Articles about Security

Proton Pass is now an independently security audited, open source password manager

Proton Pass password manager

Privacy-centric firm Proton has announced that its password manager, Proton Pass, is now more than just open source. The company has had the code of its apps, browser extensions and APIs subjected to an independent security audit by German security specialists Cure53.

With passwords providing access to some of the most value and sensitive personal information imaginable, reliable security is essential. The auditors' assessment that Proton has a "commitment to maintaining a high-level of security" and that "the state of security across Proton's applications and platforms is commendable" will serve as helpful recommendations for anyone looking for a safe and secure password manager.

Continue reading

Enhancing workplace security: A comprehensive approach to Mac and mobile device compliance

business security

Workplace modernization has emerged as an important trend impacting organizations of all sizes, in all industries, and across all geographies. The move by so many businesses to embrace modern end-user technologies is anticipated to help improve recruitment, enhance employee productivity, and may have a measurable impact on talent retention.

One of the main forces behind workplace modernization is a belief that employees will be happier and ultimately more productive if they’re able to choose the devices they use for work. Coupled with both technical and organizational support for anywhere work styles, employees are finding they have a much stronger voice in the selection of IT tooling and the accompanying workflows.

Continue reading

How investment in network security is maturing for global Communication Service Providers

Priorities have changed since 2021 when A10 Networks first surveyed communication service providers (CSPs) to better understand their priorities and requirements coming out of the pandemic. In 2023, the world is now a very altered place, and while the pandemic is largely over, this challenge has been superseded by geopolitical and economic uncertainty on an equally global scale.  

Undoubtedly, connectivity played a vital role in keeping the wheels of society and business turning during the pandemic - what would we have done without our video calls and the internet? But it is equally, if not more, essential in today’s uncertain world that CSPs continue to play an important role in keeping society connected. 

Continue reading

Securing the oil and gas industry

The oil and gas sector remains a crucial pillar of the global economy, an industry that supports not only millions of jobs worldwide but also underpins essential energy provisions for homes, businesses, and transportation networks.

Yet, as digital technology continues to pervade this sector, oil and gas companies are increasingly being exposed to critical cyber threats. The industry's increasing dependence on digital systems has escalated the importance of robust cybersecurity strategies, presenting an array of unprecedented challenges.

Continue reading

What a steal! How retailers can protect customer data from cybercriminals

Recent Salesforce research shows 52 percent of consumers expect their offers to be personalized. To create these tailored offerings and drive a seamless customer experience, retailers gather vast amounts of personally identifiable information (PII) -- from addresses to purchasing history and payment information. This makes them an irresistible -- and relatively low risk -- target for cybercriminals. As a result, data breaches within retail are increasingly common, even for major retailers -- as we saw earlier this year with the JD Sports Data Breach, which exposed the PII of around 10 million people.

To help protect consumers, governing bodies are putting increased pressure on companies to comply with data protection rules -- including the UK’s upcoming Data Protection and Digital Information Bill. Consumer trust is key when it comes to retail too. So, companies unable to protect their customer data not only risk enormous fines, but significant damage to their brand reputation. So, following recent high-profile retail breaches, how can brands protect their customers’ personal data? 

Continue reading

AI: Good or bad for the cyber threat landscape?

Artificial Intelligence Bias

In recent months, the buzz surrounding AI technology has grown rapidly, due in large part to the release -- and subsequent zeitgeist moment -- of ChatGPT. A chatbot fueled by language modeling AI technology that is free to the public, ChatGPT has been the subject of seemingly endless discourse regarding its implications since its launch last November.

This type of AI technology is convincing and well… intelligent. It’s almost like a contemporary iteration on the concept of a search engine -- you can type in a prompt, and within moments you’ll receive a well-articulated, seemingly accurate response pulling from sources all over the web.

Continue reading

Only two percent of organizations feel confident in their cybersecurity strategies

While 75 percent of organizations have made significant strides to upgrade their infrastructure in the past year and 78 percent have increased their security budgets, only two percent of industry experts are confident in their security strategies, according to a new report.

The study, from critical infrastructure protection specialist OPSWAT, also finds most organizations have embraced public cloud hosting for their web applications, with an overwhelming 97 percent already employing or planning to implement containerization.

Continue reading

Hacking hybrid: Closing security gaps in a distributed workforce 

Hacker

When, where, and how we work has evolved. And in the past few years, the rise of flexible working patterns has helped improve employee wellbeing and created new opportunities to innovate. According to the Office of National Statistics, 44 percent of people in the UK work in a hybrid model -- making it almost as common as commuting to the office.

At the same time, these new freedoms have ushered in new priorities for security teams. Securing the enterprise is now more complex because the perimeter has become blurred. To address this, focus must be put on securing endpoints, such as PCs and printers -- the "ground zero" for most attacks. New cybersecurity strategies are needed to prevent, detect, and contain cyber-threats, but also enhance remote PC management to mitigate the risks associated with lost or stolen devices.

Continue reading

Brave Browser is ending behind-the-back port scanning attacks

Brave browser

The next major version of Brave Browser, a Chromium-based browser with a focus on privacy, will prevent sites and apps from accessing local resources without user permission.

Most modern browsers allow access to local resources. In fact, many do not differentiate between local and remote resources, and do not include options to block access to local resources.

Continue reading

Blockchain and proptech are transforming real estate security

Blockchain-house

Infrastructure is becoming more vulnerable to cyber threats. Therefore, everyone from tech enthusiasts to real estate professionals must pay attention to how blockchain and proptech advancements change the game to keep stakeholders, business owners and tenants safe and sound.

Blockchain is a part of the proptech umbrella, but it encompasses so much -- and blockchain enhances it all.

Continue reading

Next gen SIEM: Unleashing the power of AI in cybersecurity

AI has been in the news over the past several months, but not everyone is welcoming it excitedly. Many renowned tech personalities have expressed their concerns over the risks associated with it and there are valid fears about artificial intelligence doing more harm than good. For example, there have been reports of AI helping cybercriminals produce less detectable malware.

It is reassuring to know that cybersecurity is among the early adopters in harnessing the benefits of artificial intelligence. Cybersecurity firms have been developing ways to integrate AI into their detection, mitigation, and prevention capabilities. Next gen security information and event management (SIEM), in particular, is gaining traction as organizations try to keep up with the growing aggressiveness and complexity of cyber threats.

Continue reading

Microsoft Edge now blocks spam notifications on the sites you visit

Blurry Microsoft Edge logo with mobile in foreground

Notifications can be useful, but all too often they are used by websites to spam people. To help protect users against such irritations, Microsoft has announced new notification blocking for its Edge browser.

The company says it is aware that website notifications may not only be annoying, but can be misleading or even dangerous. The aim in block spammy notifications is to not only offer protection to users of Microsoft Edge, but also to help them to get the most out of notifications.

Continue reading

Three of the world's most expensive phishing attacks... and how they could have been prevented

Phishing

A number of high-profile cyber-attacks in recent years have thrust cybersecurity back into the spotlight. In light of the HAFNIUM hack, cybersecurity has become a major focus for many businesses. Although the hack itself was not the result of human error, it was a wake-up call for organizations to make sure they were fully protected.

The UK's Department for DCMS’ Cyber Security Breaches Survey 2021 revealed that phishing is still the most common cause of cybersecurity breaches, accounting for 83 percent of all successful attacks.

Continue reading

TP-Link launches a trio of Matter-certified Tapo smart switches

Tapo, a TP-Link brand, launches three new Matter-certified devices today. The Tapo Mini Smart Wi-Fi Plug, Tapo Smart Wi-Fi Light Switch, and Tapo Smart Wi-Fi Dimmer Light Switch offer compatibility with all-certified smart home platforms, convenient LAN control, and multi-admin capability.

Matter brings a new level of convenience with smooth LAN control, enabling seamless communication between Matter-certified devices within a local area network, even if the home internet is offline. This direct device-to-device communication eliminates the reliance on specific forwarding devices or cloud services, ensuring a robust and reliable smart home ecosystem.

Continue reading

Wary of a recession? Increase your investment in cybersecurity technologies

Leading organizations in all industries have accelerated their digital transformation and change management over the past three years, and for a good reason. According to Deloitte, meaningful digital transformation initiatives can unlock up to $1.25 trillion in market capital across Fortune 500 companies, with similarly positive results demonstrated for mid-range and small enterprises.

The key word here is "meaningful." But what constitutes beneficial change management processes versus directionless spending?

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.