Druva launches improved ransomware protection for enterprises

Ransomware

Ransomware is a big problem for today's enterprises, the US Department of Justice reports an average of 4,000 ransomware attacks occur in the US every day.

This means detection and fast action is more important than ever. Cloud data protection company Druva is launching an enhanced version of its platform to manage the ransomware threat from detection right through to recovery.

Continue reading

New product delivers 'self-healing' endpoint security

endpoint protection

Increasing numbers of companies are coming to accept that it's only a matter of time before they become the victim of some form of data security breach. This means they need to be able to detect and respond to threats more quickly.

Cloud-based security platform Absolute is launching a new Application Persistence product to provide embedded, self-healing capabilities to third-party endpoint controls such as VPN, anti-virus, encryption, systems management and other critical controls that are too easily compromised.

Continue reading

New solution cuts risk from unstructured data

steal-data-binary-hand

Businesses understand the need to look after sensitive data, but a problem often arises in knowing where that data is. Unstructured information held in folders and documents is just as valuable to hackers as database records and is harder to protect.

Identity management company SailPoint is launching its latest data governance solution, allowing enterprises to guard sensitive files wherever they reside.

Continue reading

Unified security management comes to the cloud

Business security

Implementing effective security can be time consuming, complex and costly, more so given the adoption of cloud-based systems.

Unified security management (USM) specialist AlienVault is aiming to simplify things with the release of USM Anywhere, an all-in-one Software-as-a-Service (SaaS) security monitoring platform.

Continue reading

ZTE leads the way in unwanted call protection

ZTE Hiya call protection

Phone spam from robot calling systems is a major issue in the US and around the world, prompting regulators to look at controlling the problem.

Smartphone maker ZTE is taking a proactive approach and teaming up with caller profile service Hiya to integrate caller identification, spam detection and call blocking into its latest Axon 7 handset.

Continue reading

'Streaming Prevention' technology takes a new approach to stopping cyber attacks

doorman bouncer

Traditional security techniques can be effective in fending off cyber threats, but a new generation of non-malware attacks try to gain control of computers without downloading malicious software. Instead, they use trusted, native operating system tools, such as PowerShell, and exploit running applications, like browsers.

Endpoint security specialist Carbon Black is launching a new tool which can combat both types of threat. Called Streaming Prevention it uses event stream processing to continuously update a risk profile based on a steady stream of activity.

Continue reading

Democracy 'threatened' by the social media echo chamber

Shouting Screaming Man Suit Businessman Megaphone

In the wake of Donald Trump's election in November, we looked at the phenomenon of social media bubbles and the effect they have on political discourse.

Research released by UK political think tank Demos reveals some of the extent of the echo chamber effect in political discussions on Twitter.

Continue reading

The US cities with the highest malware infection rates

virus lab

Computers located in Tampa, Orlando, and St. Louis are more likely than those in other US cities to be infected with malware.

This is according to a new report from ESG, the company behind the SpyHunter anti-spyware program. It compiled its results from SpyHunter detection data across the 100 largest cities in the United States in 2016.

Continue reading

Threat hunting and why combating cyber attacks needs a human element [Q&A]

Threat

The threat landscape facing businesses is more complex than ever and it's rapidly changing. No surprise then that traditional approaches to security are struggling to cope.

This has led some security companies to turn to a more dynamic approach of seeking out threats rather than simply responding to attacks.

Continue reading

Enterprises fear brand damage more than data breaches

Mobile fear

The biggest fear for organizations is long-term damage to brand and reputation, yet despite this three quarters lack a comprehensive risk management strategy.

This is one of the findings of a survey for risk intelligence company RiskVision carried out by the Ponemon Institute, it reveals that 63 percent of organizations are worried about reputation and brand damage. This is followed by security breaches (51 percent), business disruption (51 percent) and intellectual property loss (37 percent).

Continue reading

Speed of fixing bugs holds back software deployment

Computer bug

Developers want to deploy software releases faster, but the time taken to fix bugs is holding them back according to new research.

A survey for cloud testing platform Sauce Labs carried out by Dimensional Research reveals that 28 percent of those surveyed say they want to deploy hourly (up from 18 percent in 2016). Last year only eight percent said they were not deploying as fast as they wanted to, but that percentage has nearly doubled to 14 percent this year.

Continue reading

IT teams fall behind in automation

Automation

While businesses are focused on digital transformation to deliver greater efficiency and higher profits, IT teams themselves are falling behind the curve according to a new report.

The survey from IT services and solutions provider Dimension Data shows that IT staff only spend 14.5 percent of their time on innovation and new projects. Automation is seen as a key enabler for optimized IT operations, but only 20 percent of surveyed companies say their IT operations are fully automated.

Continue reading

New database release enables data-driven decisions in real time

Data graph report

Many organizations rely on databases to support their decision making processes, but the process of importing, analyzing and then acting on the data can inhibit fast action.

In-memory SQL database specialist, VoltDB is releasing version 7.0 of its to offer increased scalability for managing transactions and generating analytics while ensuring high availability and strict data consistency.

Continue reading

Exploit acquisition program aims to patch mobile vulnerabilities faster

Phone gears

Even after new mobile threats have been identified the number of devices in use means it can take time for patches to be rolled out to all users.

Mobile threat defense company Zimperium is hoping to tackle this problem with the launch of a $1.5 million bounty program to purchase N-day exploits which have been identified but are still usable on unpatched devices.

Continue reading

Survey reveals the true cost of data breaches

money dollars cash burden debt chain

More than a third of organizations that experienced a data breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent.

This is a key finding of the latest Cisco Annual Cybersecurity Report which also shows that after attacks, 90 percent of these organizations are improving threat defense technologies and processes.

Continue reading

Load More Articles