Conversational interface helps insider threat detection
Lack of visibility into endpoints poses a major issue for enterprises as IT administrators can be left in the dark about where data is and how it's being used.
This means that when data breaches occur it can take longer to detect the source. A new tool from ThinAir aims to shorten this detection time by analyzing interactions and making information available via a conversational interface.
How to protect your company from 'zero-day' exploits
Is your company protected from zero-day exploits? Do you even understand what these threats are and how they can affect you? If you don’t, chances are you won’t be prepared when a hacker takes advantage of one of these exploits and steals a large amount of sensitive information from you.
Zero-day exploits are no joke -- some of the most costly cyber-attacks in history have come from hackers using these vulnerabilities. They can cost you more than just a lot of money; they can make your customers lose faith in your ability to protect their information. What can you do to deal with these exploits? Fortunately, there are a few ways to keep your network and the data you store safe and sound.
New auto technology, new consumer considerations
Our taste for new tech has compressed the adoption cycle and introduced fresh technology into a variety of industries, including automotive. By 2020, 10 million self-driving cars will be on the road. Think about it -- that’s just three years away.
So soon, in fact, that it’s snuck up on many of us. So, what else can we expect? Here are three to keep an eye on.
UK government could imprison people for looking at terrorist content
Not content with trying to "combat" encryption, the UK government also wants to criminalize looking at terrorist content. The leading Conservative party has announced plans which threaten those who "repeatedly view terrorist content online" with time behind bars.
New laws will be introduced that could see consumers of terrorist content imprisoned for up to 15 years. The same maximum sentence would face those who share information about police, soldiers or intelligence agencies with a view to organizing terrorist attacks.
Cyber risks are being created by departments outside IT
More risks are being created by departments outside of IT, but it's still the IT department's problem according to a new survey.
The study by identity platform SailPoint shows that 55 percent of respondents believe one of the key reasons that non-IT departments introduce the most risk is that they often lack the understanding of what actions and behaviors are potentially hazardous.
Microsoft releases Windows 10 Fall Creators Update RTM to Insiders in the Fast ring
With just a couple of weeks to go until the official launch of the Windows 10 Fall Creators Update, Microsoft is hard at work squashing the main bugs and polishing the release.
Insiders on the Fast ring have had access to all of the new features and changes in the Fall Creators Update for a while, and it won’t now be long until non-Insiders finally get their hands on the full thing.
Google releases new Android Wear beta... that's only compatible with one watch
Google has released a new beta version of Android Wear, but it's an update that's going to be of interest to a very limited number of people. For testing in the real world, the beta is only compatible with the LG Watch Sport.
While this may sound like a serious limitation -- well, it is really -- Google is quick to point out that anyone can try out the beta by installing the Android emulator. But what can you expect to find in this new release?
UK's confused Home Secretary doesn't understand encryption -- but wants to 'combat' it anyway
The UK Home Secretary, Amber Rudd, has admitted that she doesn't understand end-to-end encryption, but still wants to "to find the best way to combat" it anyway. Speaking at the Conservative Party conference, she said that Silicon Valley had a "moral obligation" to help fight the crime and terrorism she believes is abetted by encryption technology.
Despite having previously voiced support for back doors into systems such as WhatsApp, Rudd said she does not want such access, nor is she seeking to ban encryption. Saying "I don't need to understand how encryption works to understand how it's helping -- end-to-end encryption -- the criminals," she added that she wants technology firms to make it easier for police and security services to access encrypted data.
How to properly implement identity and access management
Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and being able to prove that all the access is legitimate. But as those heavily involved in IAM know, that is much easier said than done. There’s a lot that goes into getting all of these elements "right."
First, you must set up the accounts that enable a user to get to the resources they need -- often called provisioning (and its dangerous sister, de-provisioning, when said user no longer needs that access). Second, in order for that account to grant the appropriate access, there has to be a concept of authorization which provides a definition for what is allowed and not allowed with that access. And third, there should be some way to make sure that provisioning and de-provisioning are done securely with efficiency and that the associated authorization is accurate -- i.e. everyone has exactly the access they need, nothing more and nothing less.
UK businesses have a culture of secrecy towards data breaches
At a time when British businesses should be bolstering and updating their data protection policies in preparation for new legislation, it is worrying to report a culture of secrecy and ambivalence towards data breaches across the country.
With the EU General Data Protection Regulation (GDPR) due to come into force on May 25 next year, bringing with it huge fines of up to 20m Euros or four percent of turnover, a survey has revealed the real extent of Britain’s data breach problem.
GDPR is a set of security best practices, not a burden
The General Data Protection Regulation (GDPR) that takes effect May 25th 2018 is still raising serious compliance concerns for most UK companies, according to a Bitdefender survey. With companies becoming more enthusiastic in deploying hybrid infrastructures that involve leveraging the capabilities of both the public and the private cloud, 85 percent of UK respondents agree encryption is the most effective way to secure public cloud data.
Interestingly, only one third of UK respondents actually secure between 31 and 60 percent of cloud-stored data, while 21 percent encrypt everything stored within the public cloud. With GDPR placing tough restrictions regarding how "any information relating to an identified or identifiable natural personal" is handled, encryption plays a vital role in achieving this.
Microsoft to close Groove Music Pass and move users to Spotify
Microsoft has announced plans to close down its Groove Music Pass subscription service. The company is also going to kill off the ability to purchase music from the Windows Store.
Microsoft is partnering with Spotify, and offering a seamless migration from Groove Music to its former competitor. The cull is coming on December 31, and after this date the Groove Music app will no longer offer the option to stream, purchase, and download music.
Facebook Messenger Lite now available in US, Canada, UK and Ireland
There has been something of a trend in recent months for "lite" versions of popular services to launch in developing markets. While the aim is to provide access for people with limited data plans, there is interest in data-saving apps from all parts of the world.
Having launched Facebook Messenger Lite last year to a limited number of markets, the social networking giant is now pushing its messaging app to the US, Canada, UK and Ireland. For now the app is only available for Android -- Facebook has not yet said whether an iOS version is in the works.
How Dubai Airport handles 90 million passengers a year
Heading to the airport has become a necessary process for almost all business professionals these days, but all too often, the airport can be a minefield of potential hold-ups or stressful procedures.
However this may all be about the change, as Dubai Airport is looking to introduce a new way of traveling that uses the latest connected technology to ensure their passengers have as smooth as journey as possible.
Facebook tests facial recognition to unlock accounts
Facebook is testing the use of facial recognition as a way of enabling people to regain access to their accounts if they get locked out. The unlock method would be offered as an alternative to two-factor authentication techniques such as SMS or email verification.
The social network says that if there is sufficient interest in the feature -- and providing it cannot be defeated by hackers -- it will receive a wider rollout after testing.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.