New solution cuts risk from unstructured data

steal-data-binary-hand

Businesses understand the need to look after sensitive data, but a problem often arises in knowing where that data is. Unstructured information held in folders and documents is just as valuable to hackers as database records and is harder to protect.

Identity management company SailPoint is launching its latest data governance solution, allowing enterprises to guard sensitive files wherever they reside.

Continue reading

Unified security management comes to the cloud

Business security

Implementing effective security can be time consuming, complex and costly, more so given the adoption of cloud-based systems.

Unified security management (USM) specialist AlienVault is aiming to simplify things with the release of USM Anywhere, an all-in-one Software-as-a-Service (SaaS) security monitoring platform.

Continue reading

'Streaming Prevention' technology takes a new approach to stopping cyber attacks

doorman bouncer

Traditional security techniques can be effective in fending off cyber threats, but a new generation of non-malware attacks try to gain control of computers without downloading malicious software. Instead, they use trusted, native operating system tools, such as PowerShell, and exploit running applications, like browsers.

Endpoint security specialist Carbon Black is launching a new tool which can combat both types of threat. Called Streaming Prevention it uses event stream processing to continuously update a risk profile based on a steady stream of activity.

Continue reading

The US cities with the highest malware infection rates

virus lab

Computers located in Tampa, Orlando, and St. Louis are more likely than those in other US cities to be infected with malware.

This is according to a new report from ESG, the company behind the SpyHunter anti-spyware program. It compiled its results from SpyHunter detection data across the 100 largest cities in the United States in 2016.

Continue reading

WhatsApp's security flaw has legal implications

WhatsApp

Earlier this month there was widespread reporting in both the tech and mainstream media of the discovery of a potential security vulnerability in Facebook's WhatsApp messaging service. Coverage of the likely flaw, which was reportedly discovered by researchers at Berkeley University in California, was a blow to Facebook given that WhatsApp places privacy and security at the heart of its service by providing end-to-end encryption of user's messages and photos, preventing third parties including its own staff from accessing them.

In a nutshell the potential security flaw would theoretically allow WhatsApp to intercept some users' messages, which would appear to them to be encrypted. This has resulted in considerable speculation that government agencies could exploit this vulnerability as a means of covert surveillance, by targeting specific individuals' messages or on a bulk extraction basis.

Continue reading

Threat hunting and why combating cyber attacks needs a human element [Q&A]

Threat

The threat landscape facing businesses is more complex than ever and it's rapidly changing. No surprise then that traditional approaches to security are struggling to cope.

This has led some security companies to turn to a more dynamic approach of seeking out threats rather than simply responding to attacks.

Continue reading

Most banks aren't confident they can detect a data breach

data breach

Consumers are quite confident banks and insurers can keep their data safe, but these organizations aren’t that sure. A new report by Capgemini has shown that financial institutions lack a significant amount of confidence when it comes to data protection.

Just one in five (21 percent) of financial service organizations admitted they’re "highly confident" they could detect a data breach. On the other hand, 83 percent of consumers trust banks and insurers with their data.

Continue reading

Enterprises fear brand damage more than data breaches

Mobile fear

The biggest fear for organizations is long-term damage to brand and reputation, yet despite this three quarters lack a comprehensive risk management strategy.

This is one of the findings of a survey for risk intelligence company RiskVision carried out by the Ponemon Institute, it reveals that 63 percent of organizations are worried about reputation and brand damage. This is followed by security breaches (51 percent), business disruption (51 percent) and intellectual property loss (37 percent).

Continue reading

Get Hacking For Dummies, 5th Edition ($20 Value) FREE for a limited time

hacking for dummies

Ethical hacking, also called penetration testing, entails thinking like the bad guys to find and plug any vulnerabilities in your system to keep it secure.

Hacking For Dummies explains how to protect your computers from malicious attacks. It usually retails for $20, but for a limited time you can download the fully updated 5th edition ebook version for free.

Continue reading

Exploit acquisition program aims to patch mobile vulnerabilities faster

Phone gears

Even after new mobile threats have been identified the number of devices in use means it can take time for patches to be rolled out to all users.

Mobile threat defense company Zimperium is hoping to tackle this problem with the launch of a $1.5 million bounty program to purchase N-day exploits which have been identified but are still usable on unpatched devices.

Continue reading

Survey reveals the true cost of data breaches

money dollars cash burden debt chain

More than a third of organizations that experienced a data breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent.

This is a key finding of the latest Cisco Annual Cybersecurity Report which also shows that after attacks, 90 percent of these organizations are improving threat defense technologies and processes.

Continue reading

2016's top malware threats show a shift in attack patterns

Attack route

The methodology of malware and cyber attacks has shown a significant shift in 2016, according to the State of Malware report from Malwarebytes.

Although ransomware is the favorite attack method used against business, ad fraud malware is growing fast and poses a substantial threat to both consumers and businesses.

Continue reading

New intelligence platform aims to cut credential-based risks

credential hacker

Many cyber attacks are made using stolen or abused credentials. One of the ways to combat this is to collect activity data and use it to spot anomalous behavior patterns.

Leader in this field Exabeam is launching its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size. It addresses the need to collect more data than ever before, to make better connections across that data to detect threats, and to augment human analysts during incident response.

Continue reading

Comodo extends endpoint protection to Mac and Linux

endpoint shield

Businesses are increasingly aware of the need to protect their endpoint systems. However, they tend to concentrate most of their efforts on Windows which can leave other platforms vulnerable.

Cyber security specialist and digital certificate provider Comodo is launching a new version of its Advanced Endpoint Protection (AEP) product that extends availability of its default-deny endpoint security to Mac and Linux platforms, in addition to Windows.

Continue reading

Tenable launches cloud-based vulnerability management

Cloud

Increased adoption of virtualization, the cloud, and the accelerating use of web applications and short-lived assets like containers has led to changes in how and when companies need to assess vulnerabilities.

Cyber security firm Tenable Network Security is launching a new cloud-based vulnerability management platform to enable enterprises to secure the full range of assets in modern elastic IT environments.

Continue reading

Load More Articles