Continuous response needed to combat cyber attacks

hand on world map

As the threat landscape continues to rapidly evolve, businesses need to be able to react quickly and have an effective strategy to deal with attacks.

Security specialist F-Secure is calling for greater emphasis on both preparing for a breach as well as fast and effective containment that has the correct balance of people, process and technology.

Continue reading

90 percent of tech companies are vulnerable to email spoofing

Email fraud

Phishing is a major problem for large organizations, but while there are standards to authenticate email and prevent phishers from spoofing domains with fake emails, a majority of companies have not made full use of them.

The tech sector has moved faster than some but while they are beginning to implement protection many companies in this sector are still at an early stage with the result that 90 percent are still vulnerable to impersonation.

Continue reading

We're getting better at backing up our data -- but we're also losing more

Globe hard drive

A new study released by Acronis ahead of Sunday's World Backup Day shows 92.7 percent of consumers are backing up their computers -- an increase of more than 24.1 percent from last year and the largest ever year-on-year increase.

This could be because the report also shows that 65.1 percent of those surveyed say either they or a family member has lost data as a result of an accidental deletion, hardware failure or software problem -- a jump of 29.4 percentage points from last year.

Continue reading

Large enterprises face problems with unsecured applications

security flaw

A new survey of more than 200 CISOs in the US and Canada finds that large enterprises typically operate 1,300 or more complex applications but only protect 60 percent of them, leaving more than 500 applications unprotected at a time where adversarial attacks are increasing.

The study from crowdsourced security company Bugcrowd along with the Enterprise Strategy Group (ESG), also shows strong interest in using DevOps to automate security.

Continue reading

Encryption backdoors raise the likelihood of attack

Backdoor button

Countries with government-mandated encryption backdoors are more susceptible to nation-state attacks according to 73 percent of security professionals.

A survey from machine identity protection company Venafi also finds 69 percent believe countries with encryption backdoors suffer economic disadvantages in the global marketplace as a result.

Continue reading

More than half of internet users think complete digital privacy is impossible

Privacy

According to a report from Kaspersky Lab, 56 percent of internet users feel that complete privacy in the modern digital world is impossible.

For many people, their worries about digital privacy may come from personal experience. Kaspersky's research finds that 26 percent of people have had their private data accessed by someone without their consent, rising to almost a third (31 percent) among 16- to 24-year-olds.

Continue reading

Data breaches more common than rain in the UK

umbrella

The UK has something of a reputation for its wet climate, and its citizens for constantly talking about the weather. So it may come as a surprise to find that in the UK the chance of experiencing a data breach is higher than that of encountering a rainy day.

A survey by technology services company Probrand shows 43 percent of UK businesses having suffered a cyber breach or attack in the last 12 months as against just 36.4 percent chance on average of encountering a wet day.

Continue reading

Need for data portability is driving cloud strategies

Cloud server

The rise in container use and demands for data portability are driving decisions on cloud adoption according to a new report.

Workload automation specialist Turbonomic surveyed over 800 IT professionals to examines the underlying dynamics fueling cloud-native/container and multicloud adoption.

Continue reading

Digital cold war and other emerging threats we'll face in the next two years

data threat

A new report from the Information Security Forum looks at the threats organizations can expect to face over the next two years as a result of increasing developments in technology.

The Threat Horizon 2021 report highlights three major themes that will present particularly difficult cyber security challenges for businesses.

Continue reading

Next generation cyber defense driven by analytics and machine learning

security skull

The biggest problem for security teams is often too much data and many are addressing this by turning to analytics and machine learning, according to a new report.

The study from CyberEdge Group surveyed 1,200 IT security decision makers and practitioners and finds 47 percent intend to deploy advanced analytics solutions in the next year.

Continue reading

New solution delivers low-latency data for any sized cloud workload

Cloud

In many ways, latency is now the new downtime, as digital demands have made extreme speed and scale a requirement no matter where systems run. This can be a particular problem when moving to the cloud.

A new solution from in-memory computing platform Hazelcast will allow organizations running critical workloads in the cloud to power the most time-sensitive and demanding applications at scale.

Continue reading

As Generation Z joins the workforce what does this mean for women in tech?

In recent years the tech industry has been concerned with the role of Millennials in the workplace, but that's about to change.

2019 marks the first year that members of Generation Z (those born from 1997 onward) will start to enter the jobs market in large numbers. New research from recruiting platform HackerRank surveyed over 12,000 women developers from around the world to get their views on jobs and employers.

Continue reading

61 percent of CISOs believe employees have leaked data maliciously

web threats

A new study reveals that 79 percent of IT leaders believe that employees have put company data at risk accidentally in the last 12 months, and 61 percent believe they have done so maliciously.

The research from data security company Egress also explores how employees and executives differ in their views of what constitutes a data breach and what is acceptable behavior when sharing data.

Continue reading

Unplanned service interruptions lead to stress for engineers

workplace stress

Unplanned service interruptions which can include outages, operational overload, slowdowns in delivery, notification fatigue and other unanticipated events represent a major issue according to a new global survey of site reliability engineers (SREs).

The study by digital experience monitoring specialist Catchpoint reveals that 49 percent say they have worked on an incident in the last week, while the same percentage state they have worked on outages longer than a day in their career.

Continue reading

Trend micro calls in artists to make cybersecurity beautiful

Art of security

When you think of cybersecurity, art and beauty probably aren't the first things that come to mind. But if Trend Micro has its way that could be about to change.

The company has commissioned a number of artists to create what it calls The Art of Cybersecurity. This is a series of works based on security data, with the idea of shifting the perception of protecting systems from a burden, to something beautiful.

Continue reading

Load More Articles