Businesses aren't doing enough to guard against the security risks presented by ex-employees, according to new research from identity management firm OneLogin.
The study finds that nearly half (48 percent) of respondents are aware of former employees who still have access to corporate applications, with 50 percent of IT decision-makers ex-employee's accounts remaining active once they have left the company for longer than a day.
Businesses are still failing to ensure they are protecting themselves effectively online, despite the growing number of damaging security threats, a new report from BT has claimed.
The UK phone giant has teamed up with KPMG for a new guide advising businesses as to how they can stay safe online when facing the number of complex challenges involved in running a business during this rapidly-changing time.
According to the United States Department of Homeland Security, border officials are permitted to search the devices of anyone entering the country with or without probable cause, though there is a limit to type of content they can view.
Senator Ron Wyden sent a letter to Homeland Security in February seeking clarification regarding why US Customs and Border Protection (CBP) has been conducting more searches than ever before.
With data breaches a problem that shows no signs of going away, businesses are increasingly seeking to protect their information with encryption.
But with large volumes of information this can be time consuming and costly. To address the problem, IBM is announcing a breakthrough encryption engine that, for the first time, makes it possible to encrypt all data associated with any application, cloud service or database all the time.
In an effort to bolster its offerings in the enterprise security space, Cisco has announced that it has acquired the company Observable Networks which provides real-time network behavior monitoring.
The terms of the deal have not yet been made public though Observable Networks value was estimated at around $16 million during its last round of funding in May of 2016.
Four out of 10 industrial control security practitioners don’t have proper visibility into their ICS networks. This is according to a new study by the SANS Institute.
Based on a poll of ICS practitioners and cybersecurity stakeholders across various verticals, including energy, manufacturing, oil and gas, the report says that 40 percent of defenders are actually working blind to detect a cyber attack.
Computer users in New Hampshire are three times more likely than those elsewhere in the US to get a malware infection on their computers according to a new report.
The study from Enigma Software Group (ESG), the company behind SpyHunter, analyzed over 1.5 million infections detected by SpyHunter across all 50 states in the first six months of this year.
There has long been a perception that Macs are somehow immune to cyber attacks, but as the security landscape has changed they've become an attractive target for hackers looking to gain access to corporate networks.
Kaspersky Lab is launching a new edition of its Kaspersky Endpoint Security Cloud to give corporate Macs cloud-based multilayered protection. Aimed at small and medium businesses and managed service providers, it also brings more automation and management capabilities.
In the United States, the average email address is associated with no fewer than 130 different accounts on the Internet. How many accounts do you use on a daily basis? Chances are there are accounts out there you haven’t seen or thought about in decades. Many people report having more password protected accounts than they can recall, and while you might not be using all of the accounts currently they may be giving hackers access to those accounts you do use regularly because of one common habit: password reuse.
Millennials, though they are digital natives and have grown up being told the proper password safety procedures, are shockingly the most likely group to reuse passwords. Instead of leading by example as the technologically advanced digital natives they are, millennials are making things less secure for everyone.
Bots are often the culprits behind web scraping, brute force attacks, online fraud, account hijacking, data theft, and more. Often these attacks are made through the API servers that power public-facing websites and mobile applications.
A new solution from bot detection specialist Distil Networks is aimed at protecting these servers by determining whether a human is using a verified browser or mobile device to gain access.
One in three security professionals lack effective intelligence to detect and action cyber threats, according to a new survey from threat intelligence platform Anomali.
In addition 24 percent believe they are at least one year behind the average threat actor, with half of this sample admitting they are trailing by two to five years.
In today’s fast-paced world, one might think consumers value speed more than anything. In case of online banking, however, this is not the case. Instead, consumers would rather have more security than speed.
This is according to a new report by MYPINPAD, the company that enables multi-factor authentication for touchscreen devices.
Businesses aren’t investing enough to protect their businesses from data breaches. What’s more, even the funds they are investing are going down the wrong path.
New research from digital security firm Gemalto found that, despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016, the vast majority of IT Professionals still believe perimeter security is effective at keeping unauthorized users out of their networks.
The Magecart attack which injects JavaScript into unpatched eCommerce sites in order to capture payment information first appeared in October last year.
Researchers at threat management specialist RiskIQ have been following a new strain of Magecart and found that it offers a rare insight into the operations of the actors behind digital threats.
There’s plenty of talk on how small and medium-sized businesses can and should protect themselves from cyber-attacks. However, when it comes to the aftermath of a cyber-attack, things are awkwardly quiet.
This is according to a new report by PolicyBee, which says cyber recovery is not really in the minds of SMB owners. This is despite a third of those surveyed saying that they think a cyber-attack is inevitable, with a further quarter believing it is "likely" to happen.