Symantec delivers integrated approach to cloud security

cloud security

Companies increasingly rely on cloud applications and infrastructure for their critical systems. Protecting these is vital and to help businesses do so, Symantec  is launching an expansion to its cloud security portfolio.

Symantec’s Cyber Defense Platform offers a broad range of protection, providing visibility and control for virtually any cloud app and integrations with CloudSOC CASB, Cloud Workload Protection (CWP) and Data Loss Protection (DLP).

Continue reading

77 percent of CISOs get conflicting advice on changing regulation

devil angel conflict

A new report released ahead of the Infosecurity North America event to be held next month, shows that the majority of chief information security officers (CISOs) are receiving conflicting advice about new or changing regulation.

In addition, when asked what regulatory bodies should do to help promote a smooth rollout of privacy regulations, 35 percent of respondents say that regulators should provide clearer communication about compliance requirements.

Continue reading

Basic identity and access management tasks are still a struggle for many

Admin login

One in three organizations rely on outdated and manual methods, like spreadsheets, to manage privileged accounts, and there's widespread lack of confidence among IT professionals in access control and privileged account management programs.

This is among the findings of a new report from One Identity which also shows one in 20 organizations have no way of knowing if users retain access even after they’ve left the organization.

Continue reading

Attacks on IIS web servers soar over the last quarter

hacker

Attacks targeting IIS servers have shown a massive 782 times increase, from 2,000 to 1.7 million, over the last quarter according to a new report.

The report from threat protection specialist eSentire reveals that most attacks targeting IIS web servers originated from China-based IP addresses.

Continue reading

4.5 billion records compromised in first half of 2018

data breach

The first half of 2018 saw 945 data breaches which led to 4.5 billion data records being compromised worldwide, according to a new report.

The latest Breach Level Index from digital security company Gemalto shows that compared to the same period in 2017, the number of lost, stolen or compromised records increased by a massive 133 percent, though the total number of breaches slightly decreased, suggesting attacks are getting more severe.

Continue reading

Arcserve launches cloud solution for business continuity

cloud data cable

The more enterprises rely on technology the more they suffer when systems fail. Data protection provider Arcserve is aiming to reduce the impact of unplanned downtime with a new cloud solution.

Arcserve Business Continuity Cloud eliminates the need for other data protection tools and management consoles with fully-integrated capabilities to protect and restore applications and systems in any location, on-premises and in public and private clouds.

Continue reading

Artificial intelligence used to identify social engineering risks

AI

Security awareness training company KnowBe4 is launching a new version of its platform using artificial intelligence to identify evolving risks.

It includes a Virtual Risk Officer that helps security or IT professionals identify risks at the user, group or organizational level, resulting in better decision making for their security awareness plans.

Continue reading

Understanding the privacy paradox

Privacy

In the modern world people often say they care about privacy, but their actions don't reflect their words. Exploring this privacy paradox is a new infographic from privacy app company Keepsafe.

It shows that 35 percent of people have concerns when making purchases on their mobile devices, but 43 percent do so anyway in the name of convenience.

Continue reading

DevOps and digital transformation are creating more insecure apps

DevOps

For enterprises looking to build new applications as the cornerstone of their digital transformation initiatives, techniques like DevOps are undeniably attractive.

But while they speed up development they also mean that nearly 70 percent of every application is made up of reusable components like third-party libraries, open source software. This means that applications can easily inherit the vulnerabilities in those components.

Continue reading

Insiders cause more than half of data breaches

web threats

Most companies consider hacker attacks to be the most dangerous threat, but according to a new report, insiders cause the majority of security incidents by either malicious or accidental actions.

The study from threat detection specialist Netwrix looks at the experiences and plans over 1500 organizations have in addressing IT risks. The insider threat is underlined by the fact that 44 percent of respondents either don't know or are unsure what their employees are doing with sensitive data.

Continue reading

Data theft malware targets Fortnite players

Fortnite logo

It's no surprise that the release of a new season of Fortnite has led to a rise in scammers keen to exploit gamers who are eager to sample the new software.

Among a rash of supposed free passes and free Android versions of the game that hide surveys and other nuisances, researchers at Malwarebytes have uncovered a malicious program seeking to steal data and Bitcoins.

Continue reading

67 percent of organizations believe hackers can penetrate their network

Network security

Around two-thirds of executives and IT professionals responding to a new survey believe that hackers would be able to penetrate their networks.

The study from security and application delivery company Radware focused on global companies and reveals that at least 89 percent of respondents have experienced attacks against web applications or web servers of the past year.

Continue reading

One in four cyberattacks targets ordinary users

Targeted user

While the majority of cyberattacks are aimed at businesses and other organizations, an increasing number are targeting ordinary users, according to the latest report from Positive Technologies.

The most attractive targets were personal data (30 percent) and credentials (22 percent), especially for online banking. To steal this data, attackers compromised a wide range of websites, including web stores, ticket vendors, and hotel booking services.

Continue reading

Behavioral analysis used to predict cybersecurity threats

Data security watch face

Internet of Things security specialist ZitoVault has patented a new means of predicting upcoming cybersecurity events.

While most existing approaches only address the real-time detection of threats or anomalies based on a limited set of pre-established data points, ZitoVault's latest patent uses a new approach.

Continue reading

Financial services breaches triple since 2016

Broken piggy bank

2018 has seen nearly three times as many breaches at financial services organizations as there were in 2016, according to a new report.

The study by cloud access security broker Bitglass finds there have been 103 breaches in this year’s report compared to just 37 two years ago.

Continue reading

Load More Articles