Confident businessman

Security teams overconfident about detecting cyberthreats

A new report shows that 82 percent of security operations centers are confident in their ability to detect cyberthreats.

This is despite just 22 percent of front line workers tracking mean time to detection (MTTD), which helps determine hacker dwell time, and 40 percent of organizations still struggling with SOC staff shortages and finding qualified people.

By Ian Barker -
Deception

New identity tool helps combat digital fraud

Spotting potentially fraudulent customers and transactions is difficult. But a new tool from identity verification firm Ekata uses machine learning to help identify good and bad customers.

Network Score uses the Ekata Identity Network, a proprietary global dataset of billions of customer transactions, to reduce the number of false transaction declines and increase the precision of fraud detection.

By Ian Barker -
Hacker typing username and password

Over reliance on passwords compromises security

Four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused credentials.

A new report on access management from Thales also reveals that a majority of respondents say their organization plans to expand the use of usernames and passwords, even though the limitations could pose security challenges.

By Ian Barker -
Essential_Spotlight_ Lifestyle_Quick_Install_A_(Main Install Image)

Arlo Essential Spotlight Camera is affordable and chock-full of cool features

If you are a homeowner in 2020, you should have an outdoor smart security camera -- it simply isn't up for debate. Not only are they more affordable than ever, but they are very simple to set up. Many models don't even requires cables or a hub, allowing you to mount it anywhere within your Wi-Fi's range. You can then monitor the outside of your home to detect potential burglars or just keep an eye on your children playing in the yard. There really is no excuse to not have one.

Today, Arlo unveils its latest outdoor smart security camera and it is shockingly affordable. Called "Essential," the 1080p camera is powered by a rechargeable battery and doesn't require a hub, so you can place it anywhere without having to deal with running cables for power. It even has color night-vision and two-way audio. Not to mention, it is sleek and attractive, so it won't look ugly hanging off the side of your house.

By Brian Fagioli -
Industrial IoT

Protecting IoT and OT with zero trust and network segmentation [Q&A]

In recent years we've seen a surge in the numbers of IoT and operational technology devices appearing on networks.

But while this technology offers many advantages it also brings new risks, both for the devices themselves and the networks they're attached to. What can businesses do to benefit from the technology but still keep their networks safe?

By Ian Barker -
mobile banking

Security industry responds to FBI warning of increased mobile banking risks

Earlier this week the FBI issued an alert about the risk of mobile banking platforms being targeted by cybercriminals during the current pandemic lockdown.

More than 75 percent of Americans used mobile banking in some form in 2019, but since the start of this year, a 50-percent spike in the usage of banking apps has been observed. Security professionals have been responding to the news.

By Ian Barker -
Employee leaving

New platform helps prevent data loss when employees leave

Around a third of employees take data with them when they leave a business according to email security firm Tessian.

In order to help companies understand and tackle the risks it's launching a new Human Layer Security (HLS) Intelligence platform to provide businesses with deeper insights into human layer security threats and the tools required to trend down the risk of accidental data loss, data exfiltration and advanced impersonation phishing attacks.

By Ian Barker -
Firewall

How hackers are targeting enterprises from the outside

In the past businesses have needed to worry about protecting their networks. But the expansion of internet use, cloud and as-a-service products means there are now more potential threats to worry about.

A new study from attack surface management specialist RiskIQ looks at the digital presence of organizations, where they lack visibility, and the pathways hackers are using to exploit these blind spots.

By Ian Barker -
Business security

UK government invests in security by design

The UK government is announcing that it will provide £10 million ($12.5 million) over four years to develop groundbreaking cyber security technologies.

Nine grant winners have been revealed as the recipients in the government's Digital Security by Design program, which aims to help the tech infrastructure of UK organizations and digital devices be more resilient to cyber attacks.

By Ian Barker -
ballot box

70 percent of security professionals say election infrastructure is at risk

A new survey of security professionals shows that 70 percent of respondents believe their governments can't adequately defend election infrastructure against domestic and international cyber attacks.

In addition the study, from machine identity protection company Venafi, finds that 75 percent believe the spread of disinformation is the greatest threat to election integrity.

By Ian Barker -
5g smartphone

Protocol flaws leave 5G and other mobile networks open to vulnerabilities

Vulnerabilities affecting mobile and 5G networks are putting industrial equipment, smart homes, and city infrastructure at risk according to a new report.

Produced by Positive Technologies, this is the fourth in a series of reports on the greatest threats and vulnerabilities in the mobile ecosystem. It highlights the cyber security risks to networks that originate with the GTP protocol -- which is used to transmit user data and control traffic on 2G, 3G, and 4G networks.

By Ian Barker -
Home network

Secure access solution delivers SD-WAN connectivity for remote workers

Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.

Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.

By Ian Barker -
DevSecOps

The impact of open source on security [Q&A]

Open source software is commonly used to save time as it means developers don't end up repeating the same things over and over.

One of the key things about open source is that the source code is open to examination by everyone, In security terms this means it’s open to both the attackers and defenders.

By Ian Barker -
Malicious email

60 percent of organizations expect to suffer attacks by email

Email is still a favorite attack route for cyber criminals a new study reveals, 77 percent of respondents say they have or are actively rolling out a cyber resilience strategy, yet an astounding 60 percent of respondents believe it is inevitable or likely they will suffer from an email-borne attack in the coming year.

Respondents to the Mimecast survey of more than 1,000 IT decision makers cite other worries as data loss (31 percent), a decrease in employee productivity (31 percent) and business downtime (29 percent) due to a lack of cyber resilience preparedness.

By Ian Barker -
web threats

Vectra integrates threat detection with Microsoft security

Network threat detection and response company Vectra AI is announcing deep product integration with Microsoft Defender Advanced Threat Protection (ATP) and Microsoft Azure Sentinel to allow enterprises to better protect their networks.

Vectra has also been invited to become a member of The Microsoft Intelligent Security Association, an ecosystem of independent software vendors purpose-built to defend against increasing cyber threats.

By Ian Barker -
Load More Articles