Top US banks have multiple online security flaws

online banking

Analysis of the internet presence of 25 out of 50 top US banks reveals a worrying number of online security flaws.

Threat management company RiskIQ used its Digital Footprint product, which provides a real-time inventory of all internet-facing assets, including the components running on assets that may expose the organization to vulnerability risk. It also correlates newly discovered vulnerabilities with internet-exposed components and assets, highlighting those at risk to inform patching and remediation planning.

Continue reading

GDPR and the challenge of personal data discovery

GDPR touchscreen

For enterprises to comply with GDPR it's vital that they have an understanding of where personal data is located in each of their systems.

Metadata discovery specialist Silwood Technology is releasing research into five of the largest and most widely used application packages to understand the scale of the challenge encountered by their customers when locating personal data.

Continue reading

Cyber security in (big) numbers

Bricata security graphic header

We hear a lot about cyber attacks and the latest threats, but it can sometimes be hard to comprehend the scale of the problem.

Network security company Bricata has produced an infographic that sets out some of the statistics to put things into context.

Continue reading

Cisco launches cloud-based endpoint protection for MSSPs

Endpoint protection

According to Networking specialist Cisco, almost half of SMBs and enterprises in the US are outsourcing at least some of their security to managed security service providers (MSSPs) in order to counter the latest advanced threats.

The company is targeting this market by launching a set of new endpoint security solutions aimed specifically at MSSPs. These include three powerful cloud-based tools.

Continue reading

Growth in Android ransomware slows, but it's getting sneakier

Mobile ransomware

While Android ransomware is still growing, it's doing so at a slower rate than at its peak in 2016. However, it is using sneaky new techniques to trick users.

New findings from researchers at ESET reveal techniques like the misuse of Android's Accessibility services being used to infect devices. The most popular attack technique though remains screen-locking followed by a ransom demand. The most frequently detected variant being the Android/Locker family.

Continue reading

2017 breaks record for new vulnerabilities

Risk dial

More than 20,000 new vulnerabilities were cataloged in 2017 according to breach analysis specialist Risk Based Security.

The figures from the company's own VulnDB eclipsed the total covered by MITRE's Common Vulnerability Enumeration (CVE) and the National Vulnerability Database (NVD) by more than 7,900.

Continue reading

Contractors pose cyber risk to government agencies

Capitol building

While US government agencies are continuing to improve their security performance over time, the contractors they employ are failing to meet the same standards according to a new report.

The study by security rankings specialist BitSight sampled over 1,200 federal contractors and finds that the security rating for federal agencies was 15 or more points higher than the mean of any contractor sector.

Continue reading

Why Google is building its own ad blocker

TechWyse infographic header

As one of the major players in online advertising it might seem surprising that Google is introducing its own ad filtering feature to Chrome.

Partly though this is a fight back against the increasing use of ad blockers that block Google’s own ads and is aimed at the most annoying ad types like pop ups and autoplay videos. Internet marketing company TechWyse has put together an infographic explaining the thinking behind Google’s decision.

Continue reading

Cryptomining malware tops January's 'most wanted' list

cryptocurrency mining

Malware seeking to steal processor time for crypto currency mining continues to be a problem, with 23 percent of organizations globally affected by a Coinhive variant in January.

These findings come from a study by Check Point which discovered three different variants of cryptomining malware in its top 10 most prevalent listing, with Coinhive ranking first.

Continue reading

NTT Security and ThreatQuotient partner to deliver threat intelligence

AI security

With a wider threat landscape presented by cloud and digital transformation strategies, accurate and up to date threat intelligence is more important than ever to protect against attacks.

To meet this need, NTT Security, the specialized security company of NTT Group, has partnered with ThreatQuotient to offer an improved threat intelligence capability.

Continue reading

Cloud adoption is up but 35 percent of spend is wasted

Cloud dollars

The dash to move data and applications to the cloud shows no signs of slowing down, but while the adoption of cloud solutions is up there are still major challenges.

A new report from cloud delivery specialist RightScale shows that 26 percent of enterprises (with more than 1,000 employees) are spending over $6 million a year on public cloud.

Continue reading

Business data is getting bigger

Data folders backup

It probably comes as no surprise that we're all storing more data. But just how much of an impact is this having for businesses.

Enterprise file sharing specialist Egnyte says 82 percent of businesses are hybrid-enabled, keeping their data both physically backed up and in put into cloud storage. This is up from 76 percent in 2016.

Continue reading

Despite challenges, mainframe use is still central to large enterprises

mainframe

Mainframes are still vital to many larger businesses and a new report from Syncsort highlights some key trends including the mainframe’s role in strategic projects.

The results show the mainframe remains strategic to businesses, with 57 percent of respondents saying it will continue to be the main hub for business-critical applications this year. It will run revenue-generating services for 43 percent. Cost control is a priority though, 51 percent say they plan to cut IT costs by optimizing mainframe resources.

Continue reading

New edge computing platform helps industry handle IIoT data

Industrial internet of things

Growing amounts of data from Industrial Internet of Things devices is placing increased strain on conventional network infrastructure.

One way of dealing with this is to move computing resources closer to the edge, and Stratus Technologies is launching a new virtualized and self-protecting edge computing platform that’s specifically designed for industrial environments.

Continue reading

Security service providers suffer from false positive alert overload

Drowning in paper

A new survey of managed security service providers (MSSPs) reveals that they are suffering an avalanche of false positive security alerts.

The study from Advanced Threat Analytics reveals that 44 percent of respondents report a 50 percent or higher false-positive rate, half of those experience a 50-75 percent false-positive rate and the remainder a startling 75-99 percent rate.

Continue reading

Load More Articles