Articles about Security

Why enterprises need to prepare for more insider threats [Q&A]

insider threat

Insider threats are a growing problem. In its 2021 predictions, Forrester believes that insider incidents will be the cause of 33 percent of data breaches in 2021, up from 25 percent in 2020.

But what does this mean in practical terms for businesses and how can they protect themselves? We spoke to Anurag Kahol, CTO of cloud security specialist Bitglass, to find out.

Continue reading

The most destructive cybersecurity threats in 2021

Tightrope sharks threat

With companies relying more on technology, such as web applications, third-party solutions, and cloud computing than ever before, corporate cybersecurity has had to become the backbone of modern businesses. In the presence of remote work environments where IoT security has never been more vulnerable, companies need to effectively and quickly adapt to the rapidly evolving methods and techniques that hackers are beginning to employ.

Business vulnerabilities like a weak human firewall could lead to an increased susceptibility to a variety of cybersecurity attacks, such as ransomware and DDOS attacks. But despite all of these challenges, comprehensive and reliable cybersecurity solutions are very much achievable when approached correctly. In order to protect yourself against contemporary security threats, however, one must first understand the threats and risks they are trying to prevent and mitigate.

Continue reading

Microservices, containers, and Kubernetes have created security blind spots

Blindfold businessman laptop

A new study released today from Dynatrace finds that CISOs are increasingly concerned that rising adoption of cloud-native architectures and DevSecOps practices may have broken traditional approaches to application security.

The research finds that 89 percent of CISOs believe microservices, containers, and Kubernetes have created application security blind spots. While 71 percent admit they are not fully confident code is free of vulnerabilities before going live in production.

Continue reading

Industrial sector attacks jump 91 percent

Cooling towers

A new report from cybersecurity specialist Positive Technologies reveals a reveals a 91 percent jump in attacks on industrial companies and a 54 percent rise in malware-related attacks last year compared to 2019.

The total number of incidents grew by 51 percent compared to 2019. Seven out of 10 attacks were targeted and the most popular targets were government institutions (19 percent), industrial companies (12 percent) and medical institutions (nine percent).

Continue reading

US Amazon customers have a week to opt out of Sidewalk -- here's why you should

Lots of Echoes

You've probably heard of Amazon Sidewalk, the company's home networking system. In fact Sidewalk is a bit more than that, it involves devices like Echo speakers and Ring doorbells becoming part of 'mesh networks'.

These networks will, says Amazon, simplify the process of setting up new devices, keep them online even when out of range of home Wi-Fi, and extend the range of tracking devices. However, customers have only a week to opt out if they don't want their devices to be enrolled in Sidewalk.

Continue reading

Banking fraud rises by more than 150 percent

password theft

A new report from financial crime management platform Feedzai shows that all banking fraud -- combining internet, telephone, and branch attacks -- grew by 159 percent in the first quarter of 2021 compared to the end of 2020.

Based on analysis of over 12 billion global banking transactions from January to March 2021 the study shows online banking made up 96 percent of all banking transactions and accounted for 93 percent of all fraud attempts.

Continue reading

Login experiences are not delivering for consumers

remote work slow broadband

New research by YouGov for identity platform Auth0 finds that many businesses are falling short of consumer expectations on login technologies -- and risk frustrating their users, losing sales, and opening themselves up to credential stuffing attacks as a result.

The study shows that consumers around the world want greater choice in login technologies, and that they're willing to actively seek them out. Nearly half (49 percent) of consumers surveyed say they are more likely to sign up to an app or online service if a company offers multi-factor authentication (MFA).

Continue reading

The challenge of keeping remote work secure

home working security

In a rapid and unprecedented shift, over 60 percent of Americans worked from home in 2020. But this has thrown up new challenges for businesses trying to keep their systems secure.

Authentication specialist Beyond Identity has produced an infographic looking at how vulnerable systems and applications can be in the work from home era.

Continue reading

What does Apple's enterprise growth mean for IT administrators? [Q&A]

Apple logo iMac Pro

The use of Apple devices in the enterprise has grown exponentially over the past year. In fact, a recent report from IDC showed that macOS was the operating system of choice for 23 percent of computers at US companies with 1,000 employees or more in 2020, up from 17 percent in 2019.

As businesses continue to adopt Apple devices at work, Mosyle CEO Alcyr Araujo, wants to highlight how to seamlessly deploy, manage, maintain and protect these devices at scale. He believes simple, intuitive and automated mobile device management (MDM) and endpoint security are the key to solving new endpoint management and security challenges, we spoke to him to find out more.

Continue reading

Why ransomware is on the rise and how organizations can protect themselves [Q&A]

Ransomware skull

Many high profile attacks in recent months have involved ransomware, notably the Colonial Pipeline attack. Worryingly some businesses seem willing to pay the ransoms too.

But why are these attacks on the rise and what can businesses do to protect themselves against them? We spoke to Clumio CEO, Poojan Kumar to find out.

Continue reading

Get 'Network Security Strategies' ($27.99 value) FREE for a limited time

Network-Security-Strategies

With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments.

Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.

Continue reading

Free tool lets businesses assess ransomware preparedness

ransomware laptop

Cyber risk management company Axio is expanding its free Axio360 Ransomware Preparedness Assessment tool to give organizations detailed visibility into their cyber posture with regard to ransomware.

The assessment tool has been developed based on guidance from National Institute of Standards and Technology (NIST), the Department of Homeland Security, the Federal Bureau of Investigation, and Axio's proprietary research based on hundreds of real ransomware events.

Continue reading

Enterprises under-resource cloud security despite increased risks

Secure cloud

A new study from Osterman Research, commissioned by Sonrai Security shows that almost a third of US companies are under-resourcing cloud security in the face of rising threats.

Even though half of respondents have spent $10 million or more on cloud services over the last three years, 32 percent say they are doing less than they need to in order to secure their cloud resources.

Continue reading

New identity platform delivers biometric authentication and enterprise-grade tools

Biometric face recognition

Verification and authentication provider Onfido is launching its Real Identity Platform, which adds a biometric face authenticator as well as new enterprise-grade security tools, including Onfido Private Key Encryption, to its existing identity verification suite.

Onfido Face Authenticate uses 3D Face Liveness Detection AI during user authentication. It's compatible with billions of iOS and Android devices, tablets and PCs.

Continue reading

One Identity introduces modular, integrated, cloud security platform

cloud lock

Security specialist One Identity is launching its Active Roles and Password Manager products in a software-as-a-service format.

Retaining the full capabilities of One Identity's on-premises solutions, the SaaS offerings are hosted, managed and operated within the One Identity Cloud. There's also a new SaaS-delivered solution, Starling CertAccess, which delivers access request and certification Active Directory (AD) and Azure Active Directory (AAD) in the enterprise.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.