identity verification firm Ekata uses machine learning to help identify good and bad customers.
Network Score uses the Ekata Identity Network, a proprietary global dataset of billions of customer transactions, to reduce the number of false transaction declines and increase the precision of fraud detection.
Over reliance on passwords compromises security


Four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused credentials.
A new report on access management from Thales also reveals that a majority of respondents say their organization plans to expand the use of usernames and passwords, even though the limitations could pose security challenges.
Protecting IoT and OT with zero trust and network segmentation [Q&A]


In recent years we've seen a surge in the numbers of IoT and operational technology devices appearing on networks.
But while this technology offers many advantages it also brings new risks, both for the devices themselves and the networks they're attached to. What can businesses do to benefit from the technology but still keep their networks safe?
Security industry responds to FBI warning of increased mobile banking risks


Earlier this week the FBI issued an alert about the risk of mobile banking platforms being targeted by cybercriminals during the current pandemic lockdown.
More than 75 percent of Americans used mobile banking in some form in 2019, but since the start of this year, a 50-percent spike in the usage of banking apps has been observed. Security professionals have been responding to the news.
New platform helps prevent data loss when employees leave


Around a third of employees take data with them when they leave a business according to email security firm Tessian.
In order to help companies understand and tackle the risks it's launching a new Human Layer Security (HLS) Intelligence platform to provide businesses with deeper insights into human layer security threats and the tools required to trend down the risk of accidental data loss, data exfiltration and advanced impersonation phishing attacks.
Data analysts spend only half their time analyzing data


During the course of a typical workday, data analysts only spend half their time actually analyzing data according to a new study.
Conducted by Dimensional Research for Fivetran, the online survey of around 500 data professionals across five continents also shows 68 percent of the analysts who responded say they have ideas that would drive more profit for their organizations, but they lack time to implement them.
How hackers are targeting enterprises from the outside


In the past businesses have needed to worry about protecting their networks. But the expansion of internet use, cloud and as-a-service products means there are now more potential threats to worry about.
A new study from attack surface management specialist RiskIQ looks at the digital presence of organizations, where they lack visibility, and the pathways hackers are using to exploit these blind spots.
UK government invests in security by design


The UK government is announcing that it will provide £10 million ($12.5 million) over four years to develop groundbreaking cyber security technologies.
Nine grant winners have been revealed as the recipients in the government's Digital Security by Design program, which aims to help the tech infrastructure of UK organizations and digital devices be more resilient to cyber attacks.
70 percent of security professionals say election infrastructure is at risk


A new survey of security professionals shows that 70 percent of respondents believe their governments can't adequately defend election infrastructure against domestic and international cyber attacks.
In addition the study, from machine identity protection company Venafi, finds that 75 percent believe the spread of disinformation is the greatest threat to election integrity.
Protocol flaws leave 5G and other mobile networks open to vulnerabilities


Vulnerabilities affecting mobile and 5G networks are putting industrial equipment, smart homes, and city infrastructure at risk according to a new report.
Produced by Positive Technologies, this is the fourth in a series of reports on the greatest threats and vulnerabilities in the mobile ecosystem. It highlights the cyber security risks to networks that originate with the GTP protocol -- which is used to transmit user data and control traffic on 2G, 3G, and 4G networks.
Secure access solution delivers SD-WAN connectivity for remote workers


Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.
Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.
Microsoft partners with NTT DATA to boost public cloud for digital transformation


Businesses are increasingly looking to bring about digital transformation through agile system integration utilizing cloud computing and other technologies.
NTT DATA is expanding its alliance with Microsoft to bring together NTT's global IT services with Microsoft's cloud to help digital transformation projects using Microsoft Azure as a preferred cloud solution.
The impact of open source on security [Q&A]


Open source software is commonly used to save time as it means developers don't end up repeating the same things over and over.
One of the key things about open source is that the source code is open to examination by everyone, In security terms this means it’s open to both the attackers and defenders.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.