Fewer than 15 percent of businesses are fully confident of recovering data in a disaster

server failure

In a new survey ahead of this Saturday's World Backup Day, data protection specialist Arcserve reveals that while downtime is a top concern, many businesses lack confidence in their ability to recover data.

In the study of 600 channel partners and IT decision makers across America, Europe and Japan, 57 percent of respondents say they aren't confident in their ability to recover their business data in the event of a downtime or disaster event. Only just over 14 percent say they feel very confident they could recover their data.

Continue reading

Druva unifies data management across clouds

Cloud

Enterprises increasingly store data in more diverse and complex cloud environments.

Data management platform Druva is launching a new version of its cloud platform offering an as-a-service solution that unifies data protection, management and intelligence capabilities for business-critical data.

Continue reading

Carbon Black improves integration with open APIs

business security

Security teams are faced with an increasing range of problems, from the volume of attacks, to lack of visibility into networks and shortage of skills.

Endpoint security specialist Carbon Black is launching its own Carbon Black Integration Network (CbIN), a technology partner program designed to improve cybersecurity through collective defense.

Continue reading

More than half of organizations suffer mobile attacks

WiFi hotspot

Over half (57 percent) of organizations suspect their mobile workers have been hacked, or caused a mobile security issue, in the last 12 months according to a new study.

The study by mobile connectivity specialist iPass shows that public Wi-Fi is the most common source of incidents, with 81 percent of respondents saying they had seen Wi-Fi related security incidents in the last year.

Continue reading

Intel contributes code to open source edge computing project

Edge computing

The rise of IoT devices is pushing more systems towards an edge computing model in order to handle the data created more effectively.

While several open source projects exist to help solve pieces of the edge puzzle, no single project currently meets the need for a complete edge infrastructure solution.

Continue reading

New asset management platform lets businesses see and secure devices

network

One of the basic problems businesses face in preventing attacks is effective discovery and identification of their technology assets.

This is made worse by the growth of BYOD and Internet of Things devices. Israel-based Axonius is looking to solve this problem with the launch of its Cybersecurity Asset Management Platform to enable customers to see and secure all their devices.

Continue reading

Zoho launches revamped platform to create business mobile apps

Business mobile devices

Business operating system Zoho is launching an updated version of its Creator apps builder, delivering the ability to build native mobile apps to automate business processes.

Zoho Creator 5 introduces a drag-and-drop interface to complement its HTML/CSS screen creator, and includes pre-built design elements like buttons, layouts, and reports that users can drag onto their page.

Continue reading

Top vulnerabilities shift focus from Adobe to Microsoft

vulnerability bomb

A new report from threat intelligence specialist Recorded Future looks at the changing way in which attackers are using vulnerabilities.

In contrast to previous years, most of the criminal exploit kits and phishing campaigns seen in 2017 have favored Microsoft products, rather than the Adobe Flash vulnerabilities which previous research showed as being the most popular.

Continue reading

McAfee brings machine learning to enterprise security

machine learning AI

Cyber security company McAfee is announcing an expanded product portfolio that evolves security operations capabilities and allows for rapid response to today’s threats.

McAfee's updated Enterprise Security Manager (McAfee ESM 11) uses a new data architecture optimized for scalability, performance, faster search, and collaboration. This is combined with the newly launched McAfee Behavioral Analytics, and enhanced McAfee Investigator, McAfee Advanced Threat Defense, and McAfee Active Response.

Continue reading

Almost six out of 10 organizations suffer ransomware attacks

Ransomware sign

New research reveals that 56 percent of surveyed decision makers from IT and risk, fraud or compliance functions report that their organization has suffered a ransomware attack in the last 12 months, compared to under half (48 percent) who said the same in 2016.

The study of 500 businesses in the UK, France, Germany and USA commissioned by SentinelOne and carried out by Vanson Bourne shows 69 percent say the most successful ransomware attack resulted in the attacker being able to encrypt some data, with five percent paying the ransom to decrypt the data.

Continue reading

One in three consumers owns two or more smart home devices

smart home

Smart home technology is catching on in a big way with a third of US consumers now having two or more smart devices, according to a new study.

The Smart Home report from GfK Research shows a high level of awareness of the technology, with 58 percent of US consumers saying smart home technology is likely to change their lives in the next few years.

Continue reading

Unsecured third-party IoT devices could pose major risks for organizations

Internet of things

According to new research, 97 percent believe unsecured IoT devices could be catastrophic for their organization, yet just 29 percent actively monitor for related third-party risks.

The study conducted by the Ponemon Institute and risk assurance body Shared Assessments shows 81 percent of respondents say that a data breach caused by an unsecured IoT device is likely to occur in the next two years.

Continue reading

Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]

Keyboard with GDPR date

With GDPR coming into effect on 25th May, many organizations will find themselves needing to appoint a data protection officer in order to comply.

But appointing full-time compliance staff can be a difficult and costly exercise. Which is why cyber security company ThinkMarble is launching a Virtual Data Protection Officer (VDPO) service.

Continue reading

Cryptocurrency industry hit hard by DDoS attacks

DDoS attack start

Although it's relatively new, the cryptocurrency industry was the fifth most attacked by DDoS in the final quarter of 2017.

Imperva's latest Global DDoS Threat Landscape Report finds the spike in cryptocurrency prices has attracted the attention of attackers. Also the number of exchanges has increased to 190, up from 70 in Q3.

Continue reading

Legacy defenses can't keep pace with new cyber threats

Attack route

Attacks such as ransomware are able to bypass legacy security solutions because organizations are neglecting to patch, update, or replace their current products according to a new report.

The study from cyber security company Webroot also shows cryptojacking gaining ground, with over 5,000 websites being compromised with JavaScript cryptocurrency miner CoinHive to mine Monero since September 2017.

Continue reading

Load More Articles