New cloud app helps businesses understand their IT environments

network

As systems become more complex it can be hard for enterprises to understand their IT environment, which presents a problem for operations and security teams.

Cloud-based security specialist Qualys is launching a new IT Asset Inventory cloud application to provide quick analysis of complex and interconnected global IT environments, and help collaboration on security remediation efforts.

Continue reading

Number of DDoS attacks falls but sophistication improves

DDoS attack

2018 saw a decline of 13 percent in the overall number of DDoS attacks when compared to the previous year, but cybercriminals are turning to longer, more sophisticated, mixed and HTTP flood attack techniques.

This is revealed in Kaspersky Lab's DDoS Q4 2018 Intelligence Report, which also shows the average attack duration has grown. Compared with the beginning of the year, the average length of attacks has more than doubled -- from 95 minutes in Q1 to 218 minutes in Q4 2018.

Continue reading

Microsoft continues to beat Google in battle of the enterprise apps

Business technology

A new survey from identity platform Okta shows that 67 percent of knowledge workers prefer Microsoft Word over Google Docs, while only 15 percent report the opposite.

Another 16 percent identify Google Docs as a top-three most frustrating app. When it comes to email, 49 percent prefer Microsoft Outlook over Gmail, while 35 percent report the opposite.

Continue reading

Airline e-ticketing systems put passenger data at risk

aircraft

Airlines could be putting the personal data of their passengers at risk by using unencrypted links, according to a new report.

Researchers at security and data management company Wandera have uncovered a vulnerability affecting a number of e-ticketing systems that could allow third parties to view, and in some cases even change, a user's flight booking details, or print their boarding passes.

Continue reading

Two-thirds of organizations bypass IT for digital transformation projects

Bypass

According to a new report released by The Economist Intelligence Unit and sponsored by BMC software, 66 percent of organizations bypass IT when buying new technologies for digital transformation.

But despite this, 43 percent of firms still hold IT accountable if something goes wrong with their digital transformation initiatives.

Continue reading

Google launches new tools to help protect your accounts

Google password checkup

To coincide with Safer Internet Day, search giant Google is launching two new tools to help users detect if their username and password have been compromised.

Google's own research published today shows that many people still reuse passwords. The new tools are designed to raise awareness of account issues.

Continue reading

Most people believe they're more secure online than they really are

Online security

New research commissioned by Google, carried out by Harris Poll and released to coincide with Safer Internet Day suggests there is a gap between perception and reality when it comes to online security.

The majority of people (69 percent) give themselves an A or B when it comes to protecting their online accounts -- only five percent give themselves a D or an F. In fact, most people (59 percent) believe that their accounts are safer from online threats than the average person and 61 percent say they are too smart to fall for a phishing scam.

Continue reading

New tool makes it easier to secure IoT devices

Wireless internet of things

Internet of Things devices are appearing in more and more companies, but with them comes the threat of cyberattacks.

To reduce this risk Extreme Networks is launching a simple security solution to help organizations protect unsecured IoT devices.

Continue reading

Are 'pop-up' SOCs the answer to protect major events? [Q&A]

business security

Increasingly high profile one-off events like sports tournaments and elections are becoming the target of hackers.

Protecting these is tough because even if the hosts have a sound security infrastructure for day-to-day operations, they often don't have the resources necessary to lock down a large scale, high-profile event which requires additional physical and cybersecurity to protect against disruption, revenue loss or other irreversible damage.

Continue reading

Have you plugged it in? The silliest IT support calls of 2018

laptop on fire

Just as the biggest problem with a car is often the nut holding the wheel, many IT support issues are down to the user rather than the equipment.

UK-based support company Probrand has compiled a list of some of the oddest support calls it has received over the past year.

Continue reading

Over 90 percent of organizations hit by targeted email attacks

Malicious email

Over the past year, business email compromise (BEC) scams have jumped by 60 percent. In addition more than 90 percent of organizations report being hit by targeted email attacks, with 23 percent suffering financial damage as a result.

These findings come from the Q1 2019 Email Fraud and Identity Deception Trends report by secure email specialist Agari.

Continue reading

CISOs must change their outlook or lose their jobs

Business security

Chief information security officers (CISOs) are now involved in 90 percent of significant business decisions, but just 25 percent of business executives see CISOs as proactively enabling digital transformation -- which is a key goal for 89 percent of organizations.

These are among the findings of a new study by IDC sponsored by Capgemini  but which also shows 15 percent still believe information security is a blocker of innovation.

Continue reading

New context sensitive tool helps businesses comply with data protection

Data privacy

The introduction of new regulatory and privacy laws around the world is forcing companies to become more aware of the personal customer info they are holding, but it can be hard to identify sensitive information.

AI-based compliance platform Cognigo is launching a new data protection capability that can differentiate between sensitive and non-sensitive data based on language context.

Continue reading

How data is changing the face of marketing [Q&A]

Marketing compass

Thanks to increased ability to collect data in real time, and the use of AI to process and interpret that data, marketers have more opportunity than ever to personalize their offerings to customers.

But what does this mean for enterprises when it comes to spending their marketing budgets and establishing a digital strategy? We spoke to the CEO of DMA | Digital Marketing Agency, Solomon Thimothy to find out how digital marketing can be used to drive business growth.

Continue reading

Symantec boosts its endpoint security offering

endpoint protection

Sophisticated attackers are increasingly taking advantage of the complexity of endpoint environments to exploit gaps and discover new paths to lucrative targets.

Symantec is announcing enhancements to its endpoint security portfolio designed to defend against the most sophisticated cyberattacks as well as improving application discovery and risk assessment.

Continue reading

Load More Articles