Ian Barker

Why the voice network is a blind spot for security professionals [Q&A]

We're familiar with threats to data and data networks, but there's another part of corporate communication that's often overlooked yet represents an equally valid attack vector and equally high risks.

We spoke to Mutare CTO Roger Northrop to find out more about the risks voice networks present and why organizations need to take them seriously.

Continue reading

The Art of Cyberwarfare [Review]

In recent years cyberattacks have evolved from being the preserve of individual hackers to something much more serious, carried out by organized criminals and even nation states with the aim of espionage and financial gain.

This makes the process of investigating and defending against attacks more important than ever, but the sophistication of the methods used doesn't make the process any easier. This new book from security strategist Jon DiMaggio offers an investigator's guide to understanding the latest generation of threats.

Continue reading

UK police force becomes first to deploy new digital forensics solution

Thanks to increased use of computers and mobile phones almost every crime now has some form of digital element. This has put a strain on the police's ability to investigate effectively and inevitably led to delays.

West Midlands Police in the UK has become the first to deploy a new cloud-based digital forensic solution from Exterro which allows greater collaboration between officers and means cases can be worked on remotely and resolved at greater speed.

Continue reading

What is unified observability and why is it important? [Q&A]

There has been much discussion around observability in the past few months. With the adoption of hybrid work models and cloud systems, IT leaders have quickly realized the business and security value of creating transparency within their existing tech infrastructure.

Digital experience company Riverbed has announced a business move towards a market it's calling 'unified observability'. The company's vice-president Mike Marks spoke to us about the unified observability concept, why it's integral to IT decision-makers' strategies and offers some thoughts on how enterprises can begin integrating it within their current operations.

Continue reading

Want a well-paid a career? Have you considered cybercrime?

OK, so there may not be a pension scheme and a company car, but rookie fraudsters are taking home approximately $18,700 (£15,000) a month with 'cybercriminal CEOs' making up to three times as much as their counterparts in legitimate businesses. According to a new report from Arkose Labs.

The return on investment for launching cyber attacks or committing online fraud is larger than ever before. Some of the highest earning fraudsters are known to be making around $7.5 million (£6 million) a year according to even the most conservative estimates. This is almost three times the amount that FTSE 100 chief executives were paid in 2020, when they earned an average $3.4m (£2.7m).

Continue reading

New solution aims to address quantum security threats

quantum computing

We all know that quantum computing is going to offer a major boost in computing power. But that power also represents a threat to cryptographic systems, potentially putting the world's data at risk.

To address the issue QuSecure is launching an industry first end-to-end post-quantum cybersecurity (PQC) software-based solution designed to protect encrypted communications and data with quantum-resilience.

Continue reading

DDoS attacks fell last year but remain above pre-pandemic levels

DDoS attack

The number of DDoS attacks dropped 13 percent in 2021 compared to 2020, but remained well above pre-pandemic levels.

Research from Nexusguard also shows that while the average attack size fell by 50 percent over 2021, the maximum attack size nearly tripled, growing by a whopping 297 percent over the same period.

Continue reading

Rise of the bots -- 42.3 percent of internet traffic in 2021 wasn't human

The latest Bad Bot Report from Imperva shows that bots are an increasingly significant part of the web, accounting for over 42 percent of traffic overall.

More concerning still is that bad bots accounted for a record-setting 27.7 percent of all global website traffic in 2021, up from 25.6 percent in 2020. The three most common bot attacks are account takeover, content or price scraping, and scalping to obtain limited-availability items.

Continue reading

Ransomware vulnerabilities increase as Russia-linked activity surges

ransomware laptop

The first quarter of 2022 has seen a 7.6 percent increase in the number of vulnerabilities tied to ransomware, with 22 new ones discovered.

The latest Ransomware Index from Ivanti, conducted with Cyber Security Works, shows that of those 22, 19 are connected to Conti -- a prolific ransomware group that pledged support for the Russian government following the invasion of Ukraine.

Continue reading

Enterprise SIEMs fall short on detecting attacks

Attack route

Enterprise Security Information and Event Management (SIEM) tools are detecting fewer than five of the top 14 MITRE ATT&CK techniques employed by adversaries in the wild, according to a new report.

Analysis by AI-powered detection engineering company CardinalOps also shows SIEMs are missing detections for 80 percent of the complete list of 190+ ATT&CK techniques.

Continue reading

Three out of five organizations lose data due to email errors

email attachment

Three out of five organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months, according to a new study.

Research from email security company Tessian and the Ponemon Institute shows 65 percent of over 600 IT security practitioners surveyed see email as the riskiest channel, followed by 62 percent for cloud file sharing and 57 percent for instant messaging.

Continue reading

Unlocking the hidden resources that could solve the cyber skills crisis [Q&A]

home working

There was already a shortage of cyber skills before the COVID-19 pandemic hit, and since then we've had a perfect storm of home working and the Great Resignation to make things worse still.

But is there an unexploited resource out there that could help fill the skills gap? Sonny Sandelius, assistant director of workforce programs at cyber security training skills company SANS believes there could be in the form of an army of the hobbyists and DIYers.

Continue reading

Self-built edge messaging harms delivery of digital projects

Edge messaging infrastructure is critical to the data delivery that powers the experiences consumers expect, such as live chat, order delivery tracking, and document collaboration.

But a new report from edge messaging platform Ably reveals that 65 percent of organizations experienced an outage or significant downtime in the last 12-18 months with the edge messaging infrastructure they had built in-house.

Continue reading

IT pros feel the pressure to maintain organizations' security

stressed overwork pressure

As the number of breaches shows no sign of reducing, cybersecurity and development professionals are feeling the pressure to maintain their organizations’ security postures.

New research from Invicti Security finds DevSecOps professionals spend more than four hours each workday addressing security issues that never should have happened in the first place.

Continue reading

Twitter Facebook LinkedIn Spy

How do you know if you're being targeted by an agent of a foreign power? It used to be easy, as soon as he ordered red wine with his fish* you knew he wasn't the right sort of chap.

Nowadays when nation states are more likely to befriend you on social media in order to try to steal sensitive data you can no longer rely on the wine list to help you spot a bad guy.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.