Lack of investment in security training adds to skills gap

training key

Cyber security is seen as one of the biggest threats to business. Yet employees are not being supported by their organizations when it comes to investing in their continued education and career development.

Crowd sourced IT and security training solution Cybrary, along with cyber security research body the Cyentia Institute, have produced a report looking at the cyber skills gap.

Continue reading

Malicious mobile apps decrease in final quarter of 2017

Mobile phone malware

A new report from digital threat management company RiskIQ states malicious mobile apps declined at the end of 2017.

To reach these findings the firm analyzed 120 mobile app stores and it puts the decline down largely to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps.

Continue reading

Mainframes become more important to enterprises but staff shortages pose problems

mainframe

The mainframe is becoming more important to large enterprises, with the percentage of organizations running at least half their business-critical applications on these platforms expected to increase next year.

But the loss of skilled mainframe staff, and the failure to subsequently fill these positions, poses significant threats to application quality, velocity and efficiency.

Continue reading

The nine biggest threats organizations face in the next two years

Cyber attack

The foundations of the digital world are set to be shaken in the next two years according to the findings of a new report from the Information Security Forum (ISF).

The Threat Horizon 2020 report highlights nine major threats, broken down into three themes, that organizations can expect to face by 2020 as a result of  developments in technology.

Continue reading

New developer tool aids deployment of AI applications

Developer at work

There's increasing demand for AI and machine learning solutions from businesses, but often a shortage of skills is holding back implementation.

Cloud computing specialist Paperspace is launching a new tool called Gradient to allow developers to tap into a dedicated cloud of AI solutions for building, training and deploying machine learning applications.

Continue reading

New partnership delivers data-driven insights into customer behavior

Data analytics

Businesses have more data than ever about their customers, but it can be hard to extract meaningful insight from it.

A new partnership between data warehousing company Snowflake Computing and data analytics platform Segment aims to give enterprises the ability to carry out rapid analysis of customer data at scale.

Continue reading

Average website gets attacked 44 times a day

hacker laptop

The average website was attacked 44 times a day during the last quarter of 2017, according to new research from security specialist SiteLock.

The company analyzed six million sites to identify trends in the behavior and tactics of attackers. Though the number of attacks represents a 25 percent decrease over the previous quarter, it still means a site could be attacked 16,000 times a year.

Continue reading

Automated simulation platform helps enterprises understand cyber risks

data threat

Hackers and cyber criminals often seek to exploit human errors like misconfigurations, poor security practices and the use of shadow IT.

In order to help businesses assess the risk XM Cyber is launching an automated advanced persistent threat (APT) simulation platform, HaXM, to continuously expose all attack vectors, above and below the surface.

Continue reading

Picking through the haystack -- the role of AI in cyber security [Q&A]

AI security

Over the past year or so the idea of using artificial intelligence as an aid to cyber security has gained a lot of support.

But what role does AI and machine learning have, and what will the future of security look like when it's in widespread use? We spoke to Gene Stevens, co-founder and CTO of network security company ProtectWise to find out.

Continue reading

How cyber criminals launder their gains

bag of money

The proceeds of cyber crime make up an estimated eight to 10 percent of total illegal profits laundered globally each year, amounting to an estimated $80-$200 billion.

This is among the findings of a new report, commissioned by virtualization-based security company Bromium, into the economics of cyber crime and how criminals launder and 'cash out' the profits of their endeavors.

Continue reading

The shady world of mobile app tracking

Mobile tracking

Most of us click on the Agree button when we install apps without actually reading the privacy agreement.

But some new research from Princeton University and other bodies reveals that many apps use a network of third-party services  --  often invisible to the user -- that provide analytics, social network integration, and monetization.

Continue reading

Businesses are failing to understand the impact of cloud outages

cloud worry

Many firms in the UK are failing to understand their responsibilities in relation to systems in the cloud, according to a new study.

The research from Veritas Technologies shows that 66 percent of respondents believe that dealing with cloud service interruptions is the primary responsibility of their cloud service provider.

Continue reading

Netskope brings continuous assessment and monitoring to IaaS security

IaaS

Cloud access security specialist Netskope is launching an expansion of its Infrastructure as a Service security offering to add continuous security assessment and monitoring capabilities.

With this release customers can use Netskope for IaaS to continuously assess their infrastructure-as-aservice (IaaS) and platform-as-a-service (PaaS) configuration in AWS, with Microsoft Azure to follow soon.

Continue reading

SAP CRM servers vulnerable to online attack

hacker

Researchers at cyber security platform ERPScan have disclosed details of two vulnerabilities that allow compromise of the widely used SAP CRM system.

CRM is considered as a most critical asset by businesses. A data breach into CRM can be disastrous as it can destroy trust in the business and severely tarnish the brand as well as raising compliance issues.

Continue reading

Misconfigured security measure leads DDoS amplification attacks to soar at end of 2017

DDoS attacks

DDoS attacks using domain name server (DNS) amplification increased more than 357 percent in the fourth quarter of 2017 compared to the previous year.

A new report by protection specialist Nexusguard attributes the rise to the use of Domain Name System Security Extensions (DNSSEC), a technology that's intended to add integrity and security to the DNS protocol.

Continue reading

Load More Articles