New technology platform helps secure business devices

Network security

Thanks to increased use of mobile and BYOD devices, there's a significant risk to business networks from un-managed and uncontrolled devices which could offer a route for security breaches.

Israeli startup company Axonius is looking to solve this problem with a new platform designed to eliminate blind spots on the network and provide a single place to understand, manage and control the security of all end user, compute and IoT devices.

Continue reading

Ransomware is the top threat to business data

Ransomware laptop

New research from research organization the SANS Institute reveals that frontline IT professionals consider ransomware to be the top overall threat to data availability.

Insider threats and denial of service are also considered top threats to sensitive data. While the majority of respondents indicate that they escaped actual compromise of sensitive data in the last year, enough respondents did lose data to provide valuable lessons from these events.

Continue reading

New blood needed to solve the cyber security skills crisis

Vacant chair

Senior figures in IT security see enticing staff from non-IT backgrounds and encouraging young people into the industry as vital to addressing the cyber security skills shortage.

A new study commissioned by MWR InfoSecurity and carried out by security discussion and networking group RANT shows respondents feel the core skills needed in cyber security are curiosity (46 percent) or on-the-job experience (34 percent), with no respondents saying a university IT degree is crucial.

Continue reading

47 percent of UK teens have been cyber bullied

cyber bullying

According to a new study of 1,000 UK teenagers, 47 percent have been cyber bullied with 70 percent experiencing it on social media and Facebook being the most common platform.

The survey by McAfee reveals part of the problem appears to be that teens are not getting proper guidance at home or at school about staying safe online.

Continue reading

30 percent of Americans would leak private data for $1,000

Money

As we carry out more of our day-to-day transactions online, so the amount of information about us that exists out on the internet grows.

That means there are more and more opportunities for data to be leaked or stolen, but a new study by IT staffing company Modis reveals that people still aren't taking their privacy seriously.

Continue reading

New blockchain platform helps cut online ad fraud

advertisingeyeball

While digital advertising is increasingly popular, it suffers from a lack of trust due to fraud and, despite predictive technology, has relatively low accuracy. As a result, a high percentage of spend gets wasted.

Advertising ecosystem Papyrus, launching today, aims to bring together users, publishers, advertisers and developers of decentralized applications in a new way that permits them to interact in an environment with built-in fraud prevention and which offers an unprecedented level of control.

Continue reading

DMARC -- rebuilding trust in email [Q&A]

email icon

Email has become the default means of communication for both businesses and individuals, but as we saw yesterday it isn't without its problems.

A major issue email has is that of security, cyber criminals are getting better at creating phishing and other messages that accurately spoof commercial organizations. But there is a technology in the form of Domain-based Message Authentication, Reporting and Conformance (DMARC) which has the potential to restore faith in email communication.

Continue reading

New authentication methods help companies to ditch passwords

Login key

Most people now recognize that passwords alone are flawed as a means of securing systems. The problem is that there are lots of options when it comes to finding a better way of doing things.

Access control specialist SecureAuth is helping the move towards a passwordless world with the introduction of additional multi-factor authentication (MFA) methods, including Link-to-Accept via SMS or email, and YubiKey, the FIDO Universal Second-Factor (U2F) security key by Yubico.

Continue reading

How enterprises are using data to get work done

Data center worker

A new study by content management and collaboration specialist Egnyte has analyzed 25 Petabytes of customer data and four billion of the activities they performed.

This has been used to uncover unique insights about the way businesses are managing their data and how their employees are collaborating on it.

Continue reading

Sophisticated phishing attacks target Office 365

Office 365

With over 100 million monthly subscribers, it's not surprising that Office 365 is a popular target when it comes to attempting to steal credentials.

A new report from Barracuda Networks looks at how phishers are sending out authentic-looking emails purporting to be from Microsoft asking users to reactivate their accounts.

Continue reading

Happy 35th birthday email, you've changed our lives

birthday cake balloons

On August 30th 1982, Dr VA Shiva filed the first copyright for an email system. That means email turns 35 today, but though it's all grown up it's proved to be a bit of a problem child.

A new survey released to coincide with the anniversary by Edison Software, makers of an AI mail app, finds that email has grabbed a dominant role in many of our lives and this shows no signs of abating.

Continue reading

Improving the measurement of cyber threats before they turn into attacks

data threat

Cyber attacks are a major problem for companies and they can be made all the more devastating if a long time elapses before they're discovered.

A new report by the Cloud Security Alliance looks at helping enterprises develop metrics and processes to measure threats before they become cyber attacks.

Continue reading

New cloud solution allows multi-factor authentication across the enterprise

identity login

Data breaches can often be traced back to weak or stolen credentials, add in a proliferation of systems in the cloud and increasing levels of mobile access, and protecting business systems becomes a major headache.

Independent identity provider Okta is launching its latest cloud-based Okta Adaptive Multi-Factor Authentication (AMFA) that makes two-factor authentication standard for every user.

Continue reading

Intel's 8th-gen processors help deliver secure payments

secure payments lock

Earlier this month we saw Intel launch its new 8th-generation Core processors. As well as improved performance, these chips offer added security with Intel Software Guard Extensions (Intel SGX) technology.

Thanks to a collaboration with authentication specialist Nok Nok Labs (NNL) the new chips with SGX are able to deliver standards-based authentication to enable stronger, simpler, and more secure payments for computer users.

Continue reading

Why are so many organizations struggling to patch? [Q&A]

Patch download

Many recent cyber attacks like WannaCry have succeeded by exploiting vulnerabilities that, although known, have gone widely unpatched.

Why do some organizations find it so difficult to keep their systems up to date and what can they do to better protect themselves? We spoke to Wendy Nather, principal security strategist at Duo Security to find out.

Continue reading

Load More Articles