Articles about Security

How hackers are targeting enterprises from the outside

Firewall

In the past businesses have needed to worry about protecting their networks. But the expansion of internet use, cloud and as-a-service products means there are now more potential threats to worry about.

A new study from attack surface management specialist RiskIQ looks at the digital presence of organizations, where they lack visibility, and the pathways hackers are using to exploit these blind spots.

Continue reading

UK government invests in security by design

Business security

The UK government is announcing that it will provide £10 million ($12.5 million) over four years to develop groundbreaking cyber security technologies.

Nine grant winners have been revealed as the recipients in the government's Digital Security by Design program, which aims to help the tech infrastructure of UK organizations and digital devices be more resilient to cyber attacks.

Continue reading

70 percent of security professionals say election infrastructure is at risk

ballot box

A new survey of security professionals shows that 70 percent of respondents believe their governments can't adequately defend election infrastructure against domestic and international cyber attacks.

In addition the study, from machine identity protection company Venafi, finds that 75 percent believe the spread of disinformation is the greatest threat to election integrity.

Continue reading

Protocol flaws leave 5G and other mobile networks open to vulnerabilities

5g smartphone

Vulnerabilities affecting mobile and 5G networks are putting industrial equipment, smart homes, and city infrastructure at risk according to a new report.

Produced by Positive Technologies, this is the fourth in a series of reports on the greatest threats and vulnerabilities in the mobile ecosystem. It highlights the cyber security risks to networks that originate with the GTP protocol -- which is used to transmit user data and control traffic on 2G, 3G, and 4G networks.

Continue reading

Secure access solution delivers SD-WAN connectivity for remote workers

Home network

Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.

Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.

Continue reading

The impact of open source on security [Q&A]

DevSecOps

Open source software is commonly used to save time as it means developers don't end up repeating the same things over and over.

One of the key things about open source is that the source code is open to examination by everyone, In security terms this means it’s open to both the attackers and defenders.

Continue reading

60 percent of organizations expect to suffer attacks by email

Malicious email

Email is still a favorite attack route for cyber criminals a new study reveals, 77 percent of respondents say they have or are actively rolling out a cyber resilience strategy, yet an astounding 60 percent of respondents believe it is inevitable or likely they will suffer from an email-borne attack in the coming year.

Respondents to the Mimecast survey of more than 1,000 IT decision makers cite other worries as data loss (31 percent), a decrease in employee productivity (31 percent) and business downtime (29 percent) due to a lack of cyber resilience preparedness.

Continue reading

Vectra integrates threat detection with Microsoft security

web threats

Network threat detection and response company Vectra AI is announcing deep product integration with Microsoft Defender Advanced Threat Protection (ATP) and Microsoft Azure Sentinel to allow enterprises to better protect their networks.

Vectra has also been invited to become a member of The Microsoft Intelligent Security Association, an ecosystem of independent software vendors purpose-built to defend against increasing cyber threats.

Continue reading

Security priorities change as businesses adapt to 'new normal'

home working

A new study from Check Point looks at how organizations have managed their cyber-security during the recent lockdowns and also their security priorities and concerns over the coming months as they move to the 'new normal.'

Over 86 percent of respondents say their biggest IT challenge during the pandemic was moving to mass remote working, and the biggest security concern (62 percent) was maintaining VPN capacity for staff.

Continue reading

Remote working and obsolete devices increase security risks

Network

The move to cloud applications is leading many businesses to slow down investment in their in-house networks. This combined with a surge in home working is putting a strain on network security and infrastructures.

A new study from technology services company NTT Ltd finds 45.6 percent of organizations' network assets in Europe are aging or obsolete, as a weighted average, representing a huge surge on 2017, when this figure was just 12 percent.

Continue reading

Kaspersky launches free online talks to spread cybersecurity knowledge

Webinar conference call

Kaspersky has announced that it's launching a series of online talks, created to present knowledge and the latest cybersecurity findings, freely accessible to anyone with an internet connection.

Titled 'GReAT Ideas. Powered by SAS' the events will be hosted by Kaspersky's Global Research and Analysis Team (GReAT), which works to uncover APTs, cyber-espionage campaigns, major malware, ransomware, and underground cybercriminal trends around the world.

Continue reading

Open source vulnerabilities doubled in 2019

Insider threat

Open source code allows developers to quickly integrate new capabilities into applications without having to reinvent the wheel, but it doesn't come without hazards.

A new report from RiskSense provides in-depth findings on vulnerabilities in leading open source software (OSS), including the most weaponized weaknesses, which software is most at risk, and the top types of attacks.

Continue reading

Apple has a new open source project to help improve password security

Apple logo and padlock

Apple has launched a new open source project designed to promote collaboration between the  developers of password management software to help improve security for users.

The Password Manager Resources project has been created to make it easier for the developers of password managers to work together to ensure interoperability with websites, and to create a better experience for users. The aim is to integrate the strong password generating capabilities of the iCloud Keychain platform into password management apps.

Continue reading

Zoom isn't giving non-paying users end-to-end encryption because they could be criminals

Angled Zoom logo

Zoom's meteoric rise in popularity due to COVID-19 forcing more people to work from home led to a great deal of interest in the video conferencing tool's security and privacy. The lack of end-to-end encryption was a major concern for many users, but following the recent acquisition of Keybase, Zoom CEO Eric S Yuan said it would "help us build end-to-end encryption that can reach current Zoom scalability".

Well, end-to-end encryption is here. But only if you're a paying Zoom customer. Anyone using a free account is being left out in the cold. Why? Because, Yuan explains, "we also want to work together with FBI, with local law enforcement in case some people use Zoom for a bad purpose". Yuan is apparently of the impression that paying customers could not possibly be potential criminals.

Continue reading

Are cyber attacks really as advanced as we think? [Q&A]

Cyber attack

When organizations suffer a cyberattack it's often described by them as 'advanced'. But just how good does an attack need to be to breach defenses?

We spoke to Matt Walmsley, head of EMEA marketing at threat detection and response platform Vectra to find out about the attack landscape, how most attacks aren't all that advanced at all, and how companies can better defend themselves.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.