Hackers are winning the cybercrime war say business leaders

controlling hacker

A Europe-wide survey of almost 600 successful businesses reveals that 61 percent of business leaders on the board of their company believe that in the war against cybercrime the hackers are more sophisticated than the software developers.

The study carried out for global network RSM by the European Business Awards also finds that 60 percent of these board members believe they may have been breached without them knowing and 73 percent consider themselves at risk from cybercrime.

Continue reading

Bugcrowd launches crowd-driven approach to understanding the attack surface

web threats

According to a recent Gartner report a third of successful attacks on enterprises will come via shadow It by 2020.

It's therefore more important than ever for organizations to understand the risks and properly assess the attack surface they present. Bugcrowd is launching a new Attack Surface Management (ASM) tool to allow them to do this.

Continue reading

Organizations build 'security debt' by focusing on new flaws

security flaw

A focus on fixing new issues while neglecting ageing flaws leads to increasing security debt according to a new report.

The study -- the 10th such report from security testing specialist Veracode -- analyzed more than 85,000 applications across more than 2,300 companies worldwide and finds that fixing vulnerabilities has become just as much a part of the development process as improving functionality.

Continue reading

Enterprises look to replicate the consumer mobile experience -- but circumvent the breaches

Data breach

Folks involved in enterprise mobility and security have witnessed a long and growing list of breaches of consumer mobile devices. One in three organizations admitted to suffering a compromise due to a mobile device, according to a study by Verizon.

Today, it’s past the time for enterprises to become concerned, and nearing the time to become alarmed, as they’re forced to consider the possibility of similar breaches of the apps and devices they provision for their employees. "The popularity of mobile apps in conjunction with the emergence of their security flaws means that mobile is prime to be the next attack vector that threatens corporate data and user privacy," said Adam Ely, founder and COO of Bluebox. In these circumstances, enterprises have to confront their attitudes, and maybe their complacency, and determine if it’s time for a major overhaul of their mobile initiatives.

Continue reading

Motive doesn't matter: The three types of insider threats

insider threat

In information security, outside threats can get the lion's share of attention. Insider threats to data security, though, can be more dangerous and harder to detect because they are strengthened by enhanced knowledge and/or access.

Not only is it vital, therefore, to distinguish and prepare for insider threats, but it is just as vital to distinguish between different types of insider threats. A lot has been written about the different profiles for insider threats and inside attackers, but most pundits in this area focus on insider motive. Motive, however, doesn't matter. A threat is a threat, a breach is a breach. A vulnerability that can be exploited by one party for profit can be exploited by another for pleasure, by another for country, and so on. Instead of analyzing motives and reasons, it is far more useful to compare insider threats by action and intent.

Continue reading

Enterprises struggle to make data available for insights

Too much data

The value of big data, we're told, is that it allows organizations to derive useful insights which can drive digital transformation projects.

However, a new study from cloud warehouse data transformation company Matillion and IDG Research shows that making data available for insights is a barrier for 90 percent of enterprises.

Continue reading

New generation solution streamlines document management

Documents and laptop

Despite the rise of technology and increasing numbers of online transactions, most enterprises still rely on documents in some form and this brings with it the risk of lost or mis-filed records.

With the launch of its latest DocStar Enterprise Content Management solution, Epicor Software gives businesses easy and secure file sharing, and provides automation to route and process business documents more efficiently and quickly.

Continue reading

Talent shortage holds back data analytics projects

talent

Although organizations are becoming more data driven, projects are being held back by a shortage of skilled staff according to a new study.

The research by data science specialist Alteryx surveyed IT decision makers across the UK and five other countries in Europe, the Middle East and Africa (EMEA) and Asia-Pacific (APAC) and finds 77 percent agree that data is a critical corporate asset for driving the business forward.

Continue reading

AI powered automation platform streamlines IT support tasks

robot call center

Artificial intelligence is making its presence felt in many areas, not least maintaining and controlling IT infrastructure.

Intelligent automation company Ayehu is releasing its next generation (NG) IT Automation and Orchestration Platform aiming to offer more control and flexibility, ultimately driving increased productivity.

Continue reading

New platform aims to cut shadow IT use and cloud waste

Shadow IT

Shadow IT is a problem for enterprises as it leaves them open to attack but also to waste from idle cloud resources.

Aiming to cut both shadow IT and unguarded cloud sprawl, CloudBolt is launching a new platform for the provisioning and management of computing and Kubernetes resources.

Continue reading

New privileged access solution improves security and control

Admin login

Many data breaches involve some form of compromised credentials and the problem is made worse where accounts have privileged access.

ManageEngine, the enterprise IT division of Zoho, is launching a new product called PAM360, a complete solution to prevent the exploitation of accounts with privileged access.

Continue reading

IT executives struggle to manage spending effectively

Executive spend

Wasted technology spend accounts for 30 percent of all IT spending according to the latest State of Tech Spend report from Flexera.

The average IT spend is 8.2 percent of revenue, but larger businesses (with more than 10,000 employees) this rises to 9.3 percent of revenue. 56 percent of respondents expect to increase their spending

Continue reading

Symantec launches new endpoint security solution for businesses

Endpoint protection

Endpoints are generally the part of any network that is most vulnerable to attack, but as the number and diversity of devices expands, defending the endpoint effectively is a major challenge.

Symantec is aiming to make life easier with the launch of Endpoint Security Complete, offering organizations a single solution for protection, detection and response, as well as new attack surface reduction and breach assessment and prevention capabilities.

Continue reading

56 percent of IT security pros admit their infrastructure has gaps

Attack route

New research released by AttackIQ based on a study by the Ponemon Institute reveals some worrying trends on the level of accountability for IT security and a lack of confidence in determining the effectiveness of security technologies.

Ponemon surveyed over 570 IT and IT security practitioners in the US and finds 63 percent of survey respondents say their IT security leadership doesn't report to the board on a regular basis, and 40 percent say they don't report to the board at all.

Continue reading

Updated platform improves security at the edge

Edge security

As mobile and cloud computing use increases it creates security, performance, quality and cost issues for organizations.

Akamai is launching enhancements to its Intelligent Edge Platform which will enable businesses to address security, media delivery, and web performance challenges by utilizing distributed workloads and intelligence closest to the digital touchpoint where the user interacts with data and applications.

Continue reading

Load More Articles