Elevating enterprise resilience with real-time ransomware detection
2023 looks set to be yet another record-breaking year for ransomware attacks. According to Statista, over 72 percent of businesses worldwide have already been affected by ransomware attacks this year, with LockBit3.0 and CI0p Ransomware claiming the bulk of victims last quarter.
The scourge of modern digital businesses everywhere, the proliferation of ransomware shows no sign of slowing down thanks to the rise of ransomware-as-a-service (RaaS) platforms -- so much so that it has become the most prevalent issue confronting organizations today.
Beyond phishing: The top employee security risks you're probably not measuring
While we all know email is a big target for attackers, it’s important to remember that email is not the only risk vector. As companies use more tools and features, the risks grow too. Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviors to get a holistic view of your risks. By doing so, you can focus resources more efficiently.
Human Risk Management (HRM) is a vital part of cyber security. Even if you have technological safeguards in place, HRM plays a substantial role in your overall security stance. Here I highlight some of the employee cyber risks that often get overlooked and how we can better keep an eye on them in real time.
One IdP to rule (or breach) them all: How identity access management tools can secure -- or destroy -- your kingdom
When we want to secure something highly valuable, say, a bag of ancient Spanish coins worth millions, we think of locking it behind as many layers as possible. For example, you might put it in a safe deposit box in a bank vault, nestled safely inside the institution that is itself blanketed with redundant physical security controls.
As organizations have become increasingly complex, so too have their associated layers of security around application access. Enterprises have tremendous amounts of applications and data, as well as users and devices with differing levels of permissions trying to access that data. To provide a consistent, IT-vetted method of creating, managing, storing, and authenticating the complexity of application access, we have arrived at Identity Provider (IdP) tools. IdPs are (typically) cloud-hosted services that store unique information used to identify users, organizations, and devices ("digital identities"), authenticate access requests, add/remove users, and provide security around these functions. Popular examples of solutions often used for IdP functionality include Okta, Microsoft Azure AD, and Duo.
2024 vision: Trends shaping the IT landscape
The IT and cloud computing landscape has grown and evolved in 2023, and it’s poised to continue developing in 2024. Companies worldwide are actively adapting to the dynamics of a post-pandemic world. In this pursuit of resilience and innovation, we anticipate the emergence of four key trends that will shape the new year. These trends encompass technological advancements and shifting IT paradigms regarding spending, loyalty and governance.
Here are four trends we will likely see in the new year.
Fighting the next generation of fraud
In today’s digital age, the landscape of fraud is evolving at an alarming pace. Victim profiles, which used to skew heavily toward the elderly and infirm, now include younger, fully functioning adults. In 2022, 20-59-year-olds reported 63 percent of all fraud in the United States. Industries being targeted by fraudsters are evolving as well, and now include those in crypto and gaming.
In the past, most adults were able to see through scams and avoid them. However, the introduction of generative AI has been a game changer, transforming ordinary schemes into highly sophisticated efforts. Generative AI, a subset of artificial intelligence (AI), is making waves in the world of cybercrime. It is a technology that can generate content that is virtually indistinguishable from human-created content. Whether it's producing convincing text, images, or audio, generative AI leverages deep learning and neural networks to create highly realistic and persuasive output at scale. Shady third-world country call centers have been replaced by autonomous AI tools. This capability has become a powerful tool in the hands of fraudsters.
Putting individuals back in charge of their own identities
From letting hotels keep copies of our passports to handing over IDs for car hire or air travel, we seldom think twice about the implications of physically sharing our identity documents. By now, we’ve gotten accustomed to exchanging personal information in return for a product or service we value -- but we need to be more vigilant at a time when identity fraud is jumping as much as 37 percent.
Proof of a person’s identity is the key to accessing goods, services, financial accounts, and opportunities -- which makes identity a valuable target, motivating fraudsters to try to gain our trust to trick us into disclosing our personal information so they can impersonate us. They also hack into identity databases that store personal information of millions of consumers. As a result, the frequency of data breaches has increased exponentially. In fact in 2022 alone, identity theft reached a staggering $42 billion in the US.
Harmonizing human insight with AI: The future of tax and finance in the digital era
In common with many industries, the digital transformation era has ushered in a paradigm shift in the tax and accountancy sectors. This has placed automation and artificial intelligence (AI) at the center of operational innovation, efficiency and competitive advantage. In doing so, these and other technologies are redefining the way industry professionals approach their work, with profound implications for the future.
Among the key questions this creates are: what does this all mean for human skillsets and expertise, and how can businesses balance these changes with uniquely human capabilities, ensuring that one complements the other? In looking for answers, there are several key areas to consider:
The bridge to the future
Unless there is easy and seamless connectivity between different blockchain-based asset types on different platforms, the full benefits of tokenization will not be realized. However, achieving this interoperability has proven a significant obstacle. The blockchain bridge has emerged as a promising solution, albeit one that has historically carried cost and risk. But recent advancements have made these bridges accessible, secure, and cost-effective.
Blockchain technology, which captured the imagination of the public some 15 years ago, promised to revolutionize the financial world. With each passing year, new and use cases have emerged, slowly but surely attracting a growing user base. Although the exact timeline for mass adoption remains a topic of debate, many in the industry agree it is an eventuality.
We tried Brave's AI chatbot Leo: It talks a lot about privacy, but is it truly private?
In early November, Brave, best known for its privacy-focused browser, launched its own AI chatbot called Leo. The chatbot is built into the desktop version of the browser (Brave says it will be coming to mobile soon), and was made available to all users for free. We at AdGuard, always eager to explore new AI-powered tools, and aftertesting Bing AI and playing with others, we couldn't resist the chance to check out Leo and assess its smartness and privacy features.
By default, Leo is found in the sidebar. To summon the genie AI-powered assistant, one simply needs to type 'ask Leo' in the address bar and it will materialize on the right side of the screen.
Undertaking a data diet this Black Friday
Like every year, Black Friday marks the start of the end-of-year shopping season, and with it a significant increase in online sales. Although it's very much an American event, Black Friday in the UK has grown in popularity in recent years. In 2022, UK consumers spent a record £9.42 billion over the Black Friday weekend. Of this, 61 percent was spent online.
For e-retailers in the UK, the cyber weekend represents a significant increase in activity and traffic, leading to an accumulation of data generated and collected by e-commerce sites, requiring large storage capacities with a high environmental impact.
Will Quantum Computing change the way we use encryption?
Today, encryption is a cornerstone of our cybersecurity practices. It protects everything from cell phones and SMS messages to financial transactions and intellectual property.
However, a new challenge in the complex landscape of encryption has recently emerged, thanks to the advancement of quantum computing. What challenges lay ahead? Here is the breakdown:
Mitigating fraud risks when expanding internationally
Global expansion is the way forward for businesses looking to upscale in 2023 and beyond. The past few years have laid the foundation for international expansion, and now more and more merchants are embracing the opportunities.
But as they’re venturing into new markets, certain challenges appear along the way. One of them is cross-border payment. While businesses might be familiar with the fraud situation in their home market, new territories present new fraud obstacles. Here is why fraud familiarization is key to success and what are the fraud profiles of some of the major markets.
The CISO view: Navigating the promise and pitfalls of cybersecurity automation
Cybersecurity automation has steadily gained traction as organizations seek to improve efficiency, address talent gaps, and keep up with escalating threats. However, our latest State of Cybersecurity Automation research shows that while more businesses are utilizing automation, they continue to grapple with obstacles that prevent them from fully capitalizing on its benefits.
In our recent study surveying over 700 cybersecurity professionals, we uncovered several persistent pain points in implementing automation. The research found that a lack of trust in automated outcomes, insufficient expertise among users, and poor communication between teams have hampered automation success. As a result, organizations are struggling to build confidence in automation and maximize its effectiveness.
Why good cyber hygiene is a strategic imperative for UK SMEs
No company is immune from a cyber-attack, with large and small being targeted. As technologies advance and cybercriminals hone their skills, evolve their tactics, and find new vulnerabilities to exploit, companies can no longer ask the question of if a cyber attack will occur but when and how it will happen.
While the number of data breaches is cause for concern, the cost associated with them is equally alarming. According to Cybersecurity Ventures, the global average cost of a cyberattack has ballooned to $4.45 million, increasing by 15 percent over the past three years. Even more sobering is that it shows no signs of easing, as global cybercrime costs are projected to reach $10.5 trillion annually by 2025.
The next evolution of AI: From conversations to interactions
Chatbots such as ChatGPT and voice assistants like Siri and Alexa have become ubiquitous parts of our daily lives. Millions of people regularly converse with these AI-powered tools to get information, set reminders, control smart devices, and more. However, while chatbots and virtual assistants represent an important early milestone in the development of artificial intelligence, they remain limited in significant ways.
These conversational agents can only engage in simple, narrow tasks operating in an isolated, disembodied way, devoid of richer context and unable to leverage external data sources.Moreover, most common AI tools only utilize rigid text or voice-only interfaces, restricting more natural interaction. The true promise of AI lies in building assistants that can seamlessly interact with us and other applications in an integrated way to accomplish complex, multi-step goals.
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.