7 reasons to start using deception technology
Hacker attacks are often based on social engineering. Attackers send phishing emails, create fake websites and apps. Their goal is to force the victim to click a malicious link, open a virus file, or provide sensitive data. Simply put, cybercriminals try to deceive their victims. Deception technology adopts the same principle. It is intended to deceive the hackers. And it does it very successfully. Gartner analysts placed the deception approach on their radar of the most promising security technologies. Deception technology is easy to deploy, and it is effective in detecting and avoiding various threats aimed at organizations of all sizes. If you doubt whether your company needs to employ deception technology, here are seven reasons to try this defense practice.
0-day vulnerability protection
Process orchestration: The unsung automation hero
When you think about process automation, you might naturally think of a company like Amazon. From ordering, to warehouse automation, to delivery, to returns -- end-to-end business processes flow seamlessly, like magic. When you’re building from scratch as a startup, this level of process automation is easier to achieve than if you’re contending with legacy systems.
But today, 70 percent of global companies list legacy modernization as a top strategic business priority. That means automating all of their processes from scratch isn’t always an option. Ripping and replacing legacy systems is disruptive and costly. That’s where process orchestration comes in.
Agile Pentesting offers developers more control and flexibility
Pentest as a Service (PtaaS) company Cobalt is today launching Agile Pentesting, a new offering that provides more control and flexibility to better meet the needs of businesses through versatile, ad hoc testing.
Agile Pentesting allows organizations to identify and address vulnerabilities at a faster, more frequent rate to minimize risk. This contrasts with what Cobalt calls 'comprehensive pentesting', which is often done in support of business drivers like compliance or M&A activity, the new offering helps accelerate customers' DevOps journeys while aligning with their CI/CD pipelines.
Talent shortages are shaping tech investment
Almost three quarters (73 percent) of senior IT leaders agree that acquiring IT talent has never been harder and 98 percent say attracting IT talent influences their organization's technology investment choices.
The research from MuleSoft also shows that 86 percent of senior IT leaders now say the experience an organization provides its employees and customers is as important as its products and services.
Watch Apple reveal the new iPhone 14 at today's 'Far Out' event, here live
It’s that time of year again, when Apple is set to unveil the next generation of iPhones, as well as other hardware, like the Apple Watch Series 8.
It is expected that Apple's Pro and Max models will see a processor boost, improved cameras (with the main camera jumping up to a 48-megapixel sensor), and lose the notch at the top. The new phones may also gain an always-on feature.
Understanding threat detection methods [Q&A]
Detecting threats today isn't just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well.
In order to be effective, security teams need to look at what data to use, what the science says can be done with the data, and what to expect. We spoke to Andrew Hollister, CISO at LogRhythm to find out more.
Microsoft releases PowerToys v0.62.0 with THREE amazing new utilities to play with
Recent updates to PowerToys have focused on fixing bugs and improving stability, but now it is finally time for some new features. With the release of PowerToys v0.62.0, Microsoft has added not one, not two, but three new utilities.
If you have been following PowerToys news, you will probably be aware of the Text Extractor tool which can be used to grab text from images, and has been in development for a little while. Likewise, the self-explanatory Screen Ruler utility is one you may have heard of. Completely new, however, is Quick Accent which makes it quick and easy to type accented characters.
Making sure 5G networks are a friend, not a foe, to organizations
Over the last five years, 5G has been one of the biggest buzzwords in the technology industry, with the largest telecommunication providers and the latest devices offering the service. Whilst it does offer lightning-fast internet speeds, real-time connectivity, and many more benefits, there is a catch.
5G creates businesses both opportunities and dangers, with cyber criminals using the technology to aid their attacks and breach networks. Therefore, organizations must understand the cyber threats that are present within their 5G networks and how they can be stopped.
Why accessibility is good business but rarely a priority
According to the World Health Organization, one billion people -- approximately 15 percent of the world’s population -- live with some form of disability. There are more than 350 million people suffering from color blindness alone, and discretionary disposable income of people with disabilities is estimated to be half a trillion dollars in the U.S. The potential revenue that businesses can gain from better serving people with disabilities is immense.
But despite those staggering numbers, accessibility is often ignored in the design and development of digital products. When not completely ignored, it is commonly planned and budgeted for to be done at a later time, often due to a product management paradox.
Security awareness training goes mainstream but still needs more work
Some form of cybersecurity awareness training has been implemented in 97 percent of enterprises this year, according to a new survey of 1,900 security professionals from ThriveDX.
However, only 42 percent report involving their employees in security detection with the use of such measures as a Phishing Incident Button, while 65 percent agree that their training program needs expansion.
Almost half of education institutions see attacks on their cloud infrastructure
A new study reveals that 47 percent of educational institutions have suffered a cyberattack on their cloud infrastructure within the last 12 months.
The research from Netwrix shows that for 27 percent of these incidents in the cloud were associated with unplanned expenses being incurred to fix security gaps.
Western Europe dominates broadband speed tables
Western European countries take seven of the top ten fastest spots in the world for broadband, with Macau, Taiwan and Japan the only locations elsewhere to make it into the top ten fastest in the world.
The five places with the fastest internet in the world are: Macau (262.74Mbps), the Channel Island of Jersey (256.59Mbps), Iceland (216.56Mbps), Liechtenstein (166.22Mbps) and Gibraltar (159.90Mbps).
Slackware-based Salix 15 Linux distribution available for download
Are there way too many Linux distributions these days? Absolutely. More specifically, there are far too many operating systems that are based on other operating systems. If I see one more Linux distro based on Debian or Arch, I swear I am going to literally puke.
Linux distributions based on Slackware, however, are far less common these days, so such distros are definitely worth some attention. Today, the Slackware-based Salix 15 becomes available for download. This Linux-based operating system uses the Xfce 4.16 desktop environment and kernel 5.15.63. In addition to Flatpak support, this version of the distro comes with some excellent software pre-installed, such as Firefox 102 ESR, GIMP 2.10, and LibreOffice 7.4. Believe it or not, there are even versions for both 32-bit and 64-bit processors!
Why solving the identity management crisis facilitates the adoption of digital transformation
Identity data is frequently stored by organizations using a variety of sources, formats, and protocols, sometimes making it impossible to access essential identity information needed for security and business decisions. Without precise identity data, systems cannot decide what users should and should not be able to access which resources. Even worse, to make life easier for the admins, sometimes the default is overextending access and over-privileging accounts. This raises the possibility of a successful breach, as well as the possibility that it will go unnoticed for a longer period of time.
The number of identities linked to companies has also been increasing exponentially -- a recent study by Gartner Peer Insights found that 60 percent of organizations have more than 21 identities per user.
Cloud servers are the most common way in for cyberattacks
New data unveiled by the Atlas VPN team shows that cloud servers are now the number one way in for cyberattacks on businesses, with 41 percent of companies reporting them as the first point of entry.
The data, based on the Cyber Readiness Report 2022 by insurer Hiscox, also shows a 10 percent increase in cloud server attacks over the year before.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.