Zero trust access, VPN, both? The changing face of remote network access [Q&A]


Virtual private network (VPN), software defined perimeter (SDP), zero trust network access (ZTNA), there are plenty of technologies around for protecting remote access to enterprise networks.
This is an area that's been thrown into sharper focus this year, but what's the best option for keeping remote access secure? We spoke to Scott Gordon, CISSP for Pulse Secure to discuss the value of the different options available.
Employees' home networks could lead to SMEs failing security assessments


With the pandemic forcing more people to work from home, businesses in the UK -- particularly smaller ones -- may not have considered the fact that their employees' home networks now fall under the scope of regulatory and certification requirements.
According to a report from support solutions company A&O IT Group, if an individual works from home more than half of their time, their network must be compliant with current regulations.
How the banking sector is adapting to security and regulatory requirements [Q&A]


Banks and other financial services institutions have been moving more and more towards digital in order to streamline processes and improve customer service.
The pandemic has accelerated this process but has also brought a rise in cyberattacks. Regulators have also begun to take more notice of security practices surrounding accounts. We spoke to Michael Magrath, director, global regulations and standards, at specialist in anti-fraud and digital identity solutions for financial institutions OneSpan, to discover more.
If you're still using Windows 7, you need to install this important, free 0-day patch


Windows 7 may be rather long in the tooth, but there are still millions of people using it globally. And just because the operating system has been around for years, that does not mean all of the bugs and security issues have been ironed out; far from it, in fact.
Earlier this month a security researcher discovered a local privilege escalation vulnerability in both Windows 7 and Windows Server 2008 R2. There's no indication that Microsoft will issue a patch even for organizations the paid for extended support, but the vast majority of Windows 7 users will be left vulnerable. Or at least that would be case if it wasn't for 0patch stepping up to the plate and making a micropatch available for free.
Pirated data risks: Remote teams need to become a first line of defense


The increasing number of news headlines that mention data piracy, theft and database hacking makes it clear that businesses need to treat data as a valuable asset. This is especially true of businesses with teams that work remotely, as these set-ups usually have fewer security protocols.
Most remote workers are working from their homes, and unless those team members are conscious of cybersecurity, they’re not likely to have intrusion detection systems and firewalls on their personal networks.
More than 5,000 Black Friday-related scam sites registered in November


While the holiday season is a peak time for retailers, it also represents an opportunity for cybercriminals. This is particularly true of 2020 when more people than ever are likely to be shopping online.
Research from Comparitech analyzed around 30 million websites registered this month to identify efforts by cybercriminals to trick consumers looking for holiday shopping deals.
Human-centered approach is key to better security


Individual behavior is an important factor in security, but according to the Information Security Forum there's a growing recognition that security awareness in isolation rarely leads to sustained behavior change.
The ISF argues that organizations need to proactively develop a robust human-centred security program to reduce the number of security incidents associated with poor security behavior and is releasing a new digest to help.
Privacy and security still major concerns for consumers


Although 59 percent of consumers have accessed more online services than usual this year, they still have worries about the security and privacy of their data.
A new report from identity verification and authentication provider Onfido shows the top concerns are that data will be passed on to third parties (53 percent), the security of the information (50 percent), and asking for too much information (37 percent).
Vectra improves cloud services to protect complex hybrid networks


With more people working remotely, plus high numbers of IoT devices accessing corporate and cloud networks, traditional network security solutions struggle to cope and are blind to activity and data in cloud applications.
Network threat detection and response company Vectra has launched a new range of cloud services with broader and deeper cloud capabilities to track and link accounts and data in hybrid environments.
Record web traffic and cyber threats set to disrupt holiday shopping


A new threat intelligence report from Imperva Research Labs looks at the varying cybersecurity attack risks facing the retail industry.
The findings suggest peak levels of traffic will be seen throughout the holiday shopping season as large numbers of consumers turn to online channels to purchase goods. Shortly after stay-at-home orders were issued, web traffic to retail sites spiked by as much as 28 percent over the weekly average.
Is it time to rethink legacy firewalls? [Q&A]


A new report from Guardicore and the Ponemon Institute reveals that more than 60 percent of organizations believe that legacy firewalls are ineffective in preventing damaging cyberattacks against applications, data centers, and data in the cloud.
We spoke to Dave Burton, VP marketing at Guardicore to find out more.
UK security pros worry about breaking the law when defending against attacks


A new report released today by the CyberUp Campaign and techUK has found that 80 percent of UK security professionals worry about breaking the law in the process of defending against cyberattacks.
The Computer Misuse Act (1990) is the law that governs the activities of cyber security professionals in the UK and the survey finds a near-unanimous (93 percent) belief that the Act -- written before the advent of modern cyber security -- does not represent a piece of legislation fit for this century.
Less than a third of organizations use cloud data leakage protection


Only 31 percent of organizations use cloud DLP, despite 66 percent citing data leakage as their top cloud security concern, according to a new report from Bitglass.
In addition organizations say they are unable to maintain visibility into file downloads (45 percent), file uploads (50 percent), DLP policy violations (50 percent), and external sharing (55 percent) in the cloud.
Palo Alto Networks launches 5G-native security


The roll out of 5G will open up fast connections to millions of devices, bringing with it opportunities to transform industries and allowing for massive adoption of the IoT. But with this connectivity also comes extra risk.
To address this Palo Alto Networks is launching the industry's first 5G-native security offering combining mobile expertise with its experience in securing highly-distributed cloud architectures and software-defined networks.
Failure to keep up with complexity leaves businesses at ransomware risk


Increasingly businesses have data stored in hybrid- and multi-cloud environments, but a new report shows that this extra complexity could also be putting data at risk.
The report out today from Veritas Technologies found that only 36 percent of respondents say their security has kept pace with their IT complexity, underscoring the need for greater use of data protection solutions that can protect against ransomware across increasingly varied environments.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.