Newly launched APIs found by attackers in under 30 seconds

API

Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and less secure. New research from Wallarm shows the average time for a new API to be found by attackers is just 29 seconds.

The research used a honeypot to look at API activity and in its first 20 days in November the lngest time taken for a new API to be discovered was 34 seconds.

Continue reading

Easier payments, robot assistants and improved accessibility -- fintech predictions for 2025

Financial technology

The banking and finance sector has already seen some major changes in technology use in recent years. These show no signs of slowing down but newer developments like AI are starting to have an impact too.

Here are some expert views on what may be in store for the fintech sector in the year to come.

Continue reading

Access tokens and service accounts next target for cyberattacks

Enterprise cyberattack

New research shows 88 percent of security leaders believe machine identities, specifically access tokens and their connected service accounts, are the next big target for attackers.

The survey from Venafi of 800 security and IT decision-makers from large organizations across the US, UK, France and Germany, finds 56 percent have experienced a security incident related to machine identities using service accounts in the last year.

Continue reading

Social media deepfake scams push fraudulent investment schemes

Deepfake plan

Social media has seen a 335 percent boom in new scams using deepfake videos and company-branded posts to lure victims into fraudulent investment schemes.

The latest threat report from ESET tracks these as HTML/Nomani, the countries with the most detections being Japan, Slovakia, Canada, Spain, and Czechia.

Continue reading

Building trust in telemetry data [Q&A]

Data analytics graphs

With the increasing importance of observability in digital operations, businesses need to ensure the reliability and relevance of their telemetry data in order to maintain system and application performance, debug, troubleshoot, respond to incidents and keep their systems secure.

We spoke to Tucker Callaway, CEO of Mezmo, to discuss the strategic considerations and concerns enterprises face in managing and optimizing their telemetry data.

Continue reading

Threats to encryption, security fears and a race to gain a competitive edge -- quantum predictions for 2025

Quantum Qubits

As we approach the end of the year it's time to start wondering what the next one will have in store. As always we'll be running a series of pieces looking at what industry experts think will be key tech industry trends for 2025.

We start with a look at quantum, which is getting ever closer to widespread commercial deployment and could open up great opportunities but is also leading to increasing fears about security.

Continue reading

Consumers resolve to learn AI in 2025

2025 futuristic AI concept with chatbot and cityscape background at night.

At the dawn of a new year most people plan to make lifestyle changes like losing weight or giving up smoking. But new research commissioned by Tech Show London reveals that over 12 million UK consumers plan to make learning AI a New Year's resolution for 2025.

This growing interest in mastering AI signals a shift towards greater understanding and engagement with the technology that is increasingly shaping our lives. 46 percent of those surveyed agree that AI will fundamentally transform our relationship with technology.

Continue reading

The future of managed file transfer (MFT) in the era of digital transformation [Q&A]

file transfer concept with folder and files transfering move with security and padlock and team people with modern flat style - vector

In a time when there's a greater need than ever for remote and online collaboration, the secure transfer of information and digitized records is a non-negotiable essential.

As more enterprise employees create and share increasing amounts of sensitive content, organizations need to be able to manage all of their sensitive data transfers between partners, customers, users and systems, have complete visibility and control over where data goes and ensure the highest levels of security.

Continue reading

70 percent of cybersecurity leaders worry about personal liability

Worry scared stress fret

Stories of CISOs being held personally liable for cybersecurity incidents has negatively affected their opinion of the role for 70 percent of respondents to a new survey.

At the same time 34 percent in the study for BlackFog, of 400 IT decision makers across the US and UK, believe that the trend of individuals being prosecuted following a cyberattack was a 'no-win' situation for security leaders: facing internal consequences if they report failings and prosecuted if they don't.

Continue reading

Demand for AI could exceed computing capacity

explode robot AI

AI, and generative AI in particular, is expected to greatly enhance productivity within work processes. Some studies estimate that generative AI could contribute between $2.6 trillion and $4.4 trillion annually to the economy.

However, AI infrastructure is costly because the underlying algorithmic problems are extremely computationally intensive and this means there's a potential gap between demand and the capacity needed to meet it.

Continue reading

The skills that cybersecurity leaders need

C-suite board meeting

A new cybersecurity leadership survey from ISC2 shows 85 percent of all respondents identify communication as the most important leadership quality, followed by strategic thinking (41 percent), open-mindedness (37 percent), technical expertise (33 percent) and decisiveness (21 percent).

However, the findings reveal that formal leadership training remains largely inaccessible for most respondents, with fewer than 63 percent reporting they have received such formal training. Instead, 81 percent say they primarily developed leadership skills through on-the-job experiences with supervisors and managers.

Continue reading

Neglect of endpoints presents a major security gap for enterprises

Endpoint security - Inscription on Blue Keyboard Key.

A new report shows that endpoint platform security -- securing the hardware and firmware of PCs, laptops and printers -- is often overlooked, weakening cybersecurity posture for years to come.

The report from HP Wolf Security is based on a global study of over 800 IT and security decision-makers (ITSDMs) and over 6,000 work-from-anywhere (WFA) employees, it shows that platform security is a growing concern with 81 percent of ITSDMs agreeing that hardware and firmware security must become a priority to ensure attackers cannot exploit vulnerable devices.

Continue reading

Santa Claus may be coming to town but bots are getting all the best Christmas presents

Santa robot

New research from Imperva shows that 71 percent of UK consumers believe bad bots are ruining Christmas by snapping up all the most wanted presents.

It finds that 40 percent of consumers surveyed say they have been thwarted when trying to buy a gift in the past, only to find that it was completely sold out.

Continue reading

97 percent of banks hit by third-party data breaches

Enterprise data breach

New analysis released by SecurityScorecard reveals that 97 percent of the top 100 US banks have experienced a third-party data breach in the past year.

As banks increasingly rely on third-party vendors for core functions, their exposure to supply chain vulnerabilities increases. Using the largest proprietary risk and threat intelligence dataset, SecurityScorecard's experts analyzed how third-party breaches impact the banking sector.

Continue reading

'Circuit compression' technology brings commercial quantum a step closer

quantum computing

Quantum computing is something that we've been covering for a while but commercial implementations always seem to be tantalizingly out of reach.

It could be getting nearer though thanks to work by Classiq Technologies, with Deloitte Tohmatsu Group, and Mitsubishi Chemical Corporation to demonstrate improved circuit compression.

Continue reading

Load More Articles