cybersecurity

You can't win: Learning to live with security pessimism

Cybersecurity can, at times, feel like a thankless and invisible task. The punishment for a mistake is immediate and ruthless, the reward for success next to non-existent, because how do you recognize the absence of a breach? But this isn’t a new scenario; the IT industry has dealt with this outlook for decades. The job of an IT department is to be invisible, but when something does go wrong all eyes are inevitably on them to fix it.

In a threat landscape where there exists a constant push to innovate, adapt and breach, there are only three possible outcomes for the IT industry: defeat, indefinite struggle, or complete structural collapse.

By Alex Reid -
Female Teacher Helping Pupil Using Computer In Classroom

UK schools not doing their homework on email security

As students at schools and colleges in the UK begin to return after the summer break, new research shows that 96 percent of the top 50 state secondary schools, 92 percent of the top 50 sixth-form colleges and 80 percent of the top 50 universities in the UK are lagging behind on basic cybersecurity measures, leaving students, staff and partners at risk of email-based impersonation attacks.

The research from cybersecurity company Proofpoint is based on an analysis of DMARC adoption and reveals that 70 percent of UK schools are currently taking no steps to protect themselves from domain impersonation by having no published DMARC record.

By Ian Barker -
BYOD key

Half of European enterprises have no formal BYOD policy

The shift to remote and hybrid working has led to many more people using their personal devices for work purposes.

Yet a new survey, from Apple device management specialist Jamf, reveals that 49 percent of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources.

By Ian Barker -
Healthcare cybersecurity

60 percent of healthcare industry cyber incidents impact patient care

A new survey from Claroty of 1,100 cybersecurity, engineering, IT, and networking professionals from healthcare organizations finds 78 percent of respondents experienced a minimum of one cybersecurity incident over the last year.

Perhaps more concerning is that 60 percent of those incidents had a moderate or substantial impact on patient care and 15 percent had a serious impact that compromised patient health and/or safety.

By Ian Barker -
Magnified certificare

Over half of data breaches are down to digital certificates

Among organizations that have suffered data breaches, 58 percent were caused by avoidable issues related to digital certificates.

New research conducted by Forrester for AppViewX also shows that as a result of service outages 57 percent say their organizations have incurred costs upwards of $100,000 per outage.

By Ian Barker -
insurance key

Cyber insurers play harder to get as claims increase

A new survey of over 300 organizations in the US finds that the time and effort to obtain cyber insurance is increasing significantly.

The survey, conducted by Censuswide on behalf of privileged access platform Delinea, looked to uncover new trends and evolving patterns since a similar report last year and finds that the numer of companies using their cyber insurance more than once increased to 47 percent.

By Ian Barker -
renati

New mobile operating system focuses on security and privacy

Today's online world relies on monetizing information. Sensitive data is sourced through search engines, web browsers, and app developers and can be used to target marketing and more.

If you're concerned about how your data is used you might be interested in the launch by Myntex of Renati. This is a security-focused, Android-based mobile operating system for Pixel devices designed to disrupt data collection.

By Ian Barker -
Cybersecurity-blocks

A holistic approach to closing the container security gap [Q&A]

Among cloud developers, Kubernetes is now a widely used platform. It's not immune to security incidents, however, and these can lead to loss of revenue or customers.

So, what's the best way to secure Kubernetes systems? Alex Jones, engineering director Kubernetes at Canonical, suggests a need to look beyond containers with a holistic approach to security that spans all layers of the system. We talked to him to discover more.

By Ian Barker -
SaaS

Generative AI raises SaaS security worries

IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture.

New data from Snow Software, which surveyed 1,000 IT leaders, finds 96 percent of respondents say they are still 'confident or very confident' in their organization's SaaS security measures, and yet, 'managing the security of SaaS applications' is the top challenge for IT leaders.

By Ian Barker -
DDoS attack

DDoS attackers shift their targets

The latest global threat analysis report from Radware shows that DDoS attacks are being reshaped in terms of tactics, vector, size, complexity, and hacktivism.

The number of malicious web application transactions skyrocketed by 500 percent compared to the first half of 2022, while the total number of DDoS events decreased by 33 percent. This points to a change in DDoS attack patterns as attacks shift from the network layer to the application layer.

By Ian Barker -
risk jigsaw piece

66 percent of businesses don't understand their cyber risks

Businesses are struggling to understand their cyber risks, with 66 percent of respondents to a new survey indicating that they have limited visibility and insight into their cyber risk profiles.

The survey, conducted by Censuswide for Critical Start, shows 67 percent of organizations have experienced a breach requiring attention within the last two years despite having traditional threat-based security measures in place.

By Ian Barker -
Checklist

What IT pros want from container security solutions

What capabilities do IT professionals need for container networking and security? That's what a new study from Tigera has set out to discover.

A survey of more than 1,200 users of the Calico Open Source container security platform finds the capabilities driving their adoption of Calico are, scalable networking (35 percent), security policies (35 percent), interoperability across different environments (33 percent) and encryption capabilities (30 percent).

By Ian Barker -
Hack and AI concept

Generative AI increases vulnerability to cyberattacks

Senior security professionals view generative AI as a disruptive cybersecurity threat, with 46 percent of respondents to a new survey believing generative AI will increase their organization's vulnerability to attacks.

The study from Deep Instinct shows the top three generative AI threat issues are seen as growing privacy concerns (39 percent), undetectable phishing attacks (37 percent) and an increase in the volume and velocity of attacks (33 percent).

By Ian Barker -
multiple threats

Half of browser extensions pose a high risk to business

As businesses increasingly turn to SaaS applications in order to streamline their operations and facilitate hybrid working, a new report reveals the risks that can be posed to these apps by browser extensions.

The study from Spin.AI shows almost 51 percent of browser extensions pose a high risk to data stored in Google Workspace and Microsoft 365, and 44 percent pose a medium risk.

By Ian Barker -
Data privacy

Americans want data privacy and they worry about AI

A new survey of over 1,000 Americans reveals that people are deeply concerned about their personal data, believe their data is priceless, want a national privacy law, and are pessimistic about the rise of AI and personal data.

The study for PrivacyHawk, conducted by Propeller Research, shows 45 percent are very or extremely concerned about their personal data being exploited, breached, or exposed. Over 94 percent are generally concerned. Only 5.7 percent of the US population is not concerned at all about their personal data risk.

By Ian Barker -
Load More Articles