Ensuring compliance takes a front seat when using collaboration tools [Q&A]


One effect of the pandemic shift to working from home has been a surge in the use of collaboration platforms. Microsoft Teams alone just exceeded 250 million monthly active users.
But a new whitepaper from Theta Lake and Osterman Research, Archiving And Data Protection With Microsoft Teams, brings to light the strengths and weaknesses of native archiving and data protection in Microsoft Teams and why firms look to third-party solutions to address coverage gaps.
Ransomware attacks are now the second most commonly reported security incident


Analysis by CybSafe of incidents reported to the UK's Information Commissioner's Office (ICO) shows that ransomware attacks made up 22 percent of all reported cyber security incidents in the first half of 2021. This is up from 11 percent in the first half of 2020
Phishing still leads, accounting for 40 percent of all cybersecurity cases reported to the ICO, slightly down from 44 percent the year before, but ransomware has now edged into second place.
Container security and compliance remains a challenge as deployment speeds ahead


A report released today finds that while adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a major challenge.
The study, from container security specialist NeuVector, polled over 1,200 DevOps professionals attending KubeCon EU 2021 and shows over 89 percent have container deployments active, and 88 percent are planning additional deployments in the next six to 12 months.
Data governance -- balancing security against risk [Q&A]

Are you a road warrior or a remote collaborator?


The COVID-19 pandemic has had a major effect on the way most of us work and new research from workplace communication specialist Poly has identified six different workplace personas that make up over 90 percent of a typical enterprise.
The study, carried out by by Factworks, aims to help businesses look at the attributes, pain points, and communication intensity associated with each persona, to better match workstyles and employee behaviors to communication devices and technologies.
ICS vulnerabilities on the rise as attacks increase


Industrial control system (ICS) vulnerability disclosures are increasing as recent high-profile cyberattacks on critical infrastructure and industrial enterprises have made ICS security a mainstream issue.
The latest biannual ICS Risk & Vulnerability Report released today by Claroty shows a 41 percent increase in ICS vulnerabilities disclosed in the first half of 2021 compared to the previous six months, which is particularly significant given that in all of 2020 they increased by 25 percent from 2019 and 33 percent from 2018.
Ubuntu Linux gets certified for secure and regulated workloads


Canonical is announcing today that Ubuntu is set to drive high security and regulated workloads thanks to gaining a new FIPS (Federal Information Processing Standards) certification.
Now the world's most popular operating system across private and public clouds, Ubuntu has received the FIPS 140-2, Level 1 certification for its cryptographic modules in Ubuntu 20.04 LTS, including OpenSSL 1.1.1.
ExtraHop provides deep threat insights for hybrid cloud


The expansion of cloud use and remote working have made protecting business systems much more complicated, with simple perimeter controls no longer enough.
ExtraHop is launching updates to its Reveal(x) 360 cyber defense platform that provide deep forensic insight into hybrid cloud networks to allow for advanced threat response.
Trickle down of nation state attack tools may harm businesses


A new study from HP Wolf Security shows that 72 percent of IT decision makers worry that nation state tools and techniques could filter through to the dark net and be used to attack their businesses.
The survey, of 1,100 decision makers around the world, also finds 58 percent are worried their business could become a direct target of a nation state attack. A further 70 percent believe they could end up being 'collateral damage' in a cyber war.
Attack volume increases as hackers go phishing for cryptocurrency


There has been a 22 percent increase in phishing volume in the first half of 2021 compared to the same period last year. Though there was a dip in June following record highs in May.
A report from digital risk protection company PhishLabs shows that the cryptocurrency sector saw a 10 times increase in attacks in the last quarter compared to the previous one.
Confidential data leaked online following Gigabyte attack


Earlier this month Taiwanese hardware maker Gigabyte confirmed that it was under ransomware attack from a hacker group calling itself RansomEXX.
Now researchers at CyberNews have discovered that confidential data apparently belonging to Gigabyte has been leaked on a hacker forum.
Why threat intelligence is key to the future of cybersecurity [Q&A]


As threats continue to evolve security vendors must keep up. This means having up to date information and being able to act on it quickly.
The key to this is effective threat intelligence. We spoke to Anuj Goel, co-founder and CEO of Cyware to find out more about threat intelligence and why sharing is key to making the most of it.
Why unintentional insider data leaks are still a problem for businesses [Q&A]


Whilst threats to data are often seen as being down to external actors, it's often the case that leaks, both intentional and otherwise, can come from insiders.
Unintentional or accidental leaks remain a major problem, and one that’s been made worse thanks to more home working. We spoke to Rajan Koo, SVP, engineering and cyber intelligence at DTEX Systems to learn more about this type of threat and how businesses can address it.
Data warehouses not delivering return on investment


A report from Dremio, based on a study by Wakefield Research, shows only 22 percent of data leaders have fully realized their return on data warehouse investment in the past two years, with most (56 percent) having no consistent way of measuring it.
Another startling finding is that in order to run analytics, enterprises are making multiple copies of their data -- 12 on average -- with 60 percent reporting that their company has over 10 copies of their data floating around.
Half of cyberattacks are from repeat offenders


Half of attacks on organizations that caused severe business disruption were by repeat offenders, according to a new study carried out by Ponemon for threat intelligence firm Team Cymru.
What's more, 61 percent of the victims of these attacks say they were unable to remediate these compromises, leaving critical systems and data at risk.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.