Google Cloud

Sensitive data on Google Drives puts companies at risk

New research from Metomic finds that 40 percent of Google Drives hold sensitive data that could put an organization at risk of a data breach or cybersecurity attack.

The research scanned around 6.5 million Google Drive files and also shows that 34.2 percent of all the files scanned were shared with external contacts (email addresses outside of the company's domain) and more than 350,000 files (0.5 percent) had been shared publicly, giving access to anyone who had the document link.

By Ian Barker -
Arrow and money staircase increase rise cash

Ransomware attacks lead to companies raising prices

Ransomware attacks are influencing price inflation, according to a new UK survey by Censuswide, commissioned by Veeam Software.

The findings show that large organizations are having to increase costs to customers by an average of 17 percent following an attack. Nearly a quarter of companies (22 percent) say they increased prices by 21-30 percent, while six percent increased prices by 31-40 percent.

By Ian Barker -
multiple threats

84 percent of organizations combine IT and security operations in one analytics tool

A new survey of 500 full-time security decision-makers and practitioners finds that 84 percent indicate their organization combines security and data operations into a single analytics tool.

However, the study from Observe shows more than half of the security relevant data that goes into observability systems needs to be transformed before it can be used.

By Ian Barker -
The factory automated conveyor shop on production of strawberry jam.

Only 19 percent of manufacturing leaders are confident of their cyber defenses

New research into the manufacturing threat landscape from Trustwave finds that just 19 percent of manufacturing industry leaders are confident in their cyber defense mechanisms.

The research documents the attack flow utilized by threat groups, exposing their tactics, techniques, and procedures. From email-borne malware to the exploitation of SMB and DCOM protocols for lateral movement, these persistent threats pose significant risks to the manufacturing sector.

By Ian Barker -
Cisco logo

Cisco launches AI security assistant for enterprises

As cyberattacks continue to evolve so defenses need to change to keep up. In many cases that means adopting AI.

Enterprise networking and security company Cisco is the latest to embrace this with launch of Cisco AI Assistant for Security.

By Ian Barker -
Technology center with fiber optic equipment

Network security is ripe for automation -- except when it isn't [Q&A]

According to one analyst estimate, the market for network automation tools will grow nearly 23 percent annually from 2022-2030.

While many IT professionals are familiar with automation of business processes, they are likely less familiar with its applications in network operations (NetOps) and security. As automation technology is maturing, organizations are using network automation solutions to transform their core workflows, including troubleshooting, change management and network security, for more efficient and effective network operations.

By Ian Barker -
Automation

Automation of software security functions soars

The use of automated security technology is growing rapidly according to the latest edition of the annual Building Security In Maturity Model (BSIMM) report from Synopsys.

The research also shows that there's a move towards a 'shift everywhere' culture -- which means performing security tests throughout the entire software development life cycle -- across more organizations.

By Ian Barker -
Public wi-fi

The risks of public Wi-Fi and how to stay safe [Q&A]

The demands of daily lives increasingly mean that we want to be connected wherever we are. Add in the shift to hybrid working and we’re likely to want to be in touch with the office all the time too.

That makes the lure of free public Wi-Fi, whether it's in a coffee shop, a hotel or an airport, hard to resist, especially if you have a limited data allowance on your mobile contract. But of course using public networks always comes with a side order of added risk.

By Ian Barker -
Google magnifier

Google begins deleting inactive accounts

Starting from today, a new Google inactive account policy comes into effect which means that accounts that haven't been active for two years will be deleted.

So, what counts as 'activity'? Google provides a helpful list:

By Ian Barker -
cloud security

Why you need a multi-layered strategy to secure the cloud [Q&A]

Recent cyber attacks have seen not just the usual monetary motives but also the rise of espionage attempts with attacks on government officials.

So how can organizations, both public and private sector, protect their most valuable assets? We spoke to Glenn Luft, VP of engineering at Archive360, to find out.

By Ian Barker -
controlling hacker

Number of cyber extortion victims up by 46 percent

The cyber extortion threat landscape continues to evolve quickly and the past 12 months have seen the number of victims globally increasing by 46 percent, marking the highest numbers ever recorded.

A new report from Orange Cyberdefense shows large enterprises were the victim in the majority of attacks (40 percent), with those employing more than 10,000 people seeing a steady increase.

By Ian Barker -
Cloud crime lock

Cloud storage vulnerable to ransomware attacks

New research from Dig reveals that cloud assets like Amazon S3 buckets and Azure Storage accounts are being left open to ransomware attacks thanks to poor configuration.

It shows that only 31 percent of S3 buckets have versioning enabled, an essential for data recovery, while just two-thirds of sensitive buckets have logging enabled, a prerequisite for detection. In addition 72 percent of remote CMK buckets are not actively monitored.

By Ian Barker -
Cybersecurity-All-in-One-For-Dummies

Get 'Cybersecurity All-in-One For Dummies' (worth $30) for FREE

Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in.

This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems -- and explains why doing so is more important now than ever.

By Wayne Williams -
Healthcare cybersecurity

The challenges of securing the healthcare sector [Q&A]

The healthcare sector is particularly attractive to cybercriminals due to the amount of personal data held and the critical nature of many systems.

We spoke to Shankar Somasundaram, CEO of IoT risk management platform Asimily, to discuss healthcare systems and the challenges involved in securing them.

By Ian Barker -
business fear

IT leaders worry about security despite being prepared

While 92 percent of IT business leaders believe they've made the right security investments and 88 percent say they meet all compliance requirements, half still worry about their company's security.

New research by Propeller Insights for AppDirect shows top areas of concern include cybersecurity risk (58 percent), information security risk (53 percent) and compliance risk (39 percent).

By Ian Barker -
Load More Articles