A new report shows that 82 percent of security operations centers are confident in their ability to detect cyberthreats.
This is despite just 22 percent of front line workers tracking mean time to detection (MTTD), which helps determine hacker dwell time, and 40 percent of organizations still struggling with SOC staff shortages and finding qualified people.
Spotting potentially fraudulent customers and transactions is difficult. But a new tool from identity verification firm Ekata uses machine learning to help identify good and bad customers.
Network Score uses the Ekata Identity Network, a proprietary global dataset of billions of customer transactions, to reduce the number of false transaction declines and increase the precision of fraud detection.
Four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused credentials.
A new report on access management from Thales also reveals that a majority of respondents say their organization plans to expand the use of usernames and passwords, even though the limitations could pose security challenges.
If you are a homeowner in 2020, you should have an outdoor smart security camera -- it simply isn't up for debate. Not only are they more affordable than ever, but they are very simple to set up. Many models don't even requires cables or a hub, allowing you to mount it anywhere within your Wi-Fi's range. You can then monitor the outside of your home to detect potential burglars or just keep an eye on your children playing in the yard. There really is no excuse to not have one.
Today, Arlo unveils its latest outdoor smart security camera and it is shockingly affordable. Called "Essential," the 1080p camera is powered by a rechargeable battery and doesn't require a hub, so you can place it anywhere without having to deal with running cables for power. It even has color night-vision and two-way audio. Not to mention, it is sleek and attractive, so it won't look ugly hanging off the side of your house.
In recent years we've seen a surge in the numbers of IoT and operational technology devices appearing on networks.
But while this technology offers many advantages it also brings new risks, both for the devices themselves and the networks they're attached to. What can businesses do to benefit from the technology but still keep their networks safe?
Earlier this week the FBI issued an alert about the risk of mobile banking platforms being targeted by cybercriminals during the current pandemic lockdown.
More than 75 percent of Americans used mobile banking in some form in 2019, but since the start of this year, a 50-percent spike in the usage of banking apps has been observed. Security professionals have been responding to the news.
Around a third of employees take data with them when they leave a business according to email security firm Tessian.
In order to help companies understand and tackle the risks it's launching a new Human Layer Security (HLS) Intelligence platform to provide businesses with deeper insights into human layer security threats and the tools required to trend down the risk of accidental data loss, data exfiltration and advanced impersonation phishing attacks.
In the past businesses have needed to worry about protecting their networks. But the expansion of internet use, cloud and as-a-service products means there are now more potential threats to worry about.
A new study from attack surface management specialist RiskIQ looks at the digital presence of organizations, where they lack visibility, and the pathways hackers are using to exploit these blind spots.
The UK government is announcing that it will provide £10 million ($12.5 million) over four years to develop groundbreaking cyber security technologies.
Nine grant winners have been revealed as the recipients in the government's Digital Security by Design program, which aims to help the tech infrastructure of UK organizations and digital devices be more resilient to cyber attacks.
A new survey of security professionals shows that 70 percent of respondents believe their governments can't adequately defend election infrastructure against domestic and international cyber attacks.
In addition the study, from machine identity protection company Venafi, finds that 75 percent believe the spread of disinformation is the greatest threat to election integrity.
Vulnerabilities affecting mobile and 5G networks are putting industrial equipment, smart homes, and city infrastructure at risk according to a new report.
Produced by Positive Technologies, this is the fourth in a series of reports on the greatest threats and vulnerabilities in the mobile ecosystem. It highlights the cyber security risks to networks that originate with the GTP protocol -- which is used to transmit user data and control traffic on 2G, 3G, and 4G networks.
Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.
Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.
Open source software is commonly used to save time as it means developers don't end up repeating the same things over and over.
One of the key things about open source is that the source code is open to examination by everyone, In security terms this means it’s open to both the attackers and defenders.
Email is still a favorite attack route for cyber criminals a new study reveals, 77 percent of respondents say they have or are actively rolling out a cyber resilience strategy, yet an astounding 60 percent of respondents believe it is inevitable or likely they will suffer from an email-borne attack in the coming year.
Respondents to the Mimecast survey of more than 1,000 IT decision makers cite other worries as data loss (31 percent), a decrease in employee productivity (31 percent) and business downtime (29 percent) due to a lack of cyber resilience preparedness.
Network threat detection and response company Vectra AI is announcing deep product integration with Microsoft Defender Advanced Threat Protection (ATP) and Microsoft Azure Sentinel to allow enterprises to better protect their networks.
Vectra has also been invited to become a member of The Microsoft Intelligent Security Association, an ecosystem of independent software vendors purpose-built to defend against increasing cyber threats.