Why vishing is the new phishing and how to guard against it [Q&A]
We're all familiar with the menace of phishing but, particularly following the recent Twitter attack, other methods of stealing credentials have been on the rise.
These include 'smishing' (phishing via SMS) and 'vishing' (phishing by voice call). We spoke to Ed Bishop, CTO at email security company Tessian to find out how businesses can identify vishing and smishing attacks, how the attacks work, and how companies can protect their employees.
Dataguise allows enterprises to report breaches faster and more accurately
Personal data management software specialist Dataguise is launching a new system that enables organizations to report the impact of a data breach faster and more accurately than ever before.
GDPR requires reporting of breaches within 72 hours of becoming aware, and notifying affected individuals without delay. Dataguise is able to extrapolate the number of unique data elements in a data set quickly, with greater than 90 percent accuracy, using a patent-pending approach based on neural network technologies.
Why corporate communication tools are the new threat vector [Q&A]
In the new normal world where more work is being carried out remotely, corporate communications have increased in importance but they have also come under greater threat.
As the recent Twitter attack shows, communication tools offer hackers an attractive extra method of getting hold of sensitive information like login details.
New store provides a one-stop-shop for privacy apps
When choosing data privacy applications in the past businesses have had to choose between a broad spectrum of capabilities of a focus on particular issues.
Now though SAP-backed data discovery and intelligence company BigID is launching a new Application Marketplace that allows organizations to build their optimum data solution, choosing specific capabilities that best fit their needs.
How traffic analysis can help protect business networks [Q&A]
One of the biggest challenges that cybersecurity teams face at the moment is alert noise which can blind them to real threats.
Corporate performance management (CPM) specialist Prophix Software recently chose to adopt a network traffic analysis (NTA) solution to address this issue. We spoke to Kristofer Laxdal, the company's director of information security to discover why it chose invest in NTA technology and what benefits it's seeing.
Why DevOps teams need to take container security seriously [Q&A]
Earlier this year hackers were able to exploit container platform Kubernetes to install cryptomining software in Microsoft Azure.
Fei Huang, chief strategy officer at container security platform NeuVector believes that this should be a wake up call to get the attention of enterprise DevOps and DevSecOps teams. We spoke to him to find out more about the risks and how they can be addressed.
Cloud computing in Europe: Speculations on EU cloud tech in post-pandemic era
We see the European market today as the hottest area of the global cloud in a pivotal moment. While US cloud giants battle for world domination, China is building its "Great Cloud," Russia is testing its sovereign internet, and Europe is busy creating its own digital sovereignty.
The EU recently declared a massive digital transformation for its economy in the next decade where cloud and AI technologies will play an essential role. So what exactly can we expect from the European cloud industry in the short term?
How technology can help protect against identity fraud [Q&A]
The COVID-19 pandemic has led to a tide of cybercriminal activity seeking to exploit things like government payments.
We spoke to Michael Magrath, director, global regulations and standards at anti-fraud and digital identity solutions company OneSpan to find out how governments and enterprises can use technology to guard against the threat.
How ransomware attacks are making the most of the COVID-19 crisis [Q&A]
Ransomware is a business that's thriving in the current climate, but what's behind this and what wider problems do attacks create for businesses?
We had a socially-distanced chat with Chris Morales, head of security analytics at network detection and response specialist Vectra to find out more.
Evolution of privacy protection over the coming years
The war over data privacy has been raging for 25 years and is far from over. Large corporations, states and criminal networks are improving tracking tools, trying to dictate their own rules, and control and manage people's need to protect their personal data. The issue of privacy is getting unbelievable traction on different levels, including the GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act).
The value of personal data is constantly increasing, as it's getting harder to collect, and the possibilities of making money on it are endless. Will users ever be able to decide for themselves what information they are willing to share? To address this question, let's move away from individual cases and look at how privacy protection technologies in general will develop in the coming years.
Why payroll security is even more essential now remote work is the norm
The COVID-19 pandemic is changing the way people work and do business. As governments worldwide impose compulsory community quarantines and lockdowns, many are turning to the internet to continue operating their businesses or doing their jobs. Teleworking is becoming the new normal with everyone expected to observe physical distancing to avoid the pandemic spreading.
Among other systems, payroll is one of the workflows worth examining amidst the changes brought about by the pandemic. As companies adopt remote work arrangements to avoid complete operational shutdown, those that have been manually processing their payroll need to find ways to adjust to the new situation.
Google Meet is now free for everyone, making it a viable alternative to Zoom
It's only a few days since Facebook launched Messenger Room to serve as an alternative to video conferencing service Zoom. Now Google is getting in on the action, making is own video meeting tool available for free.
Google Meet has been opened up to everyone with a Google account -- previously only people with a paid-for G Suite account were able to start calls. From now until September meetings of any length involving up to 100 people are completely free, but at the end of September some restrictions will be introduced.
Why malicious domain registrations are a growing problem [Q&A]
More than 16,000 COVID-19 related domains have been registered since January and while some are legitimate many have been set up to serve malware, create phishing pages, or scam site visitors.
And malicious domains aren't just a problem during the current pandemic, they're a growing issue across the internet. This is not helped by privacy rules which mean it's become harder for security researchers to use Whois to see who owns a domain.
Microsoft seeks to elevate Teams above Zoom with commitments to privacy and security
Video conferencing tools like Zoom, Microsoft Teams and Skype have been the center of attention in recent weeks because of companies' increased reliance on them during coronavirus lockdowns. Zoom has been in the headlines for many of the wrong reasons, however, and Microsoft is keen to ensure it doesn't get tarred with the same brush.
The company had made a series of commitments about its Teams software, promising users that their virtual conversations are private and secure.
Microservices, identity, and privacy by design
Part 2: The advent of Microservices has dramatically opened up the ability to rapidly develop and update applications and services. This is done by breaking them into very small pieces, where each piece can be managed by a single team or one team can manage several pieces. Each of these pieces then comes together with hundreds or thousands other pieces to create a larger framework or workflow. They are at the heart of the DevOps methodology, and an expectation today with the idea of a continues development or continuous delivery mindset.
This provides application and service owners the ability to rapidly scale, update, and develop their services is something that most modern business application service owners want. This also makes businesses run more efficiently. An example is when you need more delivery job servers, with Microservices you spawn more job services and you don’t go down. Easier and more efficient. However, in today’s world, we need to remember that privacy and security have to be top concerns. And in today’s world, Microservices are lacking in this area.
Recent Headlines
Most Commented Stories
Windows 12.1 is everything Windows 11 should be -- and the Microsoft operating system we need!
Apple Intelligence will launch in beta and that’s unacceptable for a trillion-dollar company
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.