Arxan launches new protection solution for Android apps

Android umbrella

Application protection specialist Arxan Technologies is launching its latest Arxan for Android product.

It offers the industry's first protection technology for apps developed using Kotlin, the rapidly growing development language supported by Google for Android app development.

Continue reading

Cryptomining dominates mobile threat landscape

Bitcoin mobile

Threat actors are increasingly looking to exploit the popularity and volatility of cryptocurrency in their attacks on mobile devices according to a new report.

The latest Mobile Threat Landscape report from threat management specialist RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources.

Continue reading

Why the IIoT and edge computing are pushing data to the fore [Q&A]

Edge computing

The possibilities born out of the Industrial Internet of Things (IIoT) may seem endless as the scale of what it can accomplish continues to rise. By adding edge computing into the equation, the benefits for enterprises increase even further due to the real-time capabilities it enables.

With this shift comes an increased focus on data, which is at the heart of all IIoT and edge deployments. However, some enterprises are in different stages than others when it comes to utilizing that data and getting the most actionable results out of it for valuable business decision making. We spoke with Jason Andersen, VP of business line management for infrastructure availability company  Stratus Technologies, to find out more.

Continue reading

New consolidated identity system simplifies access to enterprise systems

identity verification

Employee experience platform Sapho is announcing a new identity solution to simplify how employees authenticate into systems and access their data and daily workflows.

Sapho's patent-pending Consolidated Identity system means employees can access what they need from a variety of applications without having to go into each application separately.

Continue reading

Cryptocurrency not a major threat to enterprises say security professionals

Cryptocurrency coins

While 84 percent of security professionals believe cryptocurrencies are here to stay, most don't see them as a major threat to the enterprise, despite the rise in cryptomining attacks.

A study from network protection specialist Lastline shows 45.2 percent think cryptocurrency is a mainstream alternative to conventional currencies, while 38.9 percent think it's a fringe option. 14.5 percent say they would rather collect their salary in cryptocurrency than in a traditional currency.

Continue reading

MariaDB launches Oracle compatible enterprise open source database

Business database

Enterprise computing has often been reliant on proprietary database architecture, but this can be both complex and costly, putting up a barrier to innovation.

Now open source database specialist MariaDB is launching its latest enterprise offering with Oracle compatibility. This allows existing Oracle Database users to reuse existing code and established skill sets when migrating applications or deploying new ones.

Continue reading

Contextual access management eliminates passwords

Login key

Enterprise identity provider Okta is launching a new set of contextual access management capabilities that will allow businesses to eliminate passwords.

New Adaptive Single Sign-On (SSO) and enhanced Adaptive Multi-Factor Authentication (MFA) products allow decisions based on signals such as device, IP and geolocation context for smarter, more secure identity and access management.

Continue reading

Organizations struggle with cloud costs

cloud cost

While businesses often cite cost cutting as a motive for moving to the cloud, a new report reveals that 37 percent of organizations surveyed listed unpredictable costs as a top cloud pain point.

The study by cloud management company SoftwareONE also uncovers a lack of transparency into cloud resource usage -- something nearly one third of companies find to be a challenge.

Continue reading

Enterprise data increasingly accessed from mobile devices

Business mobile devices

Enterprise users are increasingly authenticating into applications from non-office networks, with a 10 percent increase in the average number of unique networks according to the latest Trusted Access Report from Duo Security.

Duo also found that 43 percent of requests to access protected applications and data came from outside of the corporate office and network. People are logging into applications, networks and systems wherever, and whenever as work hours start to flex to fit different lifestyles, time zones and travel.

Continue reading

The bad password habits we just can't break

Written passwords

Despite a range of alternative authentication technologies, many systems still rely on passwords for their security. But a new study from Dashlane shows we’re still pretty bad at password selection.

The analysts used research from Dr Gang Wang, an assistant professor in the Department of Computer Science at Virginia Tech, which analyzed over 61 million passwords.

Continue reading

90 percent of financial institutions targeted by ransomware in the last year

ransomware key

Robbing a bank used to involve a mask, a gun and a fast car, but these days it's more likely to be done via the safer and no less lucrative means of a cyberattack.

A new report from cloud security specialist Carbon Black, based on responses from CISOs at 40 major financial institutions -- including six of the top 10 global banks -- seeks to better understand the attack landscape.

Continue reading

Half of employees not aware of their company's GDPR preparations

Man shrugging shoulders

With GDPR coming into force at the end of this week, new research from Egress Software Technologies found over half of respondents were in the dark about what their company was doing to prepare for the legislation.

Only 43 percent of the 1,000 respondents were aware of preparations, there is also a lack of awareness surrounding personal data in general. One in 10 are unaware they are handling personal data in their day-to-day jobs and 57 percent are unable to correctly identify when it would need to be protected.

Continue reading

Email fraud still a significant threat to businesses

Email fraud

Not so long ago the idea of email fraud mainly involved Nigerian princes asking for your help to liberate a few million dollars.

Things have moved on and the scammers have become more sophisticated, but email fraud is no less of a threat according to a new study by email security specialist Agari, which studied activity on 78 criminal email accounts over a period of 10 months.

Continue reading

Banks struggle to defend against internal attacks

safe

A new study from vulnerability assessment specialist Positive Technologies shows that banks have built up strong defenses against external attacks but still struggle with internal threats.

Whether they use social engineering, vulnerabilities in web applications, or the help of insiders, as soon as attackers access the internal network of a bank, they often find that it's secured no better than companies in other industries.

Continue reading

New service offers enterprises fast, easy real-time streaming

Streaming

Apache Kafka has has become increasingly popular as a data streaming platform but it can be hard for businesses to take full advantage of it without the right skills.

Now though Open Source-as-a-Service company Instaclustr is launching a new Kafka-as-a-Service solution to allow enterprises to manage high volume data streams in real-time.

Continue reading

Load More Articles