New authentication platform seeks to tackle fake news and profiles

Fake/genuine

Fake news is big news at the moment, making it increasingly difficult to assess the reliability of material, particularly when it appears online.

A new company launching today at the 2017 RSA conference is seeking to create a secure online community to identify individuals and provide a more "authentic" online experience.

Continue reading

Enterprises need to be aware of threats from internal email

Email fraud

Insider attacks are of increasing concern to businesses. New research shows that internal email can be a major source of threats that often gets overlooked.

The study from email security company Mimecast and Forrester Research reveals that more than a third of companies have experienced some information loss, theft, or attack via email within the past two years.

Continue reading

2016: 'The year of ransomware'

ransom_note

Ransomware attacks aren't new, but 2016 saw them increasing in frequency and sophistication as cyber criminals see a lucrative revenue opportunity.

UK-based Technology Services Group has produced an infographic that looks at ransomware’s rapid rise.

Continue reading

8 out of 10 Brits feel misled by advertised broadband speeds

Internet speed fast mbps speedometer

The way broadband speeds in the UK are advertised is misleading according to 80 percent of respondents to a new survey.

Broadband comparison site Cable.co.uk interviewed 2,000 consumers with 58 percent finding advertised speeds "very misleading" and 22 percent saying they are "somewhat misleading".

Continue reading

Microsoft teams up with Skycure to fight mobile threats

mobile key

Cyber threats to enterprises aren't confined to the desktop, mobile systems are at risk too and businesses are looking for solutions that can combine security with ease of management.

Mobile threat defense company Skycure has announced that it's working with Microsoft to integrate its Skycure platform with Microsoft Enterprise Mobility + Security (EMS).

Continue reading

The secrets of top performing information security officers

Security man expert suit

A new study based on two years of work by IANS Research looks at the work of chief information security officers (CISOs) and their role in enterprises.

The report identifies concrete actions CISOs should consider taking to progress their programs from where they are today to the next level.

Continue reading

Popular Windows development UI library goes open source

Motion interface

User interface controls are important to creating applications for use across different devices as they need to retain the native look and feel of the OS.

To make life easier for .NET developers development company Progress is making its Telerik UI for Universal Windows Platform (UWP) open source. Telerik UI offers developers a set of native UI controls for building Windows apps.

Continue reading

Next generation email security addresses advanced threats

Secure email

Despite other developments in malware, email remains a favourite route for attackers because it's easy for people to fall victim to phishing and other threats.

Network security company SonicWall is launching a new next-generation email security platform to help guard against ransomware, zero-day and advanced threats.

Continue reading

Invisible malware targets financial information

invisible man cloud network

Researchers at Kaspersky Lab have uncovered a series of targeted attacks that use legitimate software to avoid detection.

The attacks employ widely available penetration-testing and administration tools as well as the PowerShell framework for task automation in Windows. They drop no malware files onto the hard drive, but hide in the memory.

Continue reading

Enterprise change management goals are out of sync with strategy

Change cloud clouds

The results of a new study to be released tomorrow, but seen exclusively by BetaNews, reveal a severe misalignment between the way IT leaders talk about change management and the strategies they have in place to execute these initiatives.

The survey of more than 320 IT leaders by document productivity company Nitro shows that change management strategies vary between organizations, but many fall short.

Continue reading

Security consultancy offers $1 million guarantee against breach-related costs

Check Dollars

One of the biggest worries for businesses is the cost of suffering a major cyber attack in terms of both money and business reputation.

San Francisco-based independent security consultancy AsTech is so confident of its track record that it's offering a $1 million warranty against breach-related costs if an organization using its Paragon Security Program suffers unauthorized access to non-public information through a vulnerability that AsTech fails to discover.

Continue reading

DDoS tactics shift towards a blended approach

DDoS attack start

The world of cyber security is a constant arms race with attackers and defenders constantly on the lookout for an edge.

Cyber security company NexusGuard has released its latest threat report for the final quarter of 2016, and notes a shift towards blended DDoS attacks combining multiple vulnerabilities with the intent of overloading targeted monitoring, detection and logging systems.

Continue reading

The problems facing the app development industry

Developer

The app development business is being plagued by long development times, skills gaps and large backlogs according to a new report.

The study from low-code development platform supplier OutSystems identifies the critical issues that the industry needs to address if it’s to avoid missed opportunities and lost revenue.

Continue reading

Duo Security launches fast, simple alternative to VPN

Access management

Enterprise users increasingly want access to their data while they're out of the office. This generally requires a VPN or Network Access Control (NAC) solution but these can be time consuming and complex to set up and administer.

To make things faster and simpler, trusted access specialist Duo Security is launching a major commercial implementation of Google's BeyondCorp framework that drastically improves and simplifies management of how employees and devices access critical corporate applications.

Continue reading

Threat hunting gains in popularity to combat cyber threats

insider threat

The use of threat hunting techniques to combat cyber attacks is increasing according to a new report.

The study by Crowd Research Partners of cybersecurity professionals in the 350,000 member Information Security Community on LinkedIn reveals that threats are rising dramatically and that deployment of sophisticated threat hunting platforms can significantly accelerate the time needed to detect, investigate and fix threats.

Continue reading

Load More Articles