Ian Barker

Are 'pop-up' SOCs the answer to protect major events? [Q&A]

business security

Increasingly high profile one-off events like sports tournaments and elections are becoming the target of hackers.

Protecting these is tough because even if the hosts have a sound security infrastructure for day-to-day operations, they often don't have the resources necessary to lock down a large scale, high-profile event which requires additional physical and cybersecurity to protect against disruption, revenue loss or other irreversible damage.

Continue reading

Have you plugged it in? The silliest IT support calls of 2018

laptop on fire

Just as the biggest problem with a car is often the nut holding the wheel, many IT support issues are down to the user rather than the equipment.

UK-based support company Probrand has compiled a list of some of the oddest support calls it has received over the past year.

Continue reading

Over 90 percent of organizations hit by targeted email attacks

Malicious email

Over the past year, business email compromise (BEC) scams have jumped by 60 percent. In addition more than 90 percent of organizations report being hit by targeted email attacks, with 23 percent suffering financial damage as a result.

These findings come from the Q1 2019 Email Fraud and Identity Deception Trends report by secure email specialist Agari.

Continue reading

CISOs must change their outlook or lose their jobs

Business security

Chief information security officers (CISOs) are now involved in 90 percent of significant business decisions, but just 25 percent of business executives see CISOs as proactively enabling digital transformation -- which is a key goal for 89 percent of organizations.

These are among the findings of a new study by IDC sponsored by Capgemini  but which also shows 15 percent still believe information security is a blocker of innovation.

Continue reading

New context sensitive tool helps businesses comply with data protection

Data privacy

The introduction of new regulatory and privacy laws around the world is forcing companies to become more aware of the personal customer info they are holding, but it can be hard to identify sensitive information.

AI-based compliance platform Cognigo is launching a new data protection capability that can differentiate between sensitive and non-sensitive data based on language context.

Continue reading

How data is changing the face of marketing [Q&A]

Marketing compass

Thanks to increased ability to collect data in real time, and the use of AI to process and interpret that data, marketers have more opportunity than ever to personalize their offerings to customers.

But what does this mean for enterprises when it comes to spending their marketing budgets and establishing a digital strategy? We spoke to the CEO of DMA | Digital Marketing Agency, Solomon Thimothy to find out how digital marketing can be used to drive business growth.

Continue reading

Symantec boosts its endpoint security offering

endpoint protection

Sophisticated attackers are increasingly taking advantage of the complexity of endpoint environments to exploit gaps and discover new paths to lucrative targets.

Symantec is announcing enhancements to its endpoint security portfolio designed to defend against the most sophisticated cyberattacks as well as improving application discovery and risk assessment.

Continue reading

Rush to digital transformation puts security of data at risk

Risk dial

Digital transformation projects are underway in the vast majority of businesses, according to a new report, but 'aggressive' transformers are most at risk from data breaches.

The latest Data Threat Report from Thales eSecurity shows digital transformation in some form is happening in 97 percent of organizations. 86 percent say they feel vulnerable to threats, yet less than a third of respondents (only 30 percent) are using encryption within these environments.

Continue reading

JavaScript is favorite language among developers

Developer team

A survey of over 70,000 developers from around the world reveals that 73 percent say they are proficient in JavaScript.

The study from hiring platform HackerRank shows JavaScript has replaced Java which took the top spot last year.

Continue reading

69 percent of employees share passwords with colleagues

Written passwords

According to a new study, 69 percent of respondents admit to sharing passwords with others in the workplace, and 51 percent reuse an average of five passwords across their business and personal accounts.

The study by authentication key vendor Yubico and Ponemon, released to coincide with Data Protection Day, also finds two-factor authentication isn't widely used, 55 percent don't use it at work and 67 percent don't use it for their personal accounts.

Continue reading

Automated attacks target cloud infrastructure

Cloud data security

Enterprises continue to grow their cloud usage, but this inevitably presents challenges when it comes to keeping systems secure.

New research from Securonix Threat Research highlights an increase in automated attacks targeting cloud infrastructures.

Continue reading

Feel overlooked and underappreciated? You must work in IT security

Head in hands

Most IT security professionals in the UK feel they’re suffering from an image problem among fellow workers, according to new research commissioned by privileged access management specialist Thycotic.

Almost two thirds of respondents (63 percent) feel that their security teams are either viewed as the company naysayers -- specifically either 'doom mongers' or a 'necessary evil' (36 percent).

Continue reading

New solution protects enterprises against ransomware

Ransomware skull

Ransomware attacks are increasingly well targeted and complex, and they can prove devastating for businesses.

Storage specialist Cohesity is launching a new set of anti-ransomware capabilities for its DataPlatform that can directly combat attacks.

Continue reading

New Android app allows simple two-factor authentication across all apps and accounts

Rivetz Authenticator

We're all being encouraged to use two-factor authentication to make our online accounts more secure.

But 2FA can be a major pain when you update to a new device and have to re-authenticate everything. Even when users save their private 2FA keys to migrate onto new devices, it can still take time to manually reset 2FA for each account.

Continue reading

Consumer threats down as cybercriminals target business

Malware

Consumer threats declined by three percent in 2018 as cybercriminals learned that businesses can deliver a much bigger payout.

The latest State of Malware report from Malwarebytes shows consumer threats decreased steadily across the board including a 30 percent drop in adware, an 84 percent decrease in hijacker tools, a 28 percent decrease in worm activity and a 29 percent drop in ransomware.

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.