Intelligent chatbot helps boost endpoint security

AI security

It's vital to protect endpoints within the enterprise, but often the level of alerts generated by conventional solutions can prove overwhelming for security analysts.

Cyber security platform Endgame is introducing new features to simplify attack detection, threat hunting, and response, including the use of an intelligent chatbot.

Continue reading

SailPoint brings AI to identity management

Artificial intelligence

Enterprise identity management company SailPoint is using the Navigate '17 event to preview its new identity analytics solution, IdentityAI.

By adding analytics to SailPoint's existing open identity platform it will enable customers to improve their identity governance and mitigate potential threats.

Continue reading

AI-driven platform improves sales forecasts and visibility

Sales graph

Success in a sales environment increasingly needs access to accurate real-time data on which to base decisions.

To provide companies with better information, sales forecasting specialist Aviso is launching its latest Aviso Sales Vision, an AI-based platform that provides accurate sales forecasts, detailed pipeline visibility, and actionable insights to drive sales performance.

Continue reading

New platform helps integrate big data across the cloud

Big data cloud

As enterprises continue to move their data to the cloud, they often find themselves using multiple different services. But a multi-cloud approach brings problems when it comes to managing and integrating information.

To tackle this issue, cloud and big data integration company Talend is releasing a new version of its Talend Data Fabric integration platform that is optimized to manage multi-cloud, enterprise IT environments.

Continue reading

Enterprises overwhelmed by endpoint alerts

security alert

Organizations receive an average of more than 600 endpoint alerts in a typical week according to a new report. These represent a severe drain on an organization's financial resources and IT security personnel and the cost can average $1.4 million annually.

The study by endpoint security company Absolute and the Ponemon Institute reveals that, of all alerts, 45 percent (277 alerts) are considered reliable and an average of 115 are investigated. An average of 61 percent or 369 of these alerts involve malware infections.

Continue reading

Malicious antivirus apps prey on ransomware fears

Malware magnifier

Recent weeks have seen a rise in fake WannaCry protectors on mobile app stores, even though this particular infection doesn't target mobile devices.

But using the fear of high profile infections to get users to download potentially unwanted programs or malware is nothing new according to threat management company RiskIQ. Using its mobile database, hundreds of examples of apps that claim to help defend mobile phones were found, instead, to be preying on unsuspecting users by pushing adware, trojans, and other malware.

Continue reading

Collaboration cloud services lead to a rise in data violations

Social cloud

Almost 10 percent of data loss prevention (DLP) violations come from collaboration services according to a new report.

The study from cloud security company Netskope shows that as cloud services like HipChat and Slack have increased in popularity enterprises need to put policies in place to protect the information that’s shared.

Continue reading

Microsoft integrates with Zimperium to guard against zero-day mobile threats

microsoft + zimperium

Cyber attacks aren't limited to desktop systems, mobile endpoints are equally at risk and for enterprises this is something else that needs protection.

Mobile threat defense specialist Zimperium is announcing an integration with Microsoft Enterprise Mobility + Security to integrate its product with the Microsoft Intune mobile device and application management product.

Continue reading

Patch management is a major issue for enterprises

Patch download

We already know that outdated systems are a major problem for enterprises as they increase the risk of data breaches.

But a new study by enterprise security specialist Bromium reveals that the act of patching is a big problem for many companies too.

Continue reading

New Android malware uses code injection to control devices

Mobile code injection

Researchers at Kaspersky Lab have released details of a new trojan being distributed via the Google Play store that is able to inject malicious code into the system runtime libraries.

Named Dvmap, the trojan is believed to have been downloaded from Google Play more than 50,000 times since March this year.

Continue reading

How low-code software is meeting development challenges

process automation

There’s increasing demand to produce software quickly, which means companies are on the look out for alternatives to traditional coding.

Many are turning to low-code platforms, workflow software specialist TrackVia has created an infographic charting the rise of low-code solutions.

Continue reading

EventTracker launches improved threat intelligence platform

Threat

The rapidly changing world of cyber security means that companies need to be able to respond quickly to threats.

Security information management company EventTracker is launching a new version of its SIEM platform, which provides advanced features to combat modern ransomware and mutating malware, along with expanded threat intelligence.

Continue reading

Outdated operating systems triple the risk of a data breach

Hacker keyboard

The recent WannaCry attack has highlighted the dangers of running out of date and un-patched systems.

New research by security ratings company BitSight has released a new report showing that organizations with more than 50 percent of their computers running outdated versions of an operating system are more than three times as likely to experience a breach. In addition those with more than 50 percent of their computers not running the latest version of an internet browser are more than twice as likely to experience a publicly disclosed breach.

Continue reading

Majority of vulnerabilities appear online before official databases

hacker

New research from threat intelligence company Recorded Future reveals that of 12,500 disclosed Common Vulnerabilities and Exposures (CVEs), more than 75 percent were publicly reported online before they were published to the NIST's centralized National Vulnerability Database (NVD).

Sources reporting include easily accessible sites such as news media, blogs, and social media pages as well as more remote areas of the internet including the dark web and criminal forums.

Continue reading

Healthcare industry most targeted by cyber attacks

Medical data risk

A new report into cyber security trends shows healthcare to be the most frequently targeted industry, with 164 threats detected per 1,000 host devices.

Next most targeted are education and media, which had 145 and 123 detections per 1,000 host devices, respectively. By comparison, the food and beverage industry came in as the least targeted industry with just 17 detections per 1,000 hosts.

Continue reading

Load More Articles