Industry expert views for Data Privacy Day


Depending on who you talk to today is either Data Privacy Day or Data Protection Day. But whatever you want to call it the idea is to focus attention on the importance of best practices for looking after sensitive information.
In the current environment with distributed workforces and more transactions taking place online, this is more important than ever. We've rounded up opinions from some leading industry figures on the current state of data privacy and what can still be improved.
Human skills are essential to the success of SOCs


Security operations centers have become a key part of threat handling for many enterprises, but it's the human element that is key to success, according to a new report.
The SOC Skills Survey from training platform Cyberbit reveals that just 33 percent of respondents feel that HR understands the requirements needed to work in a cybersecurity team.
2020 mobile phishing trends


Phishing is nothing new, but the COVID-19 pandemic has seen an increase in attacks around the world as cybercriminals seek to exploit the opportunities offered.
Mobile security company Zimperium has produced an infographic looking at phishing trends with a particular emphasis on the mobile sector.
UK government faces software skills crisis


Governments don't have a good record when delivering IT projects, but a new study from digital experience company Acquia that the UK government is facing a major software skills crisis.
Results show that 28 percent of vacancies remain unfilled. Across the 12 departments which responded to freedom of information requests, some 317 developer positions are open, while just 808 developers are currently employed.
New 'Digital Bunker' offers a managed private cloud for enterprises


For companies that deal in sensitive information, keeping data secure in the cloud and for remote working is a major challenge.
To help meet this TetherView is launching an innovative managed private cloud service called 'Digital Bunker' which offers a 'one-way-in and one-way-out' private cloud solution for enterprise customers.
Exposed IoT devices put enterprises at risk


Although they are intended to make our lives simpler, the proliferation of connected devices has thrown up new headaches and risks.
New research from RiskRecon and the Cyentia Institute has looked at exposed IoT devices within a dataset of 35,000 organizations and explores the related security problems.
2020 sees rapid rate of change in the IT landscape


A survey of 500 US-based enterprise technology decision-makers from IT decision making platform AVANT Communications reveals rapid change as businesses press ahead with digital transformation and bring in new disruptive technologies.
The reporst shows nearly half of respondents intend to grow their usage of SD-WAN while almost 60 percent expect to increase or significantly increase their use of MPLS.
Pandemic boosts the importance of data privacy


A rapid shift to remote work and the need to make use of individuals' health information has led to greater emphasis on the importance of privacy protections during the pandemic.
The fourth annual Data Privacy Benchmark Study from Cisco, released today, analyzed the responses of 4,400 security and privacy professionals across 25 countries and explores attitudes towards privacy legislation and the emergence of privacy metrics being reported at senior level.
CybelAngel helps uncover hidden risks from shadow IT


Digital risk protection platform CybelAngel has updated its offering to include asset discovery and monitoring in order to help businesses identify hidden risks.
It can uncover hidden, rogue or obscure devices and services existing outside of the security team's awareness and control. These shadow assets include file servers, cloud databases, connected industrial systems and IoT devices.
Small security teams need to innovate to deal with threats


Companies with small security teams, generally SMEs, face a number of unique challenges which place them at greater risk than their larger enterprise counterparts.
This is among the findings of the 2021 CISO Survey of Small Cyber Security Teams from Cynet which also reveals that all of these companies are outsourcing at least some aspects of security threat mitigation in order to safeguard their IT assets.
Why the financial sector is especially vulnerable to cyberattacks [Q&A]


There's a famous quote attributed to career criminal William Francis Sutton Jr., when asked why he robbed banks he is said to have replied, "Because that's where the money is."
For today's cybercriminals the motivation to make money is much the same, so the banking and financial services sector is a prime target. We spoke to Paul Prudhomme, cyber threat intelligence advisor at IntSights to find out more about the threats the industry faces and how they can be addressed.
81 percent of financially motivated attacks are ransomware


Ransomware made up 81 percent of all financially motivated cyberattacks in 2020, according to a new report from Atlas VPN.
The remainder of attacks comprised a variety of approaches including point-of-sale intrusions, eCommerce attacks, business email compromise, and cryptocurrency mining.
2021 set to be the year of the vaccine scammers


The roll out of vaccines is seen as the light at the end of the tunnel of the COVID-19 crisis, but like any major event it's also an opportunity for scammers and cybercriminals.
Deep learning-powered fraud prevention company Bolster has released a new report which finds that leading indicators foreshadow a raft of COVID-19 vaccine scams.
2020 saw fewer data breaches but more records exposed


The number of publicly reported breach events decreased by 48 percent in 2020. However, more than 37 billion records were compromised, an increase of 141 percent.
A report released today by Risk Based Security reveals that this is by far the most records exposed in a single year since the company began reporting in 2005.
Careless scammers leave stolen passwords exposed online


Hackers responsible for a large-scale phishing campaign unintentionally left over a thousand sets of stolen log-in credentials accessible to the public via a simple Google search.
The error was uncovered by researchers at Check Point. and Otorio. The stolen credentials were stored in designated web pages on compromised servers.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.