Microsoft products continue to be most targeted by cybercriminals


2019 was the third year in a row that Microsoft technology was most affected by vulnerabilities, with eight of the top 10 vulnerabilities identified targeting its products.
This is a key finding of the Recorded Future annual vulnerability report which also shows that for the first time six of the vulnerabilities, all impacting Microsoft, were repeats from the prior year.
Businesses want zero trust capability despite lack of confidence deploying it


To combat growing cyber risks, 72 percent of businesses plan to implement zero trust technology this year, yet 47 percent of security professionals lack confidence in their ability to apply it.
A new report from Cybersecurity Insiders and Pulse Secure, based on a survey of more than 400 cyber security decision makers, finds a striking confidence divide among cybersecurity professionals in applying zero trust principles.
Mobile malware incidents increase by 142 percent


According to a new study, 36.5 percent of all organizations have experienced a malware incident on a mobile device in the past year, which represents a 142 percent increase from 2018.
Research from mobile security specialist Wandera finds 57 percent of organizations have experienced a mobile phishing incident, with 60 percent of mobile phishing attacks occurring over HTTPS.
Why businesses must be ready for lots more IoT devices [Q&A]


There are expected to be more than 70 billion connected devices by 2025, which means the opportunity for hackers to infiltrate connected devices, and to get onto networks, is going to get much larger.
So how can businesses prepare for this influx, train their staff and get ahead in order to protect their critical data from cybercriminals who are always keen to update their tactics and strategies? We spoke to Jonathan Langer, CEO of healthcare device security specialist Medigate to find out.
Less than a fifth of organizations are effectively stopping cyberattacks


Just 17 percent of organizations worldwide are considered 'leaders' in cyber resilience, meaning under a fifth are effectively stopping cyberattacks and finding and fixing breaches fast enough to lower the impact, according to a new report from Accenture.
Based on a survey of more than 4,600 enterprise security practitioners, Accenture's report looks at how businesses prioritize security, the effectiveness of their current security efforts, and the impact of new security-related investments.
UK SMEs see their future in the cloud


Cloud computing features strongly in the plans of SMEs for the coming year, with 57 percent planning increased adoption, according to a new report.
The study from UK IT services provider OGL Computer shows that 59 percent plan on increasing the use of applications such as Microsoft Office 365, Teams and SharePoint.
IBM launches new open source tool to label images using AI


Images for use in development projects need to be correctly labeled to be of use. But adding labels is a task that can involve many hours of work by human analysts painstakingly applying manual labels to images, time that could be better spent on other, more creative, tasks.
In order to streamline the labelling process IBM has created a new automated labeling tool for the open source Cloud Annotations project that uses AI to 'auto-label' images and thus speed up the process.
New application delivers easier data access for business analysts


Businesses are collecting more data than ever, but ensuring that employees have easy and reliable access to information they need for their jobs can prove difficult.
Now though Kloud.io has raised $4 million in seed funding for its spreadsheet-based application that enables financial analysts to directly access data from multiple sources, such as Salesforce, Oracle, Netsuite, and hundreds more.
New solution allows businesses to find and protect sensitive documents


Modern businesses have large numbers of documents, many of which contain information that is commercially sensitive. But poor file management, incorrect permissions and uncontrolled sharing can put that information at risk.
The unstructured nature of this data makes it notoriously difficult to keep track of. Now though California-based Concentric is launching a new solution to allow enterprises to identify and protect these documents.
How eCommerce fraud is evolving [Q&A]


Online fraud has gained in sophistication in recent years. As consumers have moved to using mobile devices and have come to expect a consistent shopping experience across platforms, so the fraudsters have never been far behind.
We spoke to Michael Reitblat, co-founder and CEO of eCommerce fraud prevention specialist Forter, which recently published its latest Fraud Attack Index, to find out more about the fraud landscape and how businesses can protect themselves.
People are a key element in securing systems


With attackers often targeting individuals and their credentials to gain unauthorized access to accounts, people are increasingly at the center of security.
This is one of the conclusions of a new report from identity solutions provider Okta which finds that when deploying security tools a third of businesses start with a tool focused on protecting their people, as opposed to devices, infrastructure, and networks.
Why everyone needs to be speaking the same language on data privacy [Q&A]


Today is Data Privacy Day and with CCPA coming into force at the start of this month, the focus is very much on personal data, how it's used and how it needs to be protected.
One of the issues is that there are lots of definitions and terms involved which means it’s vital that everyone understands what they’re dealing with.
New low-code environment helps deliver network automation


With more programmable features and APIs being introduced, networks have shifted in recent years from being hardware-focused to software-centered functions.
This has changed the network management techniques and skillsets required to keep pace with the changing environment. To address this, network automation specialist Itential is launching its Automation Studio which allows developers and network engineers to manage increasingly complex networks regardless of their level of knowledge or coding skills.
Cisco launches Industrial IoT security architecture


Increasingly the boundaries between operational technology and business networks are breaking down as businesses seek access to the real time data that industrial IoT devices hold.
But that leads to increased risk to critical infrastructure as devices become more exposed. To combat these threats, Cisco is introducing an IoT security architecture that provides enhanced visibility across both IT and OT environments, and helps protect industrial processes.
Avast free antivirus sends browser history to marketers


When you install an antivirus program -- even a free one -- you have a reasonable assumption that it's going to help keep your data safe.
But a joint investigation by Motherboard and PCMag has discovered that Avast's free antivirus is harvesting user data. Although this is supposedly 'de-identified' it is being sold to marketers in a way that can be linked back to an individual.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.