Cylance brings enterprise-grade security to employees' homes

Home protection

Businesses go to great lengths to protect their corporate networks, but when staff take work home it can be hard to ensure data is kept secure when using personal devices and accessing data from the cloud.

In an innovative move, endpoint protection company Cylance is offering employees of companies that use its software the chance to use Cylance's enterprise-grade AI-powered endpoint prevention to protect their family's home PCs and Macs against malicious attackers.

Continue reading

Check Point launches enterprise cloud protection

Secure cloud

As enterprises move more of their system to the cloud, they open up more of their workloads to potential attack.

In order to offer protection against cyberattacks on cloud infrastructure workloads, services and software-as-a-service applications on public and private cloud platforms, Check Point is launching a new family of cloud security products.

Continue reading

Public cloud services like Microsoft OneDrive and Google Drive fail to protect against zero-day malware

Broken umbrella in storm

Hackers and cyber criminals are becoming wise to the fact that they can use cloud applications to spread malware.

In response, top cloud providers now offer malware protection in an attempt to stop files containing malware being uploaded. But a new report reveals that placing your trust in this protection may be ill-advised.

Continue reading

IT leaders struggle to deliver cost transparency

Worried It worker

A new survey by London-based Coeus Consulting reveals that 88 percent of respondents are unable to demonstrate cost transparency to the rest of the organization.

Those that can, however, are best positioned to deliver business agility for digital transformation and are more likely to be represented at senior level in their companies.

Continue reading

D-Link DIR-882 EXO AC-2600 MU-MIMO router [Review]

D-Link AC-2600 router

For many people a router is something that's supplied free by their internet service provider. Consequently they don't give much thought to it unless they encounter problems.

Yet, as we attach more and more devices to our home networks we put more demand on our routers and performance can start to suffer. The good news is that there's a whole world of routers out there that offer performance and connectivity features way beyond those of the basic units usually sent out by ISPs.

Continue reading

New open source platform offers secure, self-hosted collaboration

Collaboration

As businesses are keen to embrace flexible working and digital transformation, there’s increased focus on collaboration and sharing of information.

But with existing regulations like HIPAA and upcoming ones like GDPR it's important to keep collaboration secure. German company Nextcloud is launching a solution in the form of a self-hosted, open source platform offering end-to-end encryption, video and text chat, and enhanced collaboration.

Continue reading

51 percent of financial services companies believe existing tech is holding them back

held back, restrained

Legacy technology can be a major obstacle to digital transformation projects and, according to a new survey of financial services technology decision makers carried out for business consultancy Janeiro Digital, almost 51 percent say existing technology is holding back innovation.

Three of the biggest roadblocks are seen as lack of support for change (34 percent), legacy technology and infrastructure (31.6 percent) and a lack of in-house technical skill (29.5 percent).

Continue reading

Enterprises spend more than $16 million on hidden costs of detection-based security

money lock

Most organizations employ some kind of detection-based security to protect their systems. But a new report by cyber security company Bromium reveals that this approach has major hidden costs.

Upfront licensing and deployment costs security-detection tools like anti-virus are dwarfed by the cost of human skills and effort needed to manage and assess the millions of alerts and false-positive threat intelligence generated.

Continue reading

Cloud will account for 95 percent of total data center traffic by 2021

Cloud growth arrow

Cloud services are increasingly dominating the internet and could account for 95 percent of data center traffic in three years time.

This is among the findings of the latest Global Cloud Index report from networking company Cisco, which finds both consumer and business applications are contributing to the growth in demand.

Continue reading

GDPR and disclosing data breaches [Q&A]

data breach

With GDPR coming into force in May this year, companies are preparing themselves to comply with the new legislation, in particular putting in place procedures to deal with data breaches.

But some, like Uber -- who have suffered a breach in the past and covered it up -- may well be wondering whether it’s better to disclose these events now rather than risk them leaking out once GDPR is in force.

Continue reading

Fewer than a fifth of enterprises have a notification plan in place for data breaches

Keyboard with GDPR date

With the EU's GDPR legislation coming into force in a few months, and new and potentially tougher legislation on data breaches planned in the US, a new study reveals that many enterprises are under prepared.

The report from integrity assurance company Tripwire shows that less than a fifth (18 percent) say that they are fully prepared with a process in place to notify consumers in the event of a data breach. The majority (73 percent) say they are 'somewhat prepared' and would have to figure things out 'on the fly.'

Continue reading

Cyber criminals in 'gold rush' to exploit cryptocurrencies

Bitcoin gold rush

A new report from risk management and threat intelligence company Digital Shadows shows that cyber criminals are looking to exploit the boom in interest and adoption of cryptocurrencies.

The study highlights the most common methods used by these criminal actors, which include crypto jacking, account takeovers, mining fraud and scams against initial coin offerings (ICOs).

Continue reading

Security is top priority in choosing cloud solutions

cloud security

Security is the main priority when selecting cloud solutions according to a new report which shows businesses are increasingly adapting their security to suit the cloud.

The study for cloud security automation company Lacework carried out by analysts Hurwitz & Associates shows that 'safe and secure' tops the list of desirable cloud characteristics, cited by 53 percent of respondents.

Continue reading

More than half of decision makers think digital transformation has changed their roles

digital transformation

A new survey of business and IT decision makers reveals that more than half (56 percent) believe their job roles have been changed by digital transformation.

The study by the Cloud Industry Forum and Ensono research finds 51 percent reporting an increase in their responsibilities and 47 percent saying they have greater pressure to deliver.

Continue reading

DDoS threats and bot attacks are biggest threats to API security

api

APIs power many of our digital experiences, but because they provide a window into applications they also present a security risk.

A new study from cyber security company Imperva reveals that 69 percent of companies have public-facing APIs which offer a route to the sensitive data behind applications.

Continue reading

Load More Articles