One in four workers would steal information to get a job at a competitor

Data theft

Would you take information from your employer to help you get a job at a competitor? 24 percent would according to a new survey of almost 500 IT professionals carried out at Blackhat USA 2019.

The survey by behavior-based security specialist Gurucul finds that managed service providers (34 percent) and developers (30 percent) pose the leading sources of third party risk, and that if someone was to commit fraud it would most likely occur in the finance department (32 percent).

Continue reading

How cloud-based training can help address the cybersecurity skills gap [Q&A]

training key

It's widely acknowledged that there's a skills shortage in the cybersecurity field. Many businesses are looking to address this by training their own security talent, but this in itself can be a challenge.

We spoke to Zvi Guterman, founder and CEO of virtual IT labs company CloudShare to find out how the cloud can help address security training issues.

Continue reading

Interest in VMWare Cloud use on AWS grows

Cloud management

A new survey of over 1,100 IT professionals carried out by managed service provider Faction reveals growing usage of and interest in VMware Cloud on AWS.

According to the study 64 percent of respondents say they have workloads in Azure, 57 percent AWS, 25 percent VMware Cloud on AWS, and 26 percent Google. But 29 percent of respondents plan to increase workloads on VMware Cloud on AWS in the next 12 months, while 15 percent plan to start running workloads and 14 percent plan to increase the number of workloads.

Continue reading

Four great summer reads for technology executives

Hooked

As a co-founder of a digital health startup, my daily reading list typically consists of industry news. When I have some downtime, however, I tend to lean towards books that will help me grow as a leader or run our business better.

Below are four books for tech execs that are looking for advice, insight or inspiration this summer:

Continue reading

What makes enterprises more efficient at patching vulnerabilities?

Patch download

The companies most effectively managing security vulnerabilities are those using a patch tool, relying on risk-based prioritization tools, and having multiple, specialized remediation teams that focus on specific sectors of a technology stack.

A new report from cyber risk specialist Kenna Security, produced in conjunction with the Cyentia Institute, reveals that businesses with mature, well-funded vulnerability management programs are more likely to patch vulnerabilities faster.

Continue reading

IBM extends its commitment to open hardware

IBM logo

IBM has used the Linux Foundation Open Source Summit today to announce that it will contribute key technologies to the open community.

The company is opening up the POWER Instruction Set Architecture (ISA), the definitions developers use for ensuring that hardware and software work together on POWER.

Continue reading

Thycotic launches automated solution for managing service accounts

Background security

Service accounts are specialized non-human accounts used by applications or other services to access data and network resources to perform specific tasks.

Because they tend to be set and then forgotten they often slip under the radar of conventional account management processes. Privileged access management specialist Thycotic is launching a new Account Lifecycle Manager to automate the management of these accounts.

Continue reading

Why is everyone talking about IO filters?

Whisper

At this year’s VMworld, a relatively little-known feature of vSphere is getting a surprising amount of attention. The VMware vSphere APIs for IO Filtering (VAIO) aren’t as well-known as other storage features like Virtual Volumes or Virtual SAN, but they’re very important for VMware vSphere as a hybrid cloud platform, especially with respect to cloud-based services for disaster recovery (DR) and business continuity (BC).

The new attention to VAIO is due to a number of well-known data protection vendors announcing that their solutions will begin to use the API. This article doesn’t take a deep dive into the API itself (there’s an excellent technical introduction in this blog post). Rather, the point of this discussion is to explain why IO filters are increasingly important to enabling DR/BC services and why the vendors in this space are updating their products to use the IO filters API.

Continue reading

Deception technology speeds up detection of attacks

Deception man woman

Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network.

New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in use compared to an average of 78 to 100 days for those not using the technology.

Continue reading

Executives believe AI will help businesses cope with changing environments

Artificial intelligence

A new study by management consultancy AT Kearney reveals that confidence is growing among C-suite executives that technology will help businesses navigate a complex and rapidly changing environment.

In an age of increasing automation and artificial intelligence (AI), leaders recognize the differentiating role of non-technical and interpersonal skills such as creativity and leadership -- skills that are not only difficult to find but also expected to become even more important. 42 percent for example say that creativity and innovation skills are hard to find.

Continue reading

Moving beyond the spreadsheet for vendor risk management

Spreadsheet

In today’s business landscape, many enterprise companies look to third-party vendors to provide them with organizational value and competitive advantage. While outsourcing has always existed in some form, globalization and the internet have caused the use of third-party vendors to increase exponentially. Previously, companies relied on third parties for non-core functions. Today, more and more critical functions are outsourced to find cost savings and efficiencies.

Because third-party vendors are an extension of an organization, businesses are held accountable for things like safety, ethics, business practices, and more. With more at risk than ever before, organizations must ensure third-party partners behave appropriately.

Continue reading

Almost half of employees have access to more data than they need

Access management

A new study of over 700 full-time US employees reveals that that 48 percent of employees have access to more company data than they need to perform their jobs, while 12 percent of employees say they have access to all company data.

The survey by business app marketplace GetApp also asked employees what classifications of data protection are in place at their company. No more than a third of businesses were found to use any one individual data classification.

Continue reading

Ransomware turns its sights on large organizations

Ransomware sign

Detections of ransomware aimed at businesses rose by a massive 363 percent between the second quarter of 2018 and the same period this year. Meanwhile consumer ransomware is down 34 percent.

The latest quarterly threat report from Malwarebytes also sees a 235 percent overall increase in threats aimed at organizations from enterprises to small businesses, with ransomware as a major contributor.

Continue reading

Half of companies won't move mission critical workloads to the cloud

cloud stop sign

A new report from enterprise file sharing platform FileCloud looks at cloud and data security and finds that 50 percent of companies don’t plan on moving mission critical workloads to the public cloud.

The survey of 150 professionals from industries including health care, financial services and educational institutions finds that shifts in perceptions of data security are impacting movement to the cloud.

Continue reading

Enterprise security pros spend too long researching suspicious URLs

URL bar

Phishing threats tend to be fast moving, so the ability to block them quickly is essential for protection.

But a new survey finds that even large companies with multi-layer security controls and multiple threat feeds lack adequate safeguards to protect their employees from phishing attacks that employ links to malicious sites.

Continue reading

Load More Articles