Ian Barker

More than half of organizations fall victim to cyberattacks

Cyber attack

The latest Cybersecurity Readiness Index from Cisco shows that 53 percent of the respondents report falling victim to a cyber incident this past year, and many leaders (73 percent) believe that they will be a victim of a cybersecurity incident in the next 12-24 months.

The report shows that the level of readiness is down on a year ago too. Only three percent of organizations around the globe have a mature enough security posture to protect against today’s threats (down 12 percent compared to last year).

Continue reading

Enterprise cybersecurity's lateral movement 'blind spot' [Q&A]

Network

A lot of time, attention, and investment is spent on creating strong perimeters and endpoint defenses to prevent malicious actors from gaining access to corporate networks.

While this is important, organizations also need a network security strategy -- because if attackers do infiltrate a network, the race is on to uncover the malicious activity and quickly resolve the incident.

Continue reading

Generation Z is becoming generation fraud

Robot hacker

Members of generation Z -- those born in the mid to late 1990s -- are more susceptible to fraud than other age groups and are also committing it at a higher rate.

The latest Digital Trust and Safety Index, released today by Sift, shows that 33 percent of Gen Z survey respondents know someone who has, or have personally, participated in payment fraud, compared to only 10 percent of Baby Boomers.

Continue reading

61 percent of breaches involve infostealer malware

A rise in identity-based attacks can be laid at the door of a rapid increase in malware, according to a new report. Analysis by SpyCloud finds that 61 percent of data breaches in 2023, involving over 343 million stolen credentials, were infostealer malware-related.

Researchers also report that the average identity had a one in five chance of already being the victim of an infostealer infection. Infostealer malware enables criminals to collect vast amounts of information about the user and the device, including a user's session cookies, API keys and webhooks, crypto wallet addresses, and more.

Continue reading

Syncing of cloud passwords opens businesses to cyberattacks

A new report reveals that 67 percent of businesses routinely synchronize most of their users’ passwords from their on-premises directories to their cloud counterparts. This poses substantial security risks by creating a gateway for attackers to hack these environments from on-prem settings.

The report from Silverfort shows that in the rush to the cloud security gaps stemming from legacy infrastructure, misconfigurations, and insecure built-in features create pathways for attackers to access the cloud, significantly weakening a company's resilience to identity threats.

Continue reading

IT leaders struggle to keep up with emerging threats

A new report shows that 95 percent of IT leaders say that cyberattacks are more sophisticated than ever and they are unprepared for this new wave of threat vectors.

The survey, of more than 800 IT and security leaders around the world, from Keeper Security reveals that firms are witnessing AI-powered attacks (51 percent), deepfake technology and supply chain attacks (both 36 percent), cloud jacking (35 percent), Internet of Things (IoT) attacks and 5G network exploits (both 34 percent), and fileless attacks (24 percent).

Continue reading

Preparing for a post-quantum security landscape [Q&A]

As widely available quantum computing draws closer, organizations need to consider the extent to which their supply chain presents risks and start building in post quantum readiness to their risk assessments.

To do this, it's critical for businesses to understand the origin and authenticity of all the components that are in the supply chain (both hardware and software). This is especially true for IoT devices, which rely on systems and subsystems created by multiple partners and vendors bringing their solutions together to make a fully functioning connected product/system.

Continue reading

Which comes first? The pentest or the bug bounty program? [Q&A]

Software testing

Bug bounty and penetration testing programs are often grouped as interchangeable, but they perform distinct functions.

To determine whether both deserve a place within a cybersecurity strategy, it is important to understand their specific qualities and how they have matured over recent years. We spoke to Chris Campbell, lead solutions engineer at HackerOne, to learn more.

Continue reading

Microsoft means business with new Surface devices

Whilst Microsoft's Surface devices have been around for a few years and have many features that make them attractive for business users, there's never been a version aimed specifically at businesses… Until now.

With the launch of Surface Pro 10 for Business and Surface Laptop 6 for Business the company is targeting the business market with features including improved performance and battery life, more ports, better security and custom, durable anti-reflective displays.

Continue reading

Communications service providers see Gen AI as critical but are slow to implement it

A new study shows 90 percent of communications service providers (CSP) see the profound impact Gen AI will have on business goals. However, deployment of GenAI is still in its preliminary stages, with just 22 percent of CSPs having already implemented solutions.

Research by Analysys Mason for Amdocs shows Gen AI is expected to have a high impact across a variety of areas, such as software development (84 percent), data management (82 percent), monetization (82 percent) and network operations (81 percent).

Continue reading

Third-party breaches create network weak spots

Network security

A new report from Black Kite shows how third-party data breaches create critical weak spots in extended networks, potentially leaving businesses open to cyber attacks, which can have a negative ripple effect across the organization and its stakeholders.

The report is based on analysis of 81 vendor breaches impacting 251 companies in 2023. Unauthorized network access was the leading cause of breaches, accounting for over half (53 percent) of third-party breach incidents. This represents a 26 percent increase from 2022, with ransomware being the most common method of compromise.

Continue reading

SMBs are easy targets for cyberattacks

Ransomware Malware Cyber Attack

Despite cybersecurity threats being on the rise, many small and medium businesses (SMBs) still lack basic security measures, according to AI security company Cyber Upgrade.

It's no secret that hackers target smaller businesses due to inadequate cybersecurity safeguards, as most underestimate the associated risks as well as lacking the resources of larger enterprises.

Continue reading

Enterprises lose millions each year due to poor AI models

Burning money

Underperforming AI models, which are built using inaccurate or low-quality data, are resulting in misinformed business decisions.

A study for Fivetran, conducted by Vanson Bourne, polled 550 from organizations with 500 or more employees and finds that on average they lose six percent of their global annual revenues, or $406 million, to poor AI models.

Continue reading

Compliance failings leave enterprises vulnerable to data breaches

A new report from Thales reveals that 43 percent of enterprises failed a compliance audit last year, with those companies 10 times more likely to suffer a data breach.

Based on a survey of almost 3,000 IT and security professionals it also finds that 93 percent of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47 percent last year.

Continue reading

Cyber fusion -- what is it and why is it important for security? [Q&A]

Security concept

Today's IT security teams face several key challenges. Tasked with combating the rising volume and frequency of sophisticated cyber threats, they are bombarded with a tsunami of alerts generated by countless security tools that deliver little context or value-add insight.

Effectively processing and analyzing all this data to identify actionable threat intelligence requires considerable time and effort.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.