Articles about cybersecurity

Cybersecurity qualification adds new quantum and AI modules

The Chartered Institute of Information Security (CIISec) is announcing the addition of artificial intelligence (AI) and quantum computing modules to its CyberEPQ qualification for all students from September 2024 onwards.

Available to any student over the age of 14 in the UK, the CyberEPQ (Extended Project Qualification) is aimed at bringing new and diverse talent into the industry, representing an ideal stepping stone into a cybersecurity career.

Continue reading

How to overcome today's intelligence challenges to uncover the threats that matter [Q&A]

Threat intelligence is critical to protection efforts, but businesses often struggle with effective management and correlation of this data to help prioritize their efforts.

We spoke to Richard Struse, chief technology officer and co-founder of Tidal Cyber, to discuss the challenges presented when organizations scramble to update systems that aren’t actually vulnerable or stop threats that would essentially have no impact on their business.

Continue reading

Remote access tools leave OT systems at risk of attack

Remote access tools are creating cybersecurity risks and operational burdens for operational technology (OT) systems, according to a new report.

The study, from the Claroty Team82 threat research team, using data from more than 50,000 remote-access-enabled devices shows that the volume of remote access tools deployed is excessive, with 55 percent of organizations having four or more and 33 percent having six or more.

Continue reading

Free tool for service providers helps identify security and compliance gaps

Compliance automation software company Secureframe has launched its free Gap Assessment Tool to help service partners including MSPs, MSSPs, vCISOs, and IT security consultants identify gaps in security posture or compliance status.

It's designed to address a common challenge faced by IT service providers -- uncovering areas of non-compliance and potential risk while demonstrating value to clients.

Continue reading

Enterprise mobile devices see increased attacks

A new report on the mobile threat landscape from Lookout reveals a 40.4 percent jump in mobile phishing attempts and malicious web attacks targeting enterprise organizations.

More than 80,000 malicious apps were detected on enterprise mobile devices. These threats can vary widely, from invasive permissions and riskware that pose significant compliance risks to sophisticated spyware capable of tracking devices, stealing data, eavesdropping on conversations and accessing the user' camera and microphone.

Continue reading

Attacks on manufacturing companies up 105 percent

industrial skyline

The manufacturing and industrial sectors have seen a dramatic rise in cyberattacks, accounting for 41 percent of cyber incidents in the first half of 2024, an increase of 105 percent.

A new threat intelligence report from Ontinue also highlights a rise in state-sponsored campaigns from China increasingly focused on information control and leveraging zero-day exploits, further complicating attribution and escalating the global threat landscape.

Continue reading

The role of AI in securing identity [Q&A]

Identities are probably the biggest attack surface for organizations in today's world as employees rely more on systems and apps to do their jobs.

Mapping identity and access data from the large, disparate, and often disconnected, mix of on-premise and cloud systems that enterprises use is a major challenge.

Continue reading

Save $24! Get 'The Code of Honor: Embracing Ethics in Cybersecurity' for FREE

While some professions -- including medicine, law, and engineering -- have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation.

The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives.

Continue reading

Old habits, new threats -- Why more phishing attacks are bypassing outdated perimeter detection

Perimeter solutions such as Secure Email Gateways (SEGs) have long been a cornerstone of email security, historically serving as the primary line of defence against malicious emails entering an organization. Utilizing legacy technology such as signature and reputation-based detection, SEGs have provided pre-delivery intervention by quarantining malicious attacks before they reach the end recipient.

Why, then, are 91 percent of cybersecurity leaders frustrated with their SEGs, and 87 percent considering a replacement?

Continue reading

Stealth mode browser helps spot sneaky phishing attempts

A new zero-trust stealth mode browser is being launched by SlashNext, designed to see through obfuscation techniques commonly used by threat actors, and deliver enhanced protection against phishing and malware.

In recent years, well-intentioned companies offering free services such as CAPTCHA solutions and content delivery networks have inadvertently aided threat actors. For example, Cloudflare's Turnstile Services and similar CAPTCHA solutions are commonly exploited as obfuscation techniques. CAPTCHAs are used to block the crawlers employed by security services from accessing and analyzing phishing sites.

Continue reading

Starting them young -- KnowBe4 releases free children's cybersecurity kit

In an increasingly digital world, youngsters are just as a risk as the rest of us -- perhaps more so -- which means cybersecurity education for children is crucial.

Security awareness training company KnowBe4 has released its Children's Interactive Cybersecurity Activity Kit, featuring an AI safety video, a password video game, a cybersecurity activity book, and middle school lesson plans.

Continue reading

Vanta launches new tools to fight third-party risk

Trust management platform Vanta is launching new tools to help businesses understand their risk posture, particularly with regard to third-parties.

Report Center provides a real-time view into the state of a business' security and compliance program. It can automatically collect and visualize data across the entire security program, including risk management, vendors, compliance, personnel and trust.

Continue reading

Enterprises take cautious approach to security spending

Nearly two-thirds of CISOs report increasing budgets this year, with average growth rising from six percent in 2023 to eight percent this year, but this is only about half of growth rates in 2021 (16 percent) and 2022 (17 percent).

A study from IANS Research and Artico Search shows that a quarter of CISOs are experiencing flat budgets while 12 percent face declines.

Continue reading

UK public worried about over reliance on IT following CrowdStrike problems

Following the July 2024 CrowdStrike IT outages, over 78 percent of people in the UK now worry about the heavy reliance of global organizations on IT systems and software providers.

A new survey of 2,000 UK adults by One Poll for Nineteen Group, organizers of the International Cyber Expo shows that 44 percent of respondents were in some way impacted by the outages. 18 percent were affected themselves and 26 percent knew someone who was.

Continue reading

Bitdefender launches new protection solution for YouTubers

YouTube logo and finger

Attacks on content creators and online influencers have surged alongside the growing accessibility of deepfake technologies, posing a significant threat.

To combat these threats Bitdefender is launching a new Security for Creators package that safeguards content channels and social media accounts from takeovers and supports Windows, Mac, Android, and iOS.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.