Slack sets its sights on large enterprises

Collaboration

The Slack team collaboration tool has proved popular with many businesses since it first launched in 2013.

Now Slack is aiming to carry its success into larger organizations with the launch of Slack Enterprise Grid, offering the adaptability to create communication structures which mirror how teams already collaborate.

Continue reading

2016's top malware threats show a shift in attack patterns

Attack route

The methodology of malware and cyber attacks has shown a significant shift in 2016, according to the State of Malware report from Malwarebytes.

Although ransomware is the favorite attack method used against business, ad fraud malware is growing fast and poses a substantial threat to both consumers and businesses.

Continue reading

New intelligence platform aims to cut credential-based risks

credential hacker

Many cyber attacks are made using stolen or abused credentials. One of the ways to combat this is to collect activity data and use it to spot anomalous behavior patterns.

Leader in this field Exabeam is launching its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size. It addresses the need to collect more data than ever before, to make better connections across that data to detect threats, and to augment human analysts during incident response.

Continue reading

Comodo extends endpoint protection to Mac and Linux

endpoint shield

Businesses are increasingly aware of the need to protect their endpoint systems. However, they tend to concentrate most of their efforts on Windows which can leave other platforms vulnerable.

Cyber security specialist and digital certificate provider Comodo is launching a new version of its Advanced Endpoint Protection (AEP) product that extends availability of its default-deny endpoint security to Mac and Linux platforms, in addition to Windows.

Continue reading

Tenable launches cloud-based vulnerability management

Cloud

Increased adoption of virtualization, the cloud, and the accelerating use of web applications and short-lived assets like containers has led to changes in how and when companies need to assess vulnerabilities.

Cyber security firm Tenable Network Security is launching a new cloud-based vulnerability management platform to enable enterprises to secure the full range of assets in modern elastic IT environments.

Continue reading

The Big Shift in IT Leadership -- free ebook from Wiley

Big Shift in IT Leadership

The IT world has undergone some major changes in recent years, but in many cases management hasn't kept up with what's happening, leaving enterprises struggling to keep up with the competition.

IT leaders need to understand how they can use resources effectively to drive business growth, find the right talent and ultimately increase profitability.

Continue reading

Kaspersky and ESET top the security charts

endpoint protection

The way people access the internet is changing, with a shift towards portable devices, and that in turn has led to a shift in the software they use.

Independent testing company AV-Comparatives has conducted its annual survey focusing on which security products (free and paid) are employed by users, along with their OS and browser usage.

Continue reading

Vulnerabilities could leave thousands of NETGEAR routers exposed

The back of a Wi-Fi router with antenna mounted

New vulnerabilities discovered in 31 models of NETGEAR router are reckoned to leave at least 10,000 devices at risk and could affect many more.

Cyber security company Trustwave has released details of the vulnerabilities which allow an attacker to discover or completely bypass any password on a NETGEAR router, giving them complete control of the router, including the ability to change configuration, turn infected routers into botnets or even upload entirely new firmware.

Continue reading

New platform offers holistic risk assessment for enterprises

Risk dial

The proliferation of cloud services and diverse platforms in modern enterprises makes guarding against risk and protecting data a major challenge.

Cyber risk assurance company TechDemocracy is addressing this problem with the launch of a new platform to analyze the effectiveness of existing cyber risk and compliance solutions and offers a consolidated view of enterprise risk posture.

Continue reading

The future of home technology

home automation

Technology tends to creep up on us and before we know it is an essential part of our lives. In the home we're already seeing increasing numbers of smart devices like thermostats and light bulbs, but what else is on the horizon?

Electronics company RS Components has produced an interactive graphic showing some of the things we can look forward too.

Continue reading

40 percent of British children use the internet unsupervised

child_using_computer_keyboard

Connected devices are a big part of all our lives and that goes for younger members of the family too, but of course connecting to the internet means risk.

A new survey from Intel Security shows 40 percent of British parents do not keep track of their children's online activity, so they don't know when their children are online or what websites and content they're accessing.

Continue reading

Mid-market enterprises are too confident of their cyber security

confident man

Mid-market enterprises have very high confidence in their cyber security defenses, but in reality they struggle to defend against malicious activity which has become more sophisticated, more targeted and more severe.

Security operations-as-a-service company Arctic Wolf Networks along with research firm Vanson Bourne, surveyed IT decision makers at 200 companies with between 500 and 3,000 employees and uncovered a disparity between what IT professionals believe versus the reality of their security posture.

Continue reading

Here, FIDO! Facebook adds security key protection

facebook_privacy

Hackers are always keen to get their hands on people's social media accounts, so adding two-factor security is a good way of keeping your login details secure if someone tries to access your account on another device.

Facebook has offered verification by SMS message or mobile app for a while but it's now going a step further by making the FIDO U2F (universal 2nd factor authentication) security key available as part of its login process.

Continue reading

Cyber attacks fall in volume but grow in sophistication

Cyber attack

Cyber criminals are employing more sophisticated techniques in their attacks, including the use of 'false flagging' to disguise their true source.

This is one of the findings of the latest threat intelligence report from NTT Security, on a positive note though it records a 35 percent decrease in the number of attacks in the final quarter of 2016.

Continue reading

Enterprises have the wrong priorities on security spending

Security

A new survey reveals a disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data.

The study from security solutions company Thales e-Security and 451 Research finds that while 30 percent of respondents classify their organizations as 'very vulnerable' or 'extremely vulnerable' to data attacks the two top spending priorities are network (62 percent) and endpoint (56 percent) protection solutions.

Continue reading

Load More Articles