Articles about Security

Almost 80 percent of companies have had a cloud data breach in the past 18 months

Cloud fail

A new survey finds that 79 percent of companies experienced at least one cloud data breach in the past 18 months, and close to half (43 percent) reported 10 or more breaches.

The study for cloud access risk security company Ermetic conducted by IDC  covered 300 CISOs and finds that security misconfiguration (67 percent), lack of adequate visibility into access settings and activities (64 percent) and identity and access management (IAM) permission errors (61 percent) are the top concerns associated with cloud production environments.

Continue reading

Thycotic extends its privileged access management range

Access management

Privileged access management (PAM) specialist Thycotic is expanding its portfolio with the announcement of three new products.

It's launching Thycotic Remote Access Controller, Thycotic Cloud Access Controller and Thycotic Database Access Controller, following its acquisition of cloud security company Onion ID.

Continue reading

Enterprise mobile phishing up 37 percent in Q1 2020

mobile phishing

According to the latest study from mobile security company Lookout, the first quarter of this year saw the enterprise mobile phishing encounter rate increase by 37.1 percent globally .

This includes regional increases of 66.3 percent in North America, 25.5 percent in EMEA and 27.7 percent in the Asia Pacific region.

Continue reading

How technology can help protect against identity fraud [Q&A]

unknown identity

The COVID-19 pandemic has led to a tide of cybercriminal activity seeking to exploit things like government payments.

We spoke to Michael Magrath, director, global regulations and standards at anti-fraud and digital identity solutions company OneSpan to find out how governments and enterprises can use technology to guard against the threat.

Continue reading

The secret life of discontinued apps

Smartphone apps

When a book goes out of print the publishers don't pop round and remove old copies from your shelves. Similarly, when an app is discontinued it can be taken off the app stores but continues to linger on users' devices.

Mobile security company Wandera has been taking a look at what happens to these with an analysis of six-months' worth of apps that were removed from the app stores, along with apps that were installed on customer devices prior to the six-month period and, subsequently, removed.

Continue reading

UK government launches fund to boost smart device security

Internet of things

It's estimated that there could be as many as 75 billion connected devices worldwide by 2025, but the increased popularity of 'smart' equipment comes with risk as many products currently on sale lack basic cybersecurity.

In response to this threat the UK's Department for Digital, Culture, Media and Sport is launching a £400,000 ($490,000) fund for innovators to design schemes to boost the security of internet-connected products.

Continue reading

Securing the remote workforce during COVID-19 and beyond [Q&A]

keyboard padlock

The COVID-19 global pandemic has created a cybercrime playground. From phishing scams to ransomware to social media attacks, COVID-19-focused malware campaigns are on the rise. In fact, according to research from Zscaler, there's been a 30,000 percent increase in coronavirus-related attacks.

We talked with Mike Kelley, CSO at Navisite, to discuss why the current crisis is causing such a dramatic spike in cybersecurity activity, as well as ways organizations can secure their remote workforce and protect their organization from cyberthreats both now and after the COVID-19 pandemic comes to an end.

Continue reading

Massive amounts of corporate data now stored on employee USB devices

flash drive and laptop

There has been a 123 percent increase in the volume of data downloaded to USB devices by employees since working from home has become widespread due to coronavirus.

What's more, according to a report from SaaS data protection company Digital Guardian, 74 percent of that data is subject to organisation data governance policies.

Continue reading

Updated platform offers zero-trust management of multi-clouds

Cloud

Multi-cloud environments tend to be harder to secure because teams and applications are much more distributed resulting in a larger attack surface.

A zero-trust approach deals with these threats but can introduce overheads that make it hard to manage. Morpheus Data is integrating VMware NSX-T and Unisys Stealth technology into its cloud automation framework to enable microsegmentation and dramatically simplify the implementation of zero-trust processes.

Continue reading

You need to take action if you want to avoid being cut off from Zoom

Angled Zoom logo

Zoom has been one of the most used, yet most lambasted, contestants in the video conferencing arena during coronavirus-driven lockdown times, and much of the focus has been on privacy and security issues.

Having acknowledged that it had work to do, the company promised to take steps to improve its service and has issued numerous updates to its app in recent months. The release of Zoom 5.0 in April was a major step, and you only have days to upgrade or risk being cut off from the service completely.

Continue reading

Turn off the security please, I'm the boss

employee snoop

The C-suite is the most likely group within an organization to ask for relaxed mobile security protocols (74 percent) -- despite also being highly targeted by cyberattacks according to a new study.

The report from zero-trust platform MobileIron finds that executives feel frustrated by mobile security protocols and often request to bypass them.

Continue reading

Safe working practices suffer when working remotely

using laptop with sharks

Almost half of employees are less likely to follow safe data practices when working from home according to a new report from email security firm Tessian.

While 91 percent of IT leaders trust their staff to follow best security practices when working remotely, over half of employees (52 percent) believe they can get away with riskier behavior when working from home.

Continue reading

How to ensure communication security when working from home

With millions working from home for the first time thanks to coronavirus, many businesses have had to act quickly in order to facilitate remote communication which may never have been an option before the virus struck. Though these businesses may have already made the switch to internet-hosted calls and communications at work, providing access to all employees from home will not have been common. One of the most common concerns of using internet communication software is its security capacity, so how secure is it? And how can business leaders ensure the highest levels of safety for a remote workforce?

From news stories of vulnerable video conferencing software to threats from less secure home networks, navigating the security issues of a remote workforce may be a trial by fire for businesses attempting to maintain levels of normality during this time. Therefore, it will be important to understand both the benefits and drawbacks of internet communications to know what to look out for and how to inform staff of the best practice.

Continue reading

Organizations want to continue remote work but aren't equipped for secure access

working from home

The current crisis has led to a big increase in numbers of people working remotely. Many businesses seem set to continue that when normality returns, but a new report suggests they're not equipped to do so securely.

The study from cloud security company Bitglass shows that 41 percent have not taken any steps to expand secure access for the remote workforce, and 50 percent are citing proper equipment as the biggest impediment to doing so. Consequently, 65 percent of organizations now enable personal devices to access managed applications.

Continue reading

DNS traffic and DDoS events rise during pandemic

hand on world map

New research from DNS intelligence specialist Farsight Security, focusing on over 300 leading websites, finds that between March and April there has been an increase in DDoS events involving popular brand names.

It also reveals that DNS cache misses (which occur when the data fetched is not present in the cache) showed an increase of between four and seven times.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.