Ian Barker

More than half of US adults lack confidence in government's ability to fight cyberattacks

Cyber attack

According to a new study from third-party ID risk specialist SecZetta 53 percent of respondents lack confidence in the strength of the US government’s infrastructure to protect the American people from cyberattacks.

Also 88 percent say organizations and government entities must have better data security systems in place to protect them from the increase in third-party remote attacks.

Continue reading

The challenges of securing Active Directory [Q&A]

security meter

As we saw in the recent SolarWinds attack, Active Directory can be exploited as a means of attacking corporate networks.

But why is AD such an attractive target? And why are companies struggling to secure it even though it's hardly a new technology? We spoke to Carolyn Crandall, chief security advocate at AttivoNetworks to find out.

Continue reading

SMB developers trust big cloud providers -- but not completely

A new survey for cloud computing company Linode, carried out by ClearPath Strategies, looks at how much developers trust their third-party cloud providers.

Based on responses from 800 developers at small and mid-sized businesses, it finds that while developers generally say they trust their provider of choice in general, deeper examination uncovers some issues when it comes to major cloud providers.

Continue reading

Norton snaps up Avast in $8 billion merger deal

Following on from news of merger talks last month, NortonLifeLock has confirmed that it is buying Avast in a deal that values the Czech-based and London stock exchange listed firm at up to $8.6bn (£6.2bn).

In a joint statement the companies say that the combined business will serve more than 500 million cybersecurity customers, including around 40 million direct customers.

Continue reading

Businesses need to focus on the basics to defend against ransomware

Ransomware skull

A new whitepaper released today by O'Reilly and based on a survey of tech professionals experiences of ransomware concludes that basic security practices like backups are key to surviving an attack.

Of 950 respondents to the study only six percent had experienced a ransomware attack directly in the organization they work for and, by and large, these organizations have strong security measures in place.

Continue reading

Banks speed up their AI adoption to combat money laundering

AI money

A third of financial institutions are accelerating their AI and machine learning adoption for anti-money laundering (AML) technology in response to COVID-19.

Meanwhile, another 39 percent of compliance professionals say their AI/ML adoption plans will continue, despite the pandemic's disruption, this is according to a new study by analytics company SAS, consultancy KPMG and the Association of Certified Anti-Money Laundering Specialists (ACAMS).

Continue reading

Enterprise network access for sale on underground forums

We know that cyber criminals are increasingly operating in a businesslike way and using underground marketplaces to sell services and information.

A new report from threat intelligence specialist IntSights looks at one particular aspect of this trend which is the sale of access to already compromised networks.

Continue reading

Salesforce misconfiguration can expose sensitive data

security flaw

Researchers at Varonis are warning about a Salesforce misconfiguration that can expose sensitive data to anyone on the internet.

The issue is in the Salesforce Community, which lets Salesforce customers create their own websites to connect with users outside their organization and collaborate.

Continue reading

The underground marketplaces behind cybercrime [Q&A]

hacker laptop

In the last few decades, we've seen cybercrime transform from an activity perpetrated by independent lone actors into an increasingly professional business endeavor in pursuit of profit.

Cybercriminals communicate and collaborate, working together and exchanging information on the deep and dark web. But what exactly is up for sale on these underground markets and what does this tell us about threat actor behavior and motivation?

Continue reading

Six months on from Brexit, how has it affected the IT industry?

Brexit flags

It's now been five years since the United Kingdom voted in a referendum to leave the European Union, and six months since it actually left.

With the promise of freedom to 'take back control' of the UK's borders, potential new opportunities for Britons and a plan to make the UK a global leader in innovation, there's still a lot up in the air. What has been apparent, however, is that almost all aspects of businesses have been impacted by Brexit in some way or other, from supply chain complications, to staff shortages, to confusion around GDPR and data protection rules.

Continue reading

How security teams can build a strong IT partnership for zero trust implementation [Q&A]

As the enterprise IT landscape has become more complex, security is no longer a matter of simply securing the network perimeter. The cloud and remote workers now have to be part of the equation too.

In order to cope with this, more and more businesses are turning to the use of zero trust methodology. We spoke to James Carder, CSO of SIEM platform LogRhythm to find out more about why this is a technology whose time has come and how it can be implemented effectively.

Continue reading

Why AI isn't the only answer to cybersecurity [Q&A]

machine learning AI

Read about any new cybersecurity product today and the chances are that it will be keen to stress its use of AI in some form.

But are we expecting too much from AI and are companies adopting it just because it's on trend? We spoke to Nadav Arbel, co-founder and CEO of managed SOC platform CYREBRO, to find out more about AI's role and why the human factor is still important.

Continue reading

Enterprises back data science but don't have the skills and tools to make it work

Data analytics

Enterprises are overwhelmingly counting on data science as a key to their long-term success, but flawed investments in people, processes and tools are leading companies to fail in their best efforts to develop, deploy, monitor, and manage models.

New research from Domino Data Lab shows that while 71 percent of data executives say their company leadership expects revenue growth from their investment in data science, 48 percent say their company has not invested enough to meet those expectations.

Continue reading

ThreatX platform gives businesses a clear view of their API attack surface

api

APIs make life easier for developers by allowing easy access to various program functions. However, this functionality also makes them an increasingly attractive target for attack.

Web application and API Protection platform ThreatX is launching new API catalog capabilities to provide enterprises with a clear view of their API's attack surface, as well as the operational health of any APIs in production.

Continue reading

Vulnerabilities are back as people return to work

open digital lock

After a slump during the pandemic, vulnerability disclosures are once again showing growth according to the latest Vulnerability QuickView Report from Risk Based Security's VulnDB team.

The report shows 12,723 vulnerabilities disclosed during the first half of 2021 and the vulnerability disclosure landscape saw a growth of 2.8 percent compared to the same period in 2020.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.