Improving endpoint protection is top goal for IT security professionals

endpoint protection

Three quarters of IT security professionals responding to a new survey have named improving endpoint security as one of their top two goals, with 48 percent saying it's most important.

The study by Ericom Software, a specialist in securing and connecting the digital workspace, finds 'Becoming compliant with mandatory regulations' is second, with 29 percent of respondents naming it as their top goal.

Continue reading

Personal devices are a major threat to mobile IT environments

personal devices

A new survey finds that 58 percent of respondents believe access to their network from non-corporate and personally owned devices such as laptops, desktops or mobile phones is the highest risk in managing remote users.

The study from trusted access specialist Duo Security shows that while the trend to remote working has created unmatched flexibility and helped organizations attract top talent globally, it has also introduced a major predicament for IT and security teams.

Continue reading

70 percent of businesses have experienced unplanned IT disruption in the last year

Panic

A new study from IT solutions provider US Signal reveals that 70 percent of companies have had at least one unplanned IT disruption in the last year.

These outages are caused by a variety of factors with natural disasters accounting for 53 percent, errors while implementing new technology (26 percent), ransomware (21 percent) and IT overloads (21 percent).

Continue reading

DataOps comes to the cloud

cloud button

The movement of data into the cloud creates challenges for enterprises who still rely on traditional data integration software or single-purpose data import tools.

DataOps specialist StreamSets is launching new features that help companies efficiently build and continuously operate dataflows that span data centers and the big three cloud platforms -- Microsoft Azure, AWS, and Google Cloud Platform.

Continue reading

Public cloud services used to boost DDoS attacks

DDoS attacks

Hackers are increasingly abusing public cloud services in order to launch DDoS attacks, according to new research.

The study from anti-DDoS company Link11 shows that a quarter of all DDoS attacks in Europe in the 12 months from July 2017 to June 2018 used public cloud server-based botnets, compared to 18.5 percent in the previous 12 months.

Continue reading

Better communication needed to make progress on digital transformation

digital transformation

Although a majority of businesses have followed a digital transformation plan, poor top-down communication is proving a barrier to success.

A new report from automation specialist Nintex shows that 64 percent of companies have followed a formal digital transformation plan for three years or less, while a third have followed a plan for one year or less.

Continue reading

Containerization and serverless technology grows as companies shift to digital applications

cloud network

Businesses are under increasing pressure to innovate and modernize their architectures at an unprecedented rate to remain competitive and that often means switching to new platforms.

The latest research from machine data analytics platform Sumo Logic looks at the trends and visibility into the DevSecOps tools and solutions that are being used as organizations modernize and migrate existing applications.

Continue reading

Football team names commonly used in passwords

Football players

Analysis by password manager company Dashlane shows that with the football season getting underway team names are frequently used as passwords.

Researchers focused on team names from the National Football League and the English Premier League, using an anonymized database provided by Gang Wang, an assistant professor in the Department of Computer Science at Virginia Tech.

Continue reading

41 percent of industrial control systems attacked in 2018

refinery industry

Industry increasingly relies on automated systems for the control of processes, but a new report from Kaspersky Lab shows that 41.2 percent of industrial control systems (ICS) computers were attacked by malicious software at least once in the first half of this year.

Based on analysis of systems protected by Kaspersky Lab solutions, the data shows that in 2017, the percentage of ICS computers attacked was 36.61 in the first half of the year and 37.75 in the second half.

Continue reading

Why container frameworks risk taking the focus off development [Q&A]

cloud containers

Enterprises often adopt containers as a way to save money. But they can end up spending time, resources and cash building their own container management framework and in the process getting away from their core business objectives.

We spoke to Kieron Sambrook-Smith, chief commercial officer at cloud application specialist Platform.sh, to discuss why enterprises tend to lose sight of business goals in order to manage containers, and the strategies they can implement to stop distracting their developers from doing what they do best, writing code.

Continue reading

New AI capability helps empower DevSecOps teams

DevOps

Security teams are constantly caught between the need to keep pace with security testing and the ability to allow developer teams to operate in a rapid DevOps environment.

To address this, application security provider WhiteHat Security is adding artificial intelligence to its dynamic application security testing solution WhiteHat Sentinel Dynamic.

Continue reading

Security teams turn to automation to tackle avalanche of alerts

business security

High numbers of alerts and the resources needed to deal with them are causing problems for security teams and leading them to turn to Security Orchestration, Automation and Response (SOAR) tools in order to cope.

A new report from security automation specialist Demisto finds teams are being inundated with more than 174,000 alerts every week and security teams are only able to review and respond to around 12,000 of them.

Continue reading

New forecasting solution helps companies reduce cyber risk

Risk dial

The current feeling is that the chances of a company being hacked is a matter of when rather than if, but businesses continue to struggle with how to actually measure if their security solutions are working.

Security ratings company BitSight is launching a new tool that will help customers identify the optimal course of action needed to improve their overall risk posture.

Continue reading

How well are high availability applications supported?

Tech suport

Most businesses have critical applications that are vital to their remaining in operation. But support for these programs is a mixed picture according to a new report.

The study from application availability specialist SIOS Technology finds 86 percent of organizations are operating their high availability (HA) applications with some kind of clustering or high availability mechanism in place.

Continue reading

Over 12 million Brits have fallen victim to online fraud

payment card shopping cart

Almost one in four Brits (23 percent) have been victims of fraud when shopping online -- with eight percent duped more than once, according to a new study

The inaugural Fraud Tracker report from online payment service Shieldpay  shows that the average victim loses £608, yet receives only £55 back from their bank.

Continue reading

Load More Articles