Half of ex-employees still have access to corporate applications

employee snoop

Businesses aren't doing enough to guard against the security risks presented by ex-employees, according to new research from identity management firm OneLogin.

The study finds that nearly half (48 percent) of respondents are aware of former employees who still have access to corporate applications, with 50 percent of IT decision-makers ex-employee's accounts remaining active once they have left the company for longer than a day.

Continue reading

New CRM product integrates with Outlook to boost productivity

CRM

Legacy CRM suites often involve slow, cumbersome interfaces, are frustrating for users and consequently don't achieve wide adoption. According to a Forrester survey, 47 percent of respondents encounter user adoption struggles when implementing their CRM initiative.

CRM specialist Insightly is launching the latest version of its product with deep Microsoft Outlook integration, as well as a redesigned technical architecture and user interface to help sales teams in mid-sized businesses improve their productivity.

Continue reading

DevOps practices help improve the quality of open source components

DevOps

The use of open source components can help speed up the software development process, but it comes with a risk if poor quality code leads to vulnerable applications being released.

The latest State of the Software Supply Chain Report from DevOps tools specialist Sonatype reveals that organizations which actively manage the quality of open source components flowing into production applications realize a 28 percent improvement in developer productivity, a 30 percent reduction in overall development costs, and a 48 percent increase in application quality.

Continue reading

IBM announces breakthrough in encryption and data protection for enterprises

IBM logo

With data breaches a problem that shows no signs of going away, businesses are increasingly seeking to protect their information with encryption.

But with large volumes of information this can be time consuming and costly. To address the problem, IBM is announcing a breakthrough encryption engine that, for the first time, makes it possible to encrypt all data associated with any application, cloud service or database all the time.

Continue reading

The US states with the highest malware infection rates

US map flag

Computer users in New Hampshire are three times more likely than those elsewhere in the US to get a malware infection on their computers according to a new report.

The study from Enigma Software Group (ESG), the company behind SpyHunter, analyzed over 1.5 million infections detected by SpyHunter across all 50 states in the first six months of this year.

Continue reading

Kaspersky brings protection to business Macs

endpoint protection

There has long been a perception that Macs are somehow immune to cyber attacks, but as the security landscape has changed they've become an attractive target for hackers looking to gain access to corporate networks.

Kaspersky Lab is launching a new edition of its Kaspersky Endpoint Security Cloud to give corporate Macs cloud-based multilayered protection. Aimed at small and medium businesses and managed service providers, it also brings more automation and management capabilities.

Continue reading

New solution prevents bots from accessing API servers

Intelligent APIs

Bots are often the culprits behind web scraping, brute force attacks, online fraud, account hijacking, data theft, and more. Often these attacks are made through the API servers that power public-facing websites and mobile applications.

A new solution from bot detection specialist Distil Networks is aimed at protecting these servers by determining whether a human is using a verified browser or mobile device to gain access.

Continue reading

A third of security professionals are unprepared for dealing with cyber threats

blindfold

One in three security professionals lack effective intelligence to detect and action cyber threats, according to a new survey from threat intelligence platform Anomali.

In addition 24 percent believe they are at least one year behind the average threat actor, with half of this sample admitting they are trailing by two to five years.

Continue reading

Digital transformation poses major network challenges for business

network

As enterprises strive to take advantage of the world of digital business, they face a number of issues surrounding the operation and control of their networks.

Network traffic intelligence company Kentik surveyed over 200 IT professionals attending Cisco Live 2017 to discover the network challenges raised by digital transformation.

Continue reading

Shopping cart attack provides insight into criminal operations

Online Shopping Cart

The Magecart attack which injects JavaScript into unpatched eCommerce sites in order to capture payment information first appeared in October last year.

Researchers at threat management specialist RiskIQ have been following a new strain of Magecart and found that it offers a rare insight into the operations of the actors behind digital threats.

Continue reading

How the authentication landscape is changing [Q&A]

Biometric scan

Recently there has been much talk of the death of the password and a switch to other forms of authentication, like biometrics, which are seen as more secure.

But is biometric security a complete answer, and do we risk swapping usability for security? We spoke to Perry Chaffee, vice president of strategy at password-less security company WWPass to find out about the latest trends in authentication.

Continue reading

Two new vulnerabilities found in Windows NTLM security protocols

open digital lock

Researchers at behavioral firewall specialist Preempt have discovered two vulnerabilities within the Microsoft Windows NT LAN Manager (NTLM) security protocols.

The first involves unprotected Lightweight Directory Access Protocol (LDAP) from NTLM relay, and the second discovery impacts Remote Desktop Protocol (RDP) Restricted-Admin mode. Both vulnerabilities can result in unauthorized credential use, risk of password cracking and potentially domain compromise.

Continue reading

DigitalOcean launches high performance cloud servers for compute intensive applications

servers cloud

Although cloud-based server infrastructure is becoming more common, it's not usually suited to applications that need very high levels of CPU performance.

Developer-focused cloud platform DigitalOcean wants to change this with High CPU 'Droplets' featuring the latest Intel Xeon Scalable processors. These provide ideal support for applications such as ad exchanges, game servers, highly active front-end application servers, and batch processing.

Continue reading

Rapid response software helps companies recover from ransomware attacks

ransomware key

Recent high profile ransomware attacks including WannaCry and NotPetya have highlighted the fact that often the time organizations take to recover is just as damaging as the attack itself.

Network visibility firm Portnox is aiming to tackle this with the launch of Rapid Ransomware Response and Control as part of its suite of network access control (NAC) systems.

Continue reading

Enhanced firewall integrates with Azure and DevOps tools

Firewall

Cloud security specialist Barracuda Networks is announcing enhancements to its firewall products to help customers speed up Microsoft Azure adoption and become cloud ready.

Barracuda NextGen Firewall and Barracuda Web Application Firewall (WAF) both now integrate with Microsoft Operations Management Service (OMS). A Barracuda WAF specific dashboard is now available in the Azure Marketplace, making it easy for administrators to take advantage of this integration.

Continue reading

Load More Articles