Articles about Security

Linux Foundation launches Open Voice Network

Speech recognition

Many organizations are now relying on voice assistant systems to handle enquiries, but just as with other forms of information it's important to protect the consumer and the proprietary data that flows through voice.

The Linux Foundation is launching an Open Voice Network, an open source association dedicated to advancing open standards that support the adoption of AI-enabled voice assistance systems.

Continue reading

Only seven percent of IT security leaders report direct to the CEO

Boardroom

New research from SOC specialist LogRhythm finds that just seven percent of security leaders are reporting to the CEO, and only 37 percent say they or someone in their security function reports to the board of directors.

In addition 53 percent of security leaders claim their senior leadership doesn't understand their role, and 51 percent believe they lack executive support.

Continue reading

Sophisticated new attacks target container supply chains and infrastructure

Insider threat

New research reveals a continued rise in cyberattacks targeting container infrastructure and supply chains, and shows that it can take less than an hour to exploit vulnerable container infrastructure.

The latest threat report from cloud-native security company Aqua Security offers a detailed analysis of how bad actors are getting better at hiding their increasingly sophisticated attacks.

Continue reading

Why IT needs smarter cloud security

Cloud data security

For IT and security professionals, the job of keeping the enterprise secure is becoming an ever more complex proposition. In addition to the fact that distributed working looks set to become a permanent feature, keeping up with a raft of emerging new technologies while dealing with the rising tide of cyber threats means there is a growing number of tasks to keep on top of.

With time and resources in short supply, gaining full visibility of data from across the entire security stack will be key to achieving better and more comprehensive threat detection. But maintaining robust policies and controls also depends on adopting technology that is able to adapt quickly and self-learn from user behaviors.

Continue reading

Why open banking apps must stay secure to earn consumer trust [Q&A]

online banking

Traditional banks are realizing that they must develop more user-friendly open banking apps if they're not to lose customers to fintech startups.

But it's critical that these apps gain the trust of consumers if open banking is to succeed. We spoke to Jasen Meece, CEO of Cloudentity to discuss how financial services companies can ensure their open banking apps and partners adhere to compliance standards and protect consumer’s personal data.

Continue reading

Five percent of VPN solutions remain unpatched and vulnerable

VPN tiles

In 2020 we saw a huge shift to remote working, with VPN often the technology of choice for keeping connections secure.

But a new Network Security Report from SpiderLabs at Trustwave reveals that this trend didn't go unnoticed by cybercriminals, with malicious actors targeting unpatched VPN vulnerabilities more frequently.

Continue reading

Could the 'Face of Anonymous' go to jail?

We’ve seen the now infamous Guy Fawkes masks around for a long time. More so a few years ago, than in current times. The main group they belong to, 'Anonymous', has a reputation as hackers but members aren’t the people shutting down gas lines or airlines -- they prefer to think of themselves as ethical. Hacktivists if you will. You may disagree, authorities certainly do, and many members have been arrested. 

A decade ago member Christopher Doyon was nabbed in San Francisco. He allegedly jumped bail and headed south of the border, where he has remained ever since. Producer Gary Lang traveled there and featured him in the Canadian documentary 'The Face of Anonymous' in 2020. 

Continue reading

Three-quarters of IT leaders think organizations are more vulnerable to mobile attacks

A survey of over 600 IT decision makers across the US, UK and Australia finds that 76 percent believe end users are more at risk from attacks on mobile devices than they were a year ago.

The study from Menlo Security also shows 53 percent admit that it's not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices. And, more than a third (38 percent) claim that it's impossible to keep up with the pace of these attacks.

Continue reading

New platform lets businesses assess their ransomware attack readiness

Automated security validation company Pentera has launched a new module for its platform that emulates the world's most destructive ransomware strains.

It shows CISOs exactly how attackers and ransomware threats will exploit their network and infrastructure, safely automating real adversary tactics and techniques inside the network.

Continue reading

Businesses are confused about SASE -- but want to adopt it anyway

SASE Secure Access Service Edge

The adoption of Secure Access Service Edge (SASE) has increased during the pandemic, with 34 percent of businesses claiming to have adopted SASE in the past year, and an additional 30 percent planning to do so in the next six to 12 months.

But despite this rapid uptake the majority (69 percent) of IT and security professionals surveyed by Versa Networks remain confused about what SASE actually is.

Continue reading

Businesses that pay ransoms are more likely to suffer second attacks

Ransomware sign

A new study shows that 80 percent of businesses that chose to pay a ransom demand have suffered a second ransomware attack, often at the hands of the same threat actor group.

The research from Cybereason also reveals that of those that opted to pay a ransom demand in order to regain access to their encrypted systems, 46 percent report that some or all of the data was corrupted during the recovery process.

Continue reading

Moving to the cloud? A look at enterprise security considerations

Cloud security

Of the technologies that saw a spike due to the pandemic, cloud-based services are experiencing a bump in enterprise sales. The enterprise previously had been trailing scrappy upstarts in terms of digital transformation, largely because of the complications associated with moving tens of thousands of endpoints into a new environment. With entire workforces shifting to work-from-home environments, though, movement to the cloud has become all but inevitable.

According to IDC, digital transformation in the enterprise has accelerated since the start of the pandemic as enterprises seek greater flexibility and cost efficiency. Yet, enterprise security teams are posing a slew of new questions to cloud vendors about the security of their offerings. Best case scenario, this adds time to an already lengthy buying cycle. Worst case, security practices and protocols can kill a contract.

Continue reading

AT&T and Palo Alto get edgy with a new managed solution

Network and security management is increasingly complex thanks to remote access and greater numbers of concurrent users.

With their new Secure Access Service Edge (SASE) offering, AT&T along with Palo Alto Networks delivers an integrated solution bringing together software-defined wide area networking (SD-WAN) technology, security capabilities and fiber-based network connectivity.

Continue reading

New deep code analysis platform helps developers eliminate bugs

Developer

As recent high-profile attacks have shown, bad actors are increasingly going after software supply chains to exploit vulnerabilities in commercial and open source code.

Developer tool specialist Sonatype is launching a new deep code analysis platform called Lift that installs easily on any source repository and provides developer-friendly feedback on a wide range of bug types.

Continue reading

Organizations increase focus on identity security

identity theft mask

The shift to remote working has led to an increase in the number of identities employed and an increased focus on identity security, but a decrease in confidence in the ability to secure employee identities.

A new study from The Identity Defined Security Alliance (IDSA) finds that four out of five participants believe that identity management used to just be about access, but it’s now mostly about security.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.