Ian Barker

(Tell me why) We don't like passwords

Despite relatively low awareness of passwordless technology, 65 percent of North American consumers report they’d be open to using new technology that makes their lives simpler.

A new report from 1Password shows that 80 percent say they care about their online privacy and actively take measures to protect it. But it's clear that they also believe we can do better than passwords for both security and ease of use.

Continue reading

Decoy Dog sniffs out enterprise networks to target

A malware toolkit dubbed 'Decoy Dog' has command-and-control (C2) propagated to a Russian IP and is selectively targeting organizations worldwide -- and going undetected.

The Infoblox Threat Intelligence Group is the first to discover Decoy Dog and the company is collaborating with other companies in the security industry, as well as customers, to identify and disrupt this activity.

Continue reading

Cyber threats get more personal

Popular online platforms such as Netflix, Facebook, and Steam are being used to spread cyber attacks as criminals focus on consumers' favorite online activities.

The latest consumer threat guide from F-Secure finds the most imitated social media platform used to spread phishing threats in 2022 was Facebook at 62 percent. Steam, the largest distribution platform for PC games, was the most popular gaming platform to spoof at 37 percent.

Continue reading

New solution offers cheaper enterprise-grade cloud storage

Cloud

A new enterprise-grade, native cloud storage solution aims to deliver increased speed, affordability and security thanks to its use of decentralized Web3 technology.

Impossible Cloud supports almost unlimited capacity, and its Object Storage solution offers a scalable, cost-efficient alternative for organizations that require reliable and secure storage.

Continue reading

82 percent of open source software components are inherently risky

open source

Recent supply chain attacks such as SolarWinds, Log4j and 3CX have highlighted the need to protect the software supply chain as well as the potential consequences of failing to properly assess the integrity of software.

A new report from software supply chain security management company Lineaje looks at the composition of open-source software and assesses the risks associated with its usage.

Continue reading

Why workplace engagement and collaboration are the true benefits of the metaverse [Q&A]

Collaboration

The trend towards hybrid work has meant that face-to-face meetings have been widely supplanted by collaboration tools like Zoom, Teams and Slack.

With the advent of the metaverse, virtual interaction is set to become even more common. We spoke to Martin Bodley, director of emerging business at Bose Work to find out more about how this new world might look and how it can draw on expertise gained from video games.

Continue reading

Convergence of OT and IT systems sees moves to improve security

Industrial computer system

As information technology and operational technology increasingly converge it presents new challenges for organizations needing to keep their systems secure.

There's also been something of a shift in the focus of attacks with more emphasis on causing business disruption and damaging reputations.

Continue reading

Why have cloud when you can have supercloud? [Q&A]

There's been a lot of talk about 'supercloud' recently, but what exactly does it mean? And is it the next big thing that's set to disrupt the technology landscape?

We talked to Amir Khan, CEO and co-founder of Alkira, to find out more about supercloud and what it means for the industry.

Continue reading

Advanced search, analytics and AI deliver a smarter infrastructure platform

The use of infrastructure as code to define and deploy network and data center architecture has become increasingly common. Whilst it undoubtedly offers many advantages, it can create challenges too.

Pulumi is launching a new tool that unlocks analytics and search across cloud infrastructure, generates infrastructure as code from natural language prompts, and even enables novel AI-driven infrastructure automation.

Continue reading

Strong data protection can deliver economic benefits for enterprises

As enterprises move to cloud and hybrid models they face a range of new challenges in protecting their data.

A new study from Enterprise Strategy Group (ESG), released by Commvault and Microsoft, finds that 53 percent of respondents say their IT environment was more complex than it was two years ago.

Continue reading

Phishing attacks increase by more than 100 percent

Phishing attack volumes increased by 102 percent in the first quarter of 2023 according to a new report from email security and threat detection company Vade.

In the first quarter of this year Vade detected 562.4 million phishing emails, passing the previous quarter's total by 284.8 million. January accounted for the highest volume of phishing emails in Q1 with 488.5 million.

Continue reading

US and UK are the countries most attacked by ransomware

US v UK

In the 12 months from April 2022 to March 2023 the US and UK were the countries that suffered the most ransomware attacks.

However, the latest Malwarebytes ransomware report shows that the USA suffered a little over seven times more attacks in the last twelve months than the UK. It's perhaps not a coincidence that the USA's economic output, measured by gross domestic product (GDP), is also about seven times larger than the UK's.

Continue reading

Vulnerable cloud attack surface grows almost 600 percent

Weather cloud

A new report from cyber asset visibility and management company JupiterOne shows numbers of enterprise cyber assets have increased by 133 percent year-on-year, from an average of 165,000 in 2022 to 393,419 in 2023.

Organizations have also seen the number of security vulnerabilities, or unresolved findings, increase by 589 percent according to the report which analyzed more than 291 million assets, findings, and policies to establish the current state of enterprise cloud assets, including cloud and physical environments of devices, networks, apps, data, and users.

Continue reading

Free tool finds sensitive data stored in Google Drive accounts

As cloud and SaaS use grows a major challenge for IT, security and compliance teams is the lack of visibility into their organization's SaaS ecosystem.

Metomic is launching a new, free cybersecurity tool that scans Google Drive accounts to find sensitive data and information lurking in Google Docs and files. After entering a Gmail address and password, Google Drive Risk Report will scan the Google Drive connected to the address and, in a matter of seconds, generate a report.

Continue reading

Cybersecurity burnout could lead to workers quitting

stressed worker

Cybersecurity teams are suffering from the economic squeeze with 63 percent of US security professionals having their department's budget cut in 2023 according to research from Pentest as a Service (PtaaS) company Cobalt.

Of those who encountered layoffs or budget cuts, almost all US (95 percent) and EMEA (84 percent) professionals say their role has changed. This has caused many in the US to feel burnt out (61 percent), more than those in EMEA (29 percent).

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.