Common standards make access to and control of financial data easier


Ever more of our financial transactions are being carried out online, but if you have accounts with more than one provider, keeping track of information can be a challenge both for businesses and individuals.
Formed in October 2018, the Financial Data Exchange (FDX) is committed to uniting the financial industry around a single, interoperable and royalty-free standard for consumers and businesses to access their financial data.
New solution allows contact centers to collect real-time analytics data


Data is more important for business than ever and that is particularly true of contact centers. Access to accurate data from calls and payment transactions is essential to give them a competitive edge.
Data security and compliance specialist Semafone is launching its new cloud-based Intelligence+ solution that offers real-time data as transactions occur.
2019 could be the worst year ever for holiday retail cybercrime


Online fraud increased 30 percent overall in the third quarter of this year and bot-driven account registration fraud is up 70 percent as cybercriminals test stolen credentials in advance of the peak holiday retail season.
These are among the findings of the latest Fraud and Abuse report from Arkose Labs, its analysis of over 1.3 billion transactions spanning account registrations, logins and payments, reveals that one in five account openings were fraudulent.
Unisys launches new cloud-based biometric identity service


With increasing awareness of fraud and identity theft businesses are under pressure to secure their systems and many are turning to solutions like biometrics to do so.
To bring biometric identity-proofing and authentication capabilities within reach of both large and small enterprises, Unisys is launching an SaaS version of its biometric identity management software.
Trustwave launches advanced threat detection for Azure


As increasing numbers of businesses shift to cloud and multi-cloud environments, securing systems becomes a much more complex task.
For Microsoft Azure users Trustwave is launching new services to bolster threat monitoring, detection and response natively on the platform.
New system helps defend critical infrastructure from attack


Critical infrastructure such as water and power supplies is a prime target for hackers, but is often run using aging systems that weren't designed for the internet era.
Remote access specialist Dispel is launching a new Secure Remote Access platform that helps to protect these systems while at the same time allowing remote access for authorized users to carry out essential maintenance.
Insecure file transfers leave organizations at risk


According to a new survey, 78 percent of respondents are still using unencrypted protocols to transfer some of their files, and only 44 percent are using two-factor authentication when connecting to their file transfer server.
The study for VanDyke Software, conducted by Amplitude Research, interviewed 450 professionals involved in data protection and file transfers and finds that 48 percent of companies are transferring files at least multiple times per day and sometimes 'continuously'.
One in five IT workers doesn't know what a cyberattack is


A survey of over 1,000 IT workers, carried out by technology services provider Probrand reveals that more than one in five (21 percent) don't actually know what constitutes a 'cyberattack'.
Used as a catch-all term, cyberattack can cover everything from a simple phishing email, right across to a large-scale server attack, however, many IT workers have never seen, or don't understand, what the real detail of an attack actually looks like.
How automation can contribute to cloud security [Q&A]

Automated solution helps speed up response to phishing emails


As cybercriminals become more sophisticated, spotting phishing emails is increasingly difficult. Even if a user reports something suspicious to the IT security team it can take time to analyze it before others can be warned.
Security automation specialist LogicHub is launching its Autonomous Phishing Triage, which automatically and accurately analyzes and classifies emails with 97 percent accuracy, reducing the number of alerts requiring human analysis by 75 percent or more.
GDPR is changing consumer trust and data security across Europe


According to the results of a new survey, 74 percent of organizations say that since GDPR was introduced in 2018 it has had a beneficial impact on consumer trust, and 73 percent claim it has boosted their data security.
The study from Check Point questioned 1,000 CTOs, CIOs, IT and security managers from organizations in the UK, France, Germany, Italy and Spain. It shows that GDPR is delivering a strong positive effect overall for European businesses.
IBM launches mobile video streaming for business communication


With modern businesses often spread across multiple locations, effective ways of keeping in touch with a dispersed workforce are always welcome.
IBM Watson Media is launching its new IBM Video Streaming mobile application, a mobile broadcasting tool that offers enterprise businesses an end-to-end, security-rich solution for live mobile video streaming to iOS and Android devices.
Cybercriminals use enterprise-grade tools to mount phishing attacks


We know that cybercrime is increasingly a very serious business and a new report from Akamai Technologies reveals that enterprise-based development and deployment strategies are being used to create phishing attacks.
Tools such as phishing as a service (PaaS) are being used to leverage some of the world's largest tech brands, with 42.63 percent of domains observed targeting Microsoft, PayPal, DHL, and Dropbox.
New intelligence tool measures the impact of workplace communications


In today's business environment staff are more likely than ever to be physically separated from each other, whether they are operating in the field or working from home. This presents a challenge for enterprises needing to keep everyone in the loop.
Until now there hasn't been an effective way to measure the impact of workplace communication other than subjective measures like surveys. Now though communications platform SocialChorus is launching a new tool to measure the effectiveness of employee communications.
The state of stolen credentials on the Dark Web


Every time there's a major data breach it adds to the pool of stolen details available on the Dark Web, but exactly what is out there?
To find out, ImmuniWeb has been analyzing the quality and quantity of stolen credentials accessible on the Dark Web originating from Fortune 500 companies in 10 different industries around the world.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.