The challenges of securing mobile devices

Mobile security

Mobile devices now account for around half of web traffic and inevitably that makes them more attractive to hackers who see new attack routes via mobile apps.

The Information Security Forum is launching a new paper, Securing Mobile Apps: Embracing Mobile, Balancing Control, describing the security challenges associated with acquiring, using and operating mobile apps, and suggesting actions to manage those challenges, while maintaining the business benefits.

Continue reading

People are the biggest barrier to cloud success

resistance to cloud

Enterprises have a clear appetite to move to the cloud, but businesses are creating additional technical complexity and recruitment challenges in the process, according to a new report.

The study carried out by 451 Research for cloud provider Skytap finds 67 percent of respondents plan to migrate or modernize at least half their on-premises applications in the next 12-24 months. As a result of this process, nearly two-thirds of respondents expect better customer responsiveness and to be more competitive.

Continue reading

The key challenges for security operations center staff

business security

Security operations centers are understaffed according to 45 percent of professionals who work in them, and of those, 63 percent think they could use anywhere from two to 10 additional employees.

This is among the findings of a new survey from Exabeam released today at Infosecurity Europe. It shows 62 percent of managers and frontline employees see inexperienced staff as a problem, compared to just 21 percent of CIO and CISOs.

Continue reading

New analytics platform helps deliver AI for business

Artificial intelligence

The biggest challenges that businesses face when implementing AI projects relate to the handling of data as it often sits in a separate silo.

Analytics specialist Databricks is addressing this problem with a Unified Analytics Platform with new capabilities to unify data and AI teams and technologies.

Continue reading

Florida residents have the worst cybersecurity habits in the US

Risky florida

A study by cybersecurity company Webroot in conjunction with the Ponemon Institute finds Florida to be the worst state in the US for cyber-hygiene.

Ponemon surveyed 4,000 people across the US about their cybersecurity knowledge and internet safety practices. Wyoming and Montana come close behind Florida in poor internet habits. The safest online behavior is displayed in New Hampshire, Massachusetts, and Utah.

Continue reading

A third of IT professionals don't know how many endpoints they manage

network

A poll of 1,000 IT professionals across North America and Europe finds that while 88 percent of respondents acknowledge the importance of endpoint management, nearly a third don't know how many endpoints they actually manage.

The study by identity and access management company LogMeIn shows a worrying 30 percent of IT professionals don't know how many endpoint devices exist within their organization. Those who do report an average of 750 endpoints including servers, employee computers and mobile devices.

Continue reading

Serverless applications open to new wave of cryptojacking

Cryptojacking

Serverless computing is increasingly popular as it allows developers to upload code for functions to the cloud rather than run it on local servers.

But specialist in serverless security PureSec has released a report detailing how hackers can turn a single vulnerable serverless function into a virtual cryptomining farm by taking advantage of the scaleable nature of the architecture.

Continue reading

Sophisticated keyloggers target financial services companies

keylogger

Analysis of malware samples found among finance firms has uncovered an unusually large number of iSpy keylogger samples. iSpy is a variant of the notorious HawkEye logger.

Network-based malware protection specialist Lastline intercepted the logger's communication with the command and control server and detected the active exfiltration of website, email and FTP credentials, as well as license key information for installed products.

Continue reading

Companies are still struggling to secure the cloud

cloud padlock

A new survey from data analytics platform Sumo Logic finds a staggering 98 percent of European companies face organizational challenges implementing security in cloud environments.

The survey of over 300 IT security professionals responsible for environments with significant investment in both cloud and on-premise IT infrastructure covered the US and Canada, and Europe, The Middle East and Africa (EMEA).

Continue reading

44 percent of organizations have suffered a data breach in the last year

data breach

In the last 12 months, 44 percent of organizations have suffered at least one data breach. More worrying is that of those reporting a data breach, the average was almost 30 data breaches per organization in the last year.

This is according to a study from identity management company SailPoint, released at this week's Infosecurity Europe. These breaches cost the organizations nearly $1 million to address from an IT perspective, which excludes fines, lost revenue and brand damage.

Continue reading

Employees in technology-enabled workplaces have better job satisfaction

People are happier in their work and more positive about the future if they're working in a digital environment, according to new research.

The report from cloud networking company HPE Aruba also shows workers are positive about using more automated technology, challenging the received wisdom that we’re all scared about machines taking our jobs.

Continue reading

New tool streamlines workflow automation across platforms

Automation

Employees often spend valuable time keeping their various work apps coordinated and synchronized, which harms productivity.

Cloud-based mobile app building platform Appy Pie is addressing this problem with the launch of its 'Connect' tool, a productivity solution that allows businesses to streamline tasks and automate workflow across multiple applications simultaneously.

Continue reading

Consumers' privacy concerns not backed by their actions

Data privacy

A large majority of people say they are concerned about their online privacy, but this is not reflected in their actions according to a new study.

The survey from Blue Fountain Media reveals that 90 percent of respondents are very concerned about their internet privacy and 48 percent wish 'more was being done about it'.

Continue reading

Bad vibrations: How sound could be used to interfere with your hard drive

Hard drive attack

It's well known that sound at particular levels can cause problems -- we've all seen demonstrations of wine glasses being shattered by high frequencies, for example.

You might not think that's much of an issue for computers, but researchers at the University of Michigan and Zhejiang University in China have shown that sounds can be used to interfere with disks.

Continue reading

Enterprise adoption of Office 365 surges as usage of G Suite levels out

Cloud growth arrow

Using cloud apps is fast becoming standard practice for businesses and Microsoft Office 365 usage is accelerating ahead of Google's G Suite, according to a new report.

The 2018 Cloud Adoption Report from cloud security company Bitglass shows global cloud adoption has topped 81 percent -- a 37 percent increase since 2016 and a 238 percent increase since 2014.

Continue reading

Load More Articles