Poor security habits made worse by the speed of digital transformation

password reminders

According to a new study, 75 percent of people admit to reusing passwords across accounts, including work and personal, compared to 56 percent who admitted to doing so in 2014.

The Market Pulse Survey by identity management specialist SailPoint shows that digital transformation efforts are leading to increasingly complex IT environments for businesses and employees to manage securely.

Continue reading

Docker launches Windows Server application migration program

Docker

Containerization enables organizations to both modernize existing applications and adopt new technologies based on business requirements. But the process of migrating older systems can be daunting.

Popular container platform Docker is addressing this with the launch of a new Windows Server application migration program. This is designed to allow businesses to migrate and modernize their legacy Windows Server applications in advance of the end-of-support deadline for Microsoft Windows Server 2008.

Continue reading

95 percent of IT security professionals underestimate phishing risks

Phishing

A new survey of cybersecurity decision-makers shows that most companies lack adequate safeguards against phishing threats and many don't fully understand the risks or how widespread the threat is.

The survey from phishing site detection company SlashNext reveals that 95 percent of respondents underestimate how frequently phishing is used at the start of attacks to successfully breach enterprise networks.

Continue reading

Number of data breaches falls but 2018 is still set to be the second worst year on record

data breach

In the final quarter of 2018, the number of reported breaches is down by eight percent and the number of exposed records is down around 49 percent, from seven billion in 2017.

The latest Data Breach QuickView report from Risk Based Security shows that seven breaches exposed 100 million or more records with the 10 largest breaches accounting for 84.5 percent of the records exposed this year to date.

Continue reading

Organizations find cloud costs higher than anticipated

Cloud money

Cloud adoption is high, with 78 percent using or planning to use cloud in the future, but most organizations lack a formal strategy to realize the full benefits and 62 percent report higher than anticipated costs.

These are among the findings of a new survey by Syncsort that shows only 29 percent report having a centralized strategy and center of excellence in place to proactively plan and manage applications to the cloud, while 42 percent migrate applications on an ad-hoc basis.

Continue reading

Consumers are more ready to abandon brands following data breaches

data breach

According to a new study, 78 percent of people would stop engaging with a brand online and 36 percent would stop engaging altogether if the brand had experienced a data breach.

The research by Ping Identity looks at consumer attitudes and behavior in the Post-Breach Era and reveals that people are more willing to make changes to the ways they interact with companies and secure their own personal data following a breach.

Continue reading

Continuous authentication helps boost behavioral analytics

web authentication

In a move to better protect accounts, banks, retailers and service providers are increasingly looking to methods of authentication beyond the password.

Behavioral analytics specialist BehavioSec is launching an updated version of its platform, allowing it to detect the suspicious use of attack obfuscation techniques, including the use of VPNs and TOR-routed traffic during login attempts and sessions.

Continue reading

Enterprises face more than 100 critical vulnerabilities per day

vulnerability

Enterprises identify 870 unique vulnerabilities on their systems every day, on average. Of those, more than 100 are rated as critical on the common vulnerability scoring system (CVSS) according to a new report.

The Vulnerability Intelligence Report from cyber risk company Tenable is based on analysis of anonymized data from 900,000 vulnerability assessments across 2,100 enterprises.

Continue reading

Consumers still reuse passwords despite knowing the risks

password on tablet

Despite almost half of US consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing passwords and PINs across multiple accounts.

According to a new fraud awareness survey by information destruction company Shred-it, 39 percent of consumers have been a victim of fraud or identity theft, and 27 percent admit that they don't know how to find out if they've become a victim.

Continue reading

Pssst... Wanna buy a digital identity? Only $50

Cybercriminal with cash

Ever wondered how much your life might be worth? If we're talking about the digital world then the answer might be, 'not very much.'

Cybercriminals could sell your complete digital life, including social media accounts, banking details, app data, gaming accounts, and even remote access to servers or desktops, for as little as $50.

Continue reading

A new approach to data protection at the edge [Q&A]

Edge computing

Given the increase in both frequency and complexity of cyberattacks today, it's no surprise that security is coming to the forefront across industries.

While people often view cybersecurity as hackers trying to steal data, threats can impact more than just traditional data loss. With new technologies like edge computing emerging, we need to start thinking about protecting physical infrastructure in addition to data at the edge.

Continue reading

Microsoft and Amazon most impersonated in email attacks

Email

Nearly two-thirds of all advanced email attacks used emails impersonating Microsoft or Amazon, according to new research by Agari, the email protection specialist.

Microsoft was impersonated in 36 percent of all display name impersonation attacks in the third quarter. Amazon was the second most commonly impersonated company, used in 27 percent of these attacks.

Continue reading

New monitoring tool checks the dark web for stolen credentials

Stealing password from code

Stolen login details are highly prized by cybercriminals, whether they are used to penetrate corporate networks or to make extortion emails look more convincing.

But often breached companies are slow to let users know their credentials have been stolen. This has begun to change in Europe thanks to GDPR, but in the US there is, as yet, no federal law regulating what companies must do if their users' information is stolen or compromised.

Continue reading

Cyberattacks on energy and utility companies increase

power lines

Attacks on infrastructure and energy companies are increasing, but they are occurring inside enterprise IT networks, not directly in the critical infrastructure, according to a new report.

AI powered attack detection specialist Vectra finds attackers typically gain a foothold in energy and utilities networks by staging malware and spear-phishing to steal administrative credentials.

Continue reading

Machine learning solution helps protect critical data

machine learning AI

One of the problems that businesses can have protecting sensitive data is the task of actually locating it in the first place.

Data protection specialist TITUS is launching a new Intelligent Protection solution that offers businesses a model based on their specific data protection needs while using machine learning to provide additional consistency and accuracy to data protection initiatives.

Continue reading

Load More Articles