SaaS applications and what they mean for security management [Q&A]

SaaS

The move to using SaaS applications has been accelerated by the pandemic, with many businesses turning to the cloud to enable their staff to work remotely.

But this raises new issues around keeping the business secure. We spoke to Shailesh Athalye, vice president of compliance at security and compliance platform Qualys to discover more about the issues and how to approach them.

Continue reading

Is virtual learning the future of work?

The working environment has changed over the past year. Social distancing restrictions mean that many people have been obligated to work from home. This has affected work across many sectors -- particularly when it comes to training.

The Office for National Statistics measured that in April 2020, 46.4 percent of people in employment did some work from home. Of these people, 86 percent did so as a consequence of the pandemic.

Continue reading

Enterprises at risk from malware delivered by cloud apps

Cloud risk

New research shows that the majority of all malware is now delivered via cloud applications, showing how attackers increasingly abuse popular cloud services to evade legacy security defenses, putting enterprise data at risk.

The report from Netskope reveals that 61 percent of all malware was delivered via a cloud app, up from 48 percent year-over-year.

Continue reading

Microsoft is shortening the support period for Windows 10 Enterprise LTSC

Windows keys

Anyone who has invested in Windows 10 LTSC (Long Term Servicing Channel) has had the comfort of knowing that Microsoft offered 10 years of support. But this is changing.

The company has announced that the support period for Windows 10 Enterprise LTSC is being halved to just five years, bringing the operating system in line with the recently announced changes to Office support. However, support for Windows 10 IoT Enterprise LTSC will remain at 10 years.

Continue reading

Digital forensics is the best offense and defense for cyber attacks

security eye fingerprint forensics

The majority of CEOs and COOs view digital forensics as an afterthought to cybersecurity. In the eyes of many business leaders, it is just a clean-up process for a data breach or cyber attack. But if you establish an effective digital forensics and incident response (DFIR) program, you can begin to use digital forensics as a tool for both recovery and prevention.

While cybersecurity and digital forensics work hand-in-hand, their close relationship can often obfuscate their individual objectives. For instance, cybersecurity’s main goal is to reduce an organization’s exposure to cyber attacks while also preventing their success. Cybersecurity has become even more important over the last decade and a half as industry leaders make the transition to digital applications. This is particularly true of the healthcare and automotive industries who have been lacking in their cybersecurity and forensic preparedness.

Continue reading

Why enterprises aren't properly addressing supply chain threats [Q&A]

supply chain

Supply chain threats like the recent SolarWinds attack are becoming more of a concern as businesses are more reliant on smoothly functioning links with suppliers and customers.

A successful attack can have a devastating effect on an organization and its reputation, but by their very nature these are not easy threats to deal with.

Continue reading

Executives' social media accounts put enterprises at risk

Executive social media

Information security often focuses on what's going on within the enterprise perimeter, but as businesses invest more in executive communication programs, there are risks which are sometimes overlooked.

According to a new survey from SafeGuard Cyber oversight of executive social media use is lacking, record-keeping is often manual, and the responsibility for risk management isn't clear.

Continue reading

Emotional intelligence becoming key to CISO roles

Emotional intelligence

Greater emphasis on emotional intelligence and other skills required to work with different stakeholders is placing new demands on Chief Information Security Officers (CISOs) according to a new study.

But it's also creating opportunities for CISOs to become leaders of their organizations, according to the report from cyber security provider F-Secure, in conjunction with Omnisperience.

Continue reading

Microsoft Teams use boosted by pandemic work shift

MS teams

Among the main beneficiaries of the pandemic-related shift to remote working have been suppliers of workplace collaboration and conferencing software.

New research from digital experience management platform Aternity shows that Microsoft has been a big winner with Teams usage increased nearly 3,900 percent since the beginning of pandemic.

Continue reading

Demand for business intelligence solutions increases by 41 percent

Business intelligence

A survey of over 120 developers and IT leaders from Reveal shows a 41 percent increase in demand for business intelligence solutions last year and 38 percent seeing increased revenue as the tech market shifted.

But while many took advantage of opportunities, 50 percent reported having to make do with less in 2020. Of those, 23 percent saw projects canceled or postponed, with some respondents indicating lost funding (14 percent) and staff reductions (14 percent).

Continue reading

Poor SIEM configuration puts enterprises at risk

open digital lock

Enterprises invest billions annually on SIEM (Security Information and Event Management) software and expect this investment to result in comprehensive threat coverage.

But a new report from AI-powered threat coverage platform CardinalOps shows that on average SIEM deployment rules miss 84 percent of the techniques listed in MITRE ATT&CK.

Continue reading

Privileged access is the Achilles heel of enterprise security

Admin login

Failure to automate control of physical accounts is a major weak point in enterprise security according to a study released by Thycotic.

Among the findings are that a significant number of enterprises (28 percent) only audit privileged access management (PAM) on a quarterly or annual basis.

Continue reading

The importance of adaptability in an increasingly complex world

Plan A Plan B change

Adaptability to changing conditions is a must-have trait for today’s organizations, especially during today’s uncertain world. Business leaders must prioritize adaptability as a must-have organizational trait, and as disruption accelerates, there is no guarantee that the biggest and toughest industry players will survive. 

Organizations that understand their environments and are positioned to sense change and adapt are the most likely to survive in the event of disruptions. 

Continue reading

Automating routine operations tasks will address critical IT challenges

Automation

In a new study, 82 percent of respondents cite too many redundant or routine tasks as their most critical IT challenge, but 91 percent agree that automating routine manual tasks by introducing Artificial Intelligence for IT Operations (AIOps) can provide significant benefits across the enterprise.

The Autonomous Enterprise survey from Digitate shows 65 percent say lacking a proactive ability to predict, identify, and detect system issues is a major challenge.

Continue reading

Developers play a key role in digital transformation despite COVID

digital transformation

Developers are playing a key role in helping enterprises meet their digital transformation goals despite facing significant challenges from COVID-19 according to new research from Couchbase.

The survey of 450 European and US senior IT decision makers finds 92 percent of respondents believe that DevOps could have a revolutionary impact on their digital transformation efforts, while 63 percent say that the flexibility to change their goals when needed has been helpful in meeting their digital transformation goals.

Continue reading

Load More Articles