Articles about Security

How IoT devices are putting enterprises at risk

Wireless internet of things

While businesses generally take care to protect desktop and mobile computing devices, the rise in IoT usage has meant that lots of potentially less secure equipment is sneaking onto networks.

Forescout Research Labs has been assessing the risk of over eight million devices across a number of industries via its Forescout Device Cloud, a repository of connected enterprise device data.

Continue reading

New application security analyzer helps prevent breaches across cloud services

Software testing

Most businesses now use web and cloud applications to deliver richer web experiences and better outcomes for customers. But the current generation of web security tools are poorly suited to address the frameworks, APIs and cloud microservices that are the underpinnings of these modern apps.

Now though application security firm Data Theorem is launching Web Secure, a full-stack application security analyzer that provides vulnerability analysis for modern web applications from the web-layer down to its embedded APIs and cloud resources.

Continue reading

Two thirds of malware is invisible without HTTPS inspection

unknown threat

A new report from WatchGuard Technologies shows that 67 percent of all malware in the first quarter of this year was delivered via HTTPS, so organizations without security solutions capable of inspecting encrypted traffic will miss two-thirds of incoming threats.

In addition, 72 percent of encrypted malware was classified as zero day (meaning no antivirus signature exists for it, and it will evade signature-based protections). The findings suggest that HTTPS inspection and advanced behavior-based threat detection and response solutions are now requirements for every security-conscious organization.

Continue reading

Twitter warns users of 'data security incident' involving billing information

Twitter and white wood backrgound

Twitter has emailed an unknown number of users to warn them of a security incident that took place some time prior to May 20 this year.

The company says that personal and billing information of people who used the Ads or Analytics pages on the Twitter site may have been affected. Twitter says that the vulnerability has now been addressed, but has emailed users to explain the circumstances of the incident.

Continue reading

Illumio brings zero trust to the endpoint

endpoint protection

Endpoints are generally the weakest point of a corporate network and the problem is made more acute by the shift to remote working.

Illumio is launching a new endpoint protection solution that reduces the risk of ransomware and malware propagating laterally throughout an organization.

Continue reading

Developers need to think like hackers to prioritize fixes

As technology continues to evolve, software development teams are bombarded with security alerts at an increasing rate, making it almost impossible to address every potential vulnerability.

New research from WhiteSource, an open source security and license compliance management specialist, and CYR3CON, which predicts cybersecurity attacks based on AI-gathered intelligence looks at how development teams prioritize fixing vulnerabilities and compares this to discussions in hacker communities.

Continue reading

AI alone isn't enough to thwart cyberattacks

Artificial intelligence

Crowdsourced security platform Bugcrowd has released a new report which shows that 78 percent of hackers on its site say AI-powered cybersecurity solutions alone aren’t enough to outmaneuver cyber attacks over the next decade.

The 2020 Inside the Mind of a Hacker report also reveals that 87 percent say that scanners can’t find as many critical or unknown assets as humans.

Continue reading

US taxpayers think filing returns online is risky -- but they do it anyway

Online taxes

Thanks to the COVID-19 pandemic and extended tax filing deadline for 2020 its likely that people will be submitting their returns over a longer period this year.

New research from information security company Shred-it shows that most Americans file their tax returns online, even though many believe this puts them at greater risk of fraud.

Continue reading

The hidden value of historic communications in email security

Email attack

Very rarely in life is certainty guaranteed. Almost every decision we make is made imperfectly, without complete knowledge and based on a gut-checked risk assessment. When it comes to protecting your organization from phishing attacks, this still rings true. Yet, most email security providers still see through a black-and-white lens and act in terms of absolute certainty. As a result, they effectively protect against the known bad, but let unfamiliar threats slip right through.

Employees at every level of your company are making hundreds of email decisions every day -- open this, delete that, respond to this, leave that for tomorrow. With so much inbox noise, a potential phishing email can infiltrate easily -- and can impact an entire organization profoundly.

Continue reading

Australian government targeted by 'state-sponsored' cyber attacks

Australia map

Australia's Prime Minister, Scott Morrison says the country's government and institutions are being targeted by sophisticated cyber attacks.

The attacks are said to be against all levels of governments as well as services and businesses. Although identified as a state-based attack there is no official comment on who might be behind it. Morrison says it's believed to be a state attack, "...because of the scale and nature of the targeting and the trade craft used."

Continue reading

Small and medium enterprises more likely to adopt cyber insurance

insurance key

Smaller and medium sized companies are more likely to spend on cyber insurance than their larger competitors according to a new report.

The study from US cyber insurance specialist Cowbell Cyber finds 65 percent of SMEs are planning to spend more on cyber insurance as part of their resilience plan in the next two years, compared to 58 percent of large companies.

Continue reading

AttackIQ offers free cybersecurity training to boost 'threat-informed defense'

training key

Breach and attack simulation solutions company AttackIQ is offering advanced cybersecurity training with a modularized curriculum and cyber range labs to security practitioners, free of charge.

Learners at the AttackIQ Academy get realistic, hands-on experience via cyber range labs and exercises that are based on scalable, cloud-hosted infrastructure. All Academy participants are eligible for (ISC)2 Continuing Professional Education (CPE) credits.

Continue reading

Open services leave business networks exposed

network connections

As cloud environments become more and more common the extra risks are mostly well understood but a new blog from Orca Security shows that businesses could be leaving their networks open via common configuration errors.

The use of external CI/CD (continuous integration/continuous delivery) services means access control lists (ACLs) are often changed but this can inadvertently leave internal services open to the world argues Avi Shua, CEO and co-founder of Orca Security.

Continue reading

Business email compromise attacks spike in March

Email fraud

In yet another sign that cybercriminals are keen to exploit the current world situation, in the second and third weeks of March business email compromise (BEC) attacks increased more than 430 percent according to email security specialist Abnormal Security.

In the early part of the year attacks on C-Suite executives decreased by 37 percent from Q4 2019 to Q1 2020, while the focus shifted to finance employees, attacks targeting them increasing 87 percent in Q1 2020 against Q4 2019.

Continue reading

Speedify delivers more reliable VPN connection for remote workers

Speedify 10

The increase in remote and home working in recent months has shone a spotlight on the unreliability of many domestic internet connections.

The Speedify VPN service is updating its offering which allows users to link and seamlessly switch between multiple connections including home internet, mobile data and public Wi-Fi networks to provide a more reliable connection.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.