The challenge of keeping remote work secure


In a rapid and unprecedented shift, over 60 percent of Americans worked from home in 2020. But this has thrown up new challenges for businesses trying to keep their systems secure.
Authentication specialist Beyond Identity has produced an infographic looking at how vulnerable systems and applications can be in the work from home era.
What does Apple's enterprise growth mean for IT administrators? [Q&A]


The use of Apple devices in the enterprise has grown exponentially over the past year. In fact, a recent report from IDC showed that macOS was the operating system of choice for 23 percent of computers at US companies with 1,000 employees or more in 2020, up from 17 percent in 2019.
As businesses continue to adopt Apple devices at work, Mosyle CEO Alcyr Araujo, wants to highlight how to seamlessly deploy, manage, maintain and protect these devices at scale. He believes simple, intuitive and automated mobile device management (MDM) and endpoint security are the key to solving new endpoint management and security challenges, we spoke to him to find out more.
Why ransomware is on the rise and how organizations can protect themselves [Q&A]


Many high profile attacks in recent months have involved ransomware, notably the Colonial Pipeline attack. Worryingly some businesses seem willing to pay the ransoms too.
But why are these attacks on the rise and what can businesses do to protect themselves against them? We spoke to Clumio CEO, Poojan Kumar to find out.
Free tool lets businesses assess ransomware preparedness


Cyber risk management company Axio is expanding its free Axio360 Ransomware Preparedness Assessment tool to give organizations detailed visibility into their cyber posture with regard to ransomware.
The assessment tool has been developed based on guidance from National Institute of Standards and Technology (NIST), the Department of Homeland Security, the Federal Bureau of Investigation, and Axio's proprietary research based on hundreds of real ransomware events.
90 percent of developers think open source is crucial to business growth


Enterprise cloud developers believe open source will be key to the future of their organizations, as businesses look to restart growth post-pandemic.
Research from Finnish software company Aiven surveyed 200 UK developers in large companies and shows that 90.5 percent say open source will be a part of the future of their organizations.
Enterprises under-resource cloud security despite increased risks


A new study from Osterman Research, commissioned by Sonrai Security shows that almost a third of US companies are under-resourcing cloud security in the face of rising threats.
Even though half of respondents have spent $10 million or more on cloud services over the last three years, 32 percent say they are doing less than they need to in order to secure their cloud resources.
New identity platform delivers biometric authentication and enterprise-grade tools


Verification and authentication provider Onfido is launching its Real Identity Platform, which adds a biometric face authenticator as well as new enterprise-grade security tools, including Onfido Private Key Encryption, to its existing identity verification suite.
Onfido Face Authenticate uses 3D Face Liveness Detection AI during user authentication. It's compatible with billions of iOS and Android devices, tablets and PCs.
One Identity introduces modular, integrated, cloud security platform


Security specialist One Identity is launching its Active Roles and Password Manager products in a software-as-a-service format.
Retaining the full capabilities of One Identity's on-premises solutions, the SaaS offerings are hosted, managed and operated within the One Identity Cloud. There's also a new SaaS-delivered solution, Starling CertAccess, which delivers access request and certification Active Directory (AD) and Azure Active Directory (AAD) in the enterprise.
Who will scrutinize the scrapers?


Web scraping allows the collection of data from third-party web sources. Data harvesting like this is one of the key pillars of the internet, but while it can be useful it also has the potential for harm.
The Cambridge Analytica scandal of 2016 first brought this type of activity to the wider public's attention but, as of today, there is still no regulatory body to govern its widespread use.
New app helps manage employee photo usage rights


Ensuring consent for the use of digital assets can be a bit of a nightmare. But a new solution from FotoWare ensures that employee photos are only used with the full consent of the subject, freeing content creators and managers who can quickly review, and refresh consents if usage changes.
FotoWare's Consent Management offers mobile and email based signature collection, along with searching and filtering media based on consent status.
Elon Musk- and Tesla-themed Bitcoin scams seek to lure victims


A favorite tactic of scammers is to invoke the name of a celebrity to get people to fall for their schemes. It's no surprise then that, given his known enthusiasm for cryptocurrencies, Tesla supremo Elon Musk's name often comes up.
Researchers at Bitdefender Antispam Lab have spotted two spam campaigns this month both seeking to cash in on Musk and Tesla's high profile in the cryptocurrency world.
Organizations in India, Austria and the US are most hit by ransomware


More than half of companies in India, Austria and the US experienced ransomware attacks in the past year, compared to a global average of 37 percent.
Data from Atlas VPN, based on research by Sophos, shows that out of 300 interviewees from India, 68 percent suffered from a ransomware attack, while 57 out of 100 respondents from Austria did so.
The encryption technology that's revolutionizing secure data usage [Q&A]


Conventional encryption methods rely on the exchange of keys. This can leave them vulnerable, particularly when they're used on public cloud services.
One way around this is to use homomorphic encryption, this permits third party service providers to perform some types of operations on a user's data without needing to decrypt it.
Attackers spend 11 days in a network before detection


The median attacker dwell time before detection is 11 days or 256 hours, according to data from Sophos. That's time in which they're free to conduct malicious activity, such as lateral movement, reconnaissance, credential dumping, data exfiltration, and more.
The company has released an 'Active Adversary Playbook' detailing attacker behaviors and the tools, techniques and procedures (TTPs) that Sophos' frontline threat hunters and incident responders saw in the wild in 2020.
What's your password personality?


Nearly half (49 percent) of US employees create their own tricks and shortcuts for managing logins, leaving business systems open to attack.
A new report from password manager company Dashlane, created in conjunction with Datalands and based on a survey of 1,000 people, identifies four different employee personas, and the potential barriers these employees may cause to security culture.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.