New solution speeds up identity verification for enterprises


Due to the potentially crippling effect of security breaches and data loss on both the bottom line and a brand’s reputation it's vital for organizations to protect their users.
Increasingly, identity management has become central to building seamless, secure digital engagement platforms, differentiating products, and winning long-term loyalty. However there can be a trade off between security and performance.
New threat monitoring service helps businesses protect their digital footprint


Traditional cyber defenses are designed to protect assets that exist within an organization's network. But with the growth of the cloud, IoT and more, assets now extend far beyond the network perimeter, increasing the risk of exposure or theft.
FireEye is launching a Digital Threat Monitoring tool that automatically collects and analyzes content on the dark and open web, alerting defenders whenever a potential threat is detected.
'Pass the Hash' attacks highlight need for improved privileged access management


Pass the Hash (PtH) attacks which use stolen hashed administrator credentials to breach security are a major risk to businesses.
A new report from One Identity, based on a survey of over 1,000 IT professionals carried out by Dimensional Research, finds 95 percent of respondents say that PtH attacks have a direct impact on their organizations.
Cyberattacks on SMBs becoming more targeted and sophisticated


Small and medium sized businesses continue to be a prime target for cybercriminals according to a new study commissioned by password management company Keeper Security from the Ponemon Institute.
It shows that 76 percent of US companies have been attacked within the last 12 months, up from 55 percent in 2016. Globally, 66 percent of respondents report attacks in the same time frame.
Majority of enterprise domains still not protected from email impersonation


Despite growing adoption of DMARC technology, fewer than 10 percent of enterprise email domains are protected from impersonation according to a new report from Valimail.
Valimail found that 850,000 domains worldwide now have DMARC records, a five times increase since 2016. However, fewer than 17 percent of global DMARC records are at enforcement -- meaning fake emails that appear to come from those domains are still arriving in recipients’ inboxes.
Too many users given access to sensitive information


Poor privileged access management practices that lead to people having too much access continue to be a critical challenge for many organizations despite significant risks of data breaches and security incidents.
A new report from technology consulting company Sila and the Ponemon Institute surveyed more than 650 North American respondents and finds 70 percent think it likely that privileged users within their organizations are accessing sensitive or confidential data for no discernible business need.
Cybercriminals increase use of trusted domains to trick victims


Nearly a quarter of malicious URLs are being hosted on trusted domains, as hackers know trusted domain URLs raise less suspicion among users and are more difficult for security measures to block.
This is one of the findings of the latest Webroot threat report which also shows 29 percent of detected phishing web pages use HTTPS as a method to trick users into believing they're on a trusted site via the padlock symbol.
USB drives still present an enterprise security risk


Despite the rise of cloud storage, 87 percent of organizations still use USB drives but they are struggling to manage their usage according to a new report.
The study from encrypted drive manufacturer Apricorn reveals that 58 percent don't use port control or whitelisting software to manage USB device usage and 26 percent don't use software-based encryption.
Security professionals struggle to measure success within the business


Although most security professionals use key performance indicators to measure their efforts they struggle to reconcile these with business goals, according to a new report from Thycotic.
It finds that while 84 percent of respondents have KPIs, and an even higher proportion (92 percent) say they review security in terms of its impact on the business, nearly half (44 percent) say their organization struggles to align security initiatives with the business’s overall goals, while more 35 percent aren't clear what the business goals are.
New online tool helps quantify insider email risk


Email is now the preferred communication method for businesses, but this brings with it greater risk of employees leaking data due to errors or deliberate activity.
A survey from data security company Egress shows that of employees who had accidentally shared data almost half (48 percent) say they had been rushing, 30 percent blamed a high-pressure working environment and 29 percent said it happened because they were tired.
Better understanding of software usage helps drive monetization


In order to make better decisions concerning their products, software developers need to know not just whether an app is being used but also which features are most used and whether that use is increasing or declining.
Flexera is releasing its Monetization Monitor: Usage Management & Insights report which seeks to understand how usage data can be used to improve products.
DLP solutions can't stop insider threats


Insider threats, caused by current and departing employees, expose companies to breaches and put corporate data at risk, but security solutions may not be effectively preventing them.
A new study from data loss solution company Code42 finds that 69 percent of organizations say they were breached due to an insider threat and confirm they had a prevention solution in place at the time of the breach.
Cybersecurity companies focus on the role of 'stalkerware' in domestic abuse

Cloud platform allows graphics-intensive apps to be delivered from the browser


Despite the fact that businesses are migrating to the cloud, most have desktop applications they still rely on. In many cases these are graphics intensive, like CAD or video editing, requiring GPU support.
Virtual application delivery platform Cameyo is releasing an updated version with support for GPU-accelerated applications, allowing them to be delivered from the browser.
Google launches enhanced password management capabilities


According to a Harris Poll carried out for Google, 75 percent of Americans get frustrated trying to manage all their passwords.
This results in unsafe practices as 24 percent have used the following common passwords, or some variation: like 'abc123', 'Password', or '123456'. 59 percent of US adults have incorporated a name (their own, a family member's, a partner's, or a pet’s) into their password to an online account, 22 percent have used their own name and a third have used their pet's name or a variation as their password.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.