Ian Barker

Security leaders want to give people more freedom -- but restrict it

A new survey of 200 enterprise IT and security leaders appears to uncover a fundamental paradox. 96 percent of respondents called for an expansion of IT freedom, while 91 percent say that enterprises also need to put more IT restrictions in place.

The study from OS isolation company Hysolate finds that in the post-COVID world businesses face demands to press for changes to IT security policies to simultaneously increase employee productivity while also enhancing the organization’s ability to ward off ransomware and other attacks.

Continue reading

Insider breaches hit 94 percent of organizations

Insider threat

Insider data breaches have been experienced by 94 percent of organizations in the past year, according to a new survey of 500 IT leaders and 3,000 employees in the US and UK, from email security company Egress.

Human error is the top cause of serious incidents, according to 84 percent of IT leaders surveyed. However, respondents are more concerned about malicious insiders, with 28 percent saying that intentionally malicious behavior is their biggest fear.

Continue reading

Companies face more than 1,000 domain impersonations each year

password theft

Businesses are facing a wave of attacks using domains impersonating their company and brand names according to a new study.

The research from risk protection specialist Digital Shadows shows that in the last four months its clients experienced an average of 360 domain impersonations, amounting to over 1,100 per year.

Continue reading

New free tool helps map legacy identity systems

Network

A number of on-premise identity systems from major suppliers including CA, Oracle and IBM are coming to the end of their lives and many businesses are looking to migrate to cloud alternatives.

But before migration can begin it's necessary to discover and catalog legacy identity systems. This is a largely manual process because there is no unified view of older environments that span multiple stakeholders, have evolved over a number of years, and can contain hidden complexities.

Continue reading

Security leaders struggle to guard against data loss

A new study from risk protection platform SafeGuard Cyber shows cybersecurity leaders understand what is needed for successful digital risk protection, but they are still struggling to provide it.

Lack of visibility (39 percent) is the biggest challenge for security leaders who aim to maintain security and compliance across all business communications.

Continue reading

Why enterprises need a data-centric approach to security [Q&A]

Data security watch face

Most cybersecurity focuses on keeping out threats, but there's an increasing view that everyone is going to get breached sooner or later and that protecting data is key to keeping a business safe.

We spoke to Kurt Mueffelmann, global chief operating officer of Nucleus Cyber -- which has recently been acquired by Australian access control company archTIS -- to find out more about how this approach works.

Continue reading

Without training one in three users fall for phishing scams

Phishing

New research finds that, if they haven't received security awareness training, one in three users will likely fall for a phishing or social engineering scam that could put their organization at risk.

The study from awareness training specialist KnowBe4 set out to measure organizations' phish-prone percentage (PPP) and found an initial baseline of 31.4 percent across all industries and sizes.

Continue reading

How stopping lateral movement can defend against ransomware [Q&A]

Ransomware

Over the last couple of years the number of ransomware attacks has soared. While high profile attacks make the headlines organizations of all sizes are at risk.

One of the keys to stopping attacks is to prevent them from moving laterally through networks. We spoke to Amit Serper, area VP of security research for North America at microsegmentation specialist Guardicore to get his view on how businesses can protect themselves.

Continue reading

Ransomware gangs get more professional

Ransomware, and indeed malware generally, used to be something of a cottage industry, the preserve of individuals or small groups. But new research from threat intelligence company KELA shows that it's becoming a highly professionalized industry.

Many cybercriminals are now specializing in different areas, so that the coding, spreading, extracting and monetizing processes might all be carried out by different people.

Continue reading

Panasonic sets up a new business solutions arm

Electronics giant Panasonic is launching a new solutions-focused organization, Panasonic Connect Europe, to address the changing technology needs of European businesses.

The new business will offer diverse B2B technology solutions, alongside an enhanced services capability, to help customers maintain mission critical operations and organizations transform their business operations.

Continue reading

Insider data breaches can cost companies as much as 20 percent of revenue

insider threat

Data breaches from insiders can cost as much as 20 percent of annual revenue according to a new study from insider risk management company Code42.

Combine this with a recent Microsoft report showing that 40 percent of people are planning to switch jobs as we emerge from the pandemic, and clearly there's a risk as the very technologies that enable the free flow of data in an organization are also the ones that make it easy for insiders to exfiltrate data.

Continue reading

New tool helps businesses to find the right security applications

DevSecOps

Security teams need to be able to understand their company’s software assets and properly test them. This means the team needs to be familiar with the threats to its technology and choose the services and solutions that work best for its unique circumstances.

Application Security Posture Management (ASPM) solution, Enso Security is launching its new industry initiative, the AppSec Map. This is designed as an industry collaboration initiative by former security leaders at Wix.com, and offers a live map of vendors and community projects related to application security.

Continue reading

IBM CodeFlare simplifies the move to hybrid cloud

Cloud growth arrow

Enterprises are relying on data more than ever before, but that can come at a cost in terms of the time spent on building and managing the infrastructure to handle it.

In order to streamline the integration and efficient scaling of these big data and AI workflows into hybrid cloud environments, IBM Research is launching CodeFlare.

Continue reading

Why testing is vital to keep organizations secure [Q&A]

penetration testing

Everyone knows that businesses systems are a target for a range of attackers. But it's easy to become complacent about security and finding vulnerabilities can be difficult.

Testing your security is therefore vital, and can uncover things that you might not otherwise be aware of.

Continue reading

Enterprises see threat modeling as a top priority post-COVID

Threat modeling is a top priority in 2021 according to 79 percent of respondents to a new survey, yet many organizations are still falling short in taking action or updating their approach.

The research from Balanced Development Automation (BDA) platform Security Compass shows that traditional threat modeling practices are historically slow, and hinder an organization’s goals of getting applications to market quickly.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.