Cyber hygiene is at an all-time low

cyber hygiene

Well-known attacks and attack vectors remained successful because security personnel did not address vulnerabilities and apply patches according to a new report from cybersecurity and visibility business Ixia.

IT vendors created code or configurations that led to many successful security breaches in 2018, but IT operations and security personnel shared the blame due to ignorance of the latest patches and challenges in deploying patches in a timely manner.

Continue reading

European financial services industry struggling with lack of data skills

Money

Nearly 40 percent of financial services businesses are failing to implement data initiatives due to a lack of skills, with almost a third saying that their GDPR initiatives are failing, according to a new study.

The report produced by Vanson Bourne for analytics database company Exasol is based on responses from 500 IT and business decision makers, from enterprises in Germany and the UK.

Continue reading

Security professionals think cybersecurity is a bigger threat to the US than border security

Border fence

A new survey of security professionals taken at this year's RSA reveals that 92 percent of respondents feel that cybersecurity is a bigger threat to the US than border security. Yet government, and media, attention seems far more focused on the latter.

The study from AI-powered security company Lastline also asked respondents which of the tech giants they trust the least with their data, not surprisingly 76 percent name Facebook. Others, Amazon (25 percent), Apple (24 percent), Google (20 percent) and Microsoft (27 percent) all scored relatively evenly when asked who they trust most.

Continue reading

Tax identities up for sale on the dark web

Dark web hacker

While banking and identity information has been traded on the dark web for a long time, a new report from Carbon Black shows a new focus on tax identities.

The company's research shows previous year's W-2 forms and 1040 forms available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, social security numbers and birthdates can be obtained for a price ranging from $0.19 to $62.

Continue reading

Businesses complacent about mainframe security

mainframe

Although 85 percent of companies say mainframe security is a top priority, just 33 percent always or often make mainframe decisions based on security finds a new report.

The study from mainframe vulnerability specialist Key Resources Inc, based on research by Forrester Consulting also finds 67 percent of respondents admit that only sometimes or rarely are they factoring security into mainframe decisions.

Continue reading

A quarter of phishing emails bypass Office 365 security

phishing hook

According to a new study analyzing more than 55 million emails, 25 percent of phishing emails bypass Office 365 security, using malicious links and attachments as the main vectors.

Other findings of the report from cloud-native security firm Avanan include that 33 percent of emails contain a link to a site hosted on WordPress and 98 percent of emails containing a crypto wallet address are phishing attacks.

Continue reading

Securing serverless computing, the latest cloud paradigm [Q&A]

cloud padlock

The cloud-skills shortage has made security a major challenge for enterprises. In fact, virtually every data breach in the cloud today is due to human error, rather than brilliant hacking. Hackers don't even bother launching attacks in the public cloud; they simply look for misconfigured systems that leave data exposed.

Against this backdrop, a whole new cloud model is taking hold -- serverless computing. In a world where cloud certifications and security skills are already in short supply and causing chaos in the cloud, what will serverless computing do to compound that problem for enterprises? Is it possible for organizations to avoid making the same mistakes with this new paradigm that they are making in traditional cloud environments?

Continue reading

Cohesity launches as-a-service backup for Google Cloud

Backup key

As companies move more of their workloads to the cloud they want to ensure that their data is properly protected.

Storage specialist Cohesity is launching a new software as a service (SaaS) solution that delivers enterprise-grade backup and recovery for applications running on the Google Cloud platform.

Continue reading

BullGuard adds to its product line with a VPN

BullGuard VPN

Cybersecurity company BullGuard is launching its own VPN for Windows, Mac, Android and iOS, intended to make it simple for users to ensure their online privacy.

Designed to be easily used across multiple devices, BullGuard VPN features a simplified user interface and quick connect functionality, enabling consumers to fly under the radar and surf the internet in stealth mode while retaining complete anonymity via military-grade encryption.

Continue reading

Zoho launches new commerce and marketing platforms

Zoho logo

Cloud business system company Zoho is launching two new platforms. Commerce Plus uses Zoho's customer experience, finance, analytics, and intelligence software to provide businesses an interconnected, first-of-its-kind commerce experience platform.

The Zoho Marketing Platform can support over 20 different marketing channels, including websites, social, events, text, email, ads, offline, and more.

Continue reading

Digital transformation? Don't ask me

digital transformation

According to new research among British businesses, 57 percent of employees either don't understand (20 percent) or misinterpret (37 percent) the meaning of 'digital transformation'.

The research, conducted by YouGov among employees at 500 businesses with 50 or more employees, on behalf of service management Cherwell Software also finds that 64 percent say their employers only adopt new technology once it enters the mainstream.

Continue reading

Understanding the LockerGoga ransomware attacks

Ransomware eye

Last month Aluminum manufacturer Norsk Hydro was hit by a large scale ransomware attack that affected its systems across the globe and caused severe disruption to its operations with an estimated impact of more than $35 million..

The attack used the LockerGoga ransomware and the threat research team at Securonix has been monitoring the malware, which also caused problems for a number of other companies.

Continue reading

Credential stuffing attacks target media streaming services

PC film

The entertainment industry and in particular streaming services is among the biggest targets of credential stuffing attacks according to a new report.

The study from digital delivery platform Akamai, unveiled at the NAB Cybersecurity and Content Protection Summit in Las Vegas this week, focuses on credential abuse attacks against online video and music streaming services.

Continue reading

Fastly takes Azure closer to the edge

Edge computing

As businesses grow to serve complex user experiences, cooperation between network providers is vital. Enterprises want pain-free portability of application stacks and services optimized for their needs between multiple providers.

Edge cloud platform Fastly is announcing that it’s connecting its edge network with Microsoft Azure.

Continue reading

90 percent of critical infrastructure hit by cyberattacks

Powerlines

A new survey of professionals in industries using industrial control systems (ICS) and operational technology (OT) finds 90 percent of respondents say their environment has been damaged by at least one cyberattack over the past two years, with 62 percent experiencing two or more attacks.

The study commissioned by Tenable from the Ponemon Institute also finds 80 percent of respondents cite lack of visibility into the attack surface, knowing what systems are part of their IT environments, as the number one issue in their inability to prevent business-impacting cyberattacks.

Continue reading

Load More Articles