Conversational interface helps insider threat detection

Threat

Lack of visibility into endpoints poses a major issue for enterprises as IT administrators can be left in the dark about where data is and how it's being used.

This means that when data breaches occur it can take longer to detect the source. A new tool from ThinAir aims to shorten this detection time by analyzing interactions and making information available via a conversational interface.

Continue reading

Cyber risks are being created by departments outside IT

risk jigsaw piece

More risks are being created by departments outside of IT, but it's still the IT department's problem according to a new survey.

The study by identity platform SailPoint shows that 55 percent of respondents believe one of the key reasons that non-IT departments introduce the most risk is that they often lack the understanding of what actions and behaviors are potentially hazardous.

Continue reading

66 percent of SMBs could go out of business following a breach

shop closed sign

Today's threat landscape is becoming increasingly more complex and sophisticated, And all sizes of business are at risk.

VIPRE Security has released the results of a survey of 250 SMB IT managers which shows that 66 percent say they would either go out of business or shut down for a day or more if their systems and/or data were compromised.

Continue reading

Compuware brings mainframe development to the cloud

Cloud server

Many larger enterprises still rely on older, legacy systems developed in COBOL that don’t lend themselves to the latest Agile and DevOps development techniques.

Mainframe development specialist Compuware is deploying its Topaz flagship solution for mainframe Agile/DevOps on Amazon Web Services (AWS). This gives cloud access to modern mainframe development, enabling enterprises to deploy agile tools for COBOL and other legacy code bases fast.

Continue reading

Strategies for dramatically cutting public cloud costs [Q&A]

cloud cost

IT teams are increasingly moving to the public cloud for its supposed low cost and high agility. However, once implemented in their environments, people are finding public cloud to be expensive and fairly complex to manage.

We spoke to Andrew Hillier, CTO of cloud optimization analytics service provider Densify, who is all too familiar with the struggles that IT organizations face as their public cloud costs rise through the roof. Read on for his insights into strategies that organizations can implement when looking to reduce cost, risk and complexity in the public cloud.

Continue reading

Failed updates leave Mac computers at risk from targeted attacks on firmware

cracked_apple

The Extensible Firmware Interface (EFI) has steadily replaced BIOS in recent years as means of booting and controlling hardware devices.

Mac systems have used EFI since 2006 but an analysis by Duo Labs, the research arm of Duo Security, of more than 73,000 Mac systems finds that in many cases the EFI is not receiving security updates, leaving users vulnerable to attacks.

Continue reading

Edifier e235 Luna E -- solid sound meets deep-sea vibe [Review]

Edifier e235

For people who have invested in a large screen TV with a view to enjoying a home cinema experience, one of the most common complaints is the quality of the built-in speakers.

The latest flat-screen TVs lack the big wooden cabinets of old for sound to resonate around in and so the audio quality from their on-board speakers tends to be a bit weedy. Most therefore look to add a soundbar or external speaker system to improve the experience.

Continue reading

Inadequate processes for managing accounts and access create major security risks

Admin login

Poor management of user accounts is leaving organizations open to security and compliance risks according to a new report.

Identity and access management specialist One Identity surveyed over 900 IT security professionals, in conjunction with Dimensional Research, and finds that what should be security best practices -- such as swift removal of access to corporate data and applications, dormant account identification, and role administration -- continue to be a challenge for many enterprises.

Continue reading

Attackers impersonate bank emails to cash in on post-Equifax fears

password theft

In the wake of the recent breach at credit agency Equifax it's only natural that people are keeping a close eye on their bank statements and credit reports.

Of course the bad guys know this too and a new report by Barracuda Networks looks at an email attack that is impersonating a 'secure message' from financial institutions.

Continue reading

New DevOps toolkit automates database changes to remove bottlenecks

DevOps

DevOps is a popular choice with companies looking to streamline software delivery, but it often encounters a road block when changes to databases are needed.

In businesses databases are often historically developed and need to be managed differently due to their complexity and their sometimes sensitive nature. Systems management and security company Quest Software is launching a new toolkit to help organizations automate database changes within their existing DevOps processes.

Continue reading

IT maturity improves in small and medium sized businesses

business maturity

A new study by IT management specialist Kaseya looks at IT department practices and for the second year in a row finds a growing level of maturity in SMBs and mid-market companies.

Kaseya uses an IT Management Maturity Model that divides companies into five levels, from the lowest 'Reactive' through 'Efficient', 'Proactive' and 'Aligned' up to the highest 'Strategic'.

Continue reading

BullGuard rolls out its next generation anti-malware engine

BullGuard Premium

The cyber security market doesn't stand still for long and there's a constant arms race between the good and bad guys.

Security company BullGuard is doing its bit to keep up by launching its next-generation anti-malware engine that's capable of detecting the latest zero-day threats. It will be rolled out across a range of BullGuard endpoint protection products.

Continue reading

Phishing attacks reduce but more companies are targeted

Phishing

Threat detection company RiskIQ has released the latest of its quarterly reports into threat trends, this one looking at phishing.

It finds that in the second quarter of 2017 there were 39,320 unique phishing domains, down from 45,025 back in the first quarter. However, there were 316 targeted phishing brands in Q2 -- up 15.7 percent from the 273 brands targeted in Q1.

Continue reading

New platform adds self-managing storage to Azure and AWS

cloud network

It's important for enterprises to correctly size their public clouds in order to control costs and optimize performance.

Cloud management company Turbonomic is using this week's Microsoft Ignite conference to announce a new version of its platform that delivers dynamic optimization and allocation of storage and relational database services.

Continue reading

Security Serious Week aims to help UK businesses tackle the skills gap

Business security

As part of the European Cyber Security Awareness Month, the first week of October in the UK marks Security Serious Week.

This not-for-profit event set up by Eskenzi PR will present five panel-style webinars for participants from UK businesses on the theme of Bridging the Cyber Skills Gap through Diversity and Creativity.

Continue reading

Load More Articles