90 percent of critical infrastructure hit by cyberattacks

Powerlines

A new survey of professionals in industries using industrial control systems (ICS) and operational technology (OT) finds 90 percent of respondents say their environment has been damaged by at least one cyberattack over the past two years, with 62 percent experiencing two or more attacks.

The study commissioned by Tenable from the Ponemon Institute also finds 80 percent of respondents cite lack of visibility into the attack surface, knowing what systems are part of their IT environments, as the number one issue in their inability to prevent business-impacting cyberattacks.

Continue reading

Why bare-metal containers are scaring VMware [Q&A]

cloud containers

With a market capital of $73 billion and a stock price that has more than tripled in three years, VMware is one of the big hitters of the IT industry. The company has dominated the market since it introduced virtual machine server abstraction 19 years ago.

But some industry watchers cite the rise of containers as an existential risk to VMware. This new way of software deployment was popularized by developers via the Docker container format, and more recently is taking the data center by storm as enterprises take containers into production and standardize on Google’s Kubernetes orchestration platform.

Continue reading

New hybrid platform helps enterprises to maximize cloud use

cloud button

Cloud management company RackWare is launching its new Hybrid Cloud Platform, designed to remove the barriers to enterprise cloud adoption.

It allows enterprises to migrate to the cloud seamlessly, implement a cloud-based approach to disaster recovery and offers oversight and control of all cloud resources.

Continue reading

Spear phishing attack targets HR and payroll systems

Phishing

Payday should be a pleasurable time of the month, but thanks to a new spear phishing campaign, some employees are losing their pay checks to cybercriminals.

Email defense specialist Vade Secure uncovered the attack in which criminals initiate an email conversation with HR staff to get them to change bank details for receiving direct payroll payments.

Continue reading

Vulnerability in Xiaomi's pre-installed apps could affect more than 150 million devices

man-in-the-middle

A vulnerability that could allow man-in-the-middle attacks and the injection of malicious code has been found in a pre-installed app on devices manufactured by Xiaomi, one of the biggest mobile vendors.

The flaw, uncovered by researchers at Check Point is -- somewhat ironically -- in the pre-installed security app, 'Guard Provider', which is meant to protect the phone from malware.

Continue reading

Marketers have high hopes for artificial intelligence

Marketing

There's strong interest in and high expectations of AI from B2B marketing and sales professionals, with 84 percent of participants in a new study currently planning, evaluating, implementing or using it.

Account-based marketing company Demandbase has revealed the results of the survey conducted in conjunction with Salesforce Pardot and global research firm, Demand Metric.

Continue reading

The world of cybersecurity in numbers

TechJury graphic header

We all know that cybersecurity is a major issue, but it can sometimes be hard to grasp the scale of the problem and who is at risk.

Software reviews site TechJury has created an infographic to vizualize what is happening in the cybersecurity field as well as the top threats to look out for.

Continue reading

Financial sector concerned about third-party cyber risk

risk jigsaw piece

Many organizations work with hundreds of third parties, creating new risks that must be actively managed. The financial industry, in particular, has a massive business ecosystem made up of legal organizations, accounting and human resources firms, management consulting and outsourcing firms, and information technology and software providers.

A new study into the financial services sector from security ratings company BitSight finds that 97 percent of respondents say cyber risk affecting third parties is a major issue.

Continue reading

Companies overconfident in management of sensitive data

data privacy

A new study into how enterprises manage sensitive data reveals overconfidence in knowing where private data resides, and the use of inadequate tools such as spreadsheets to track it.

The research from Integris Software shows 40 percent are 'very' or 'extremely' confident in knowing exactly where sensitive data resides, despite only taking inventory once a year or less. Yet a mere 17 percent of respondents are able to access sensitive data across five common data source types.

Continue reading

Taxpayers worry about online fraud but offline habits could be putting them at risk

Tax blocks

As we approach the tax return season, a survey from document destruction and information security company Shred-It reveals that 38 percent of US taxpayers say they are worried they will become a victim of tax fraud or tax identity theft.

Yet according to the study 45 percent admit to storing tax paperwork in a box, desk drawer or unlocked cabinet at home or work. What's more, 19 percent admit they don't shred tax paperwork or physical documents containing sensitive information before throwing them away.

Continue reading

85 percent of organizations don't meet basic levels of PAM security

Admin login

While 78 percent of organizations now include privileged credential protection as part of their cyber security policies, their privileged access management (PAM) security practices are still lacking.

According to a new study by PAM specialist Thycotic, 85 percent of respondents are still struggling to get beyond the initial phase of PAM maturity.

Continue reading

Attackers target supply chains using 'island hopping'

Network security

Around half of recent cyberattacks use 'island hopping' techniques, seeking to target not just one network but those along the supply chain too.

This is one of the findings of the latest Global Incident Response Threat Report from Carbon Black. It also finds that 70 percent of attacks now attempt to move laterally around the network.

Continue reading

Vulnerabilities leave financial mobile apps open to attack

Mobile cash

A new report reveals widespread security inadequacies and protection failures among consumer financial applications.

The research for Arxan Technologies, carried out by Aite Group, says these vulnerabilities can lead to the exposure of source code, sensitive data stored in apps, access to back-end servers via APIs, and more.

Continue reading

IoT attacks increase but rely on the same old weaknesses

Internet of things

Internet of Things devices have proved to be problematic in their vulnerability to cyber attacks. This is underlined by a new report from F-Secure which finds that threats and the number of attacks continue to increase, but still depend on well-known security weaknesses, such as unpatched software and weak passwords.

The number of IoT threats observed by F-Secure Labs doubled in 2018, growing from 19 to 38 in the space of a single year.

Continue reading

Continuous response needed to combat cyber attacks

hand on world map

As the threat landscape continues to rapidly evolve, businesses need to be able to react quickly and have an effective strategy to deal with attacks.

Security specialist F-Secure is calling for greater emphasis on both preparing for a breach as well as fast and effective containment that has the correct balance of people, process and technology.

Continue reading

Load More Articles