Ian Barker

AI-driven platform helps to remove bias in data

financial data exchange

As businesses become more reliant on data, ensuring that it's free of bias is essential to meeting compliance requirements as well as delivering useful insights.

A new AI-driven platform from Synthesized has been designed to understand a wide array of regulatory and legal definitions relating to contextual bias. It can automatically identify bias across data attributes like gender, age, race, religion, sexual orientation, and more.

Continue reading

Cybereason launches new solution to protect enterprise networks

Network

Cyberattacks increasingly take aim at multiple devices and users simultaneously while employing a range of tactics, forcing defenders to employ a range of different tools across their IT estate.

Now though Cybereason is launching a new Extended Detection and Response (XDR) solution that brings together endpoint telemetry with behavioral analytics to help enterprises to swiftly detect and end cyberattacks anywhere on their networks.

Continue reading

Europeans don't trust US tech giants with their data

Trust card

A new study reveals that 82 percent of Europeans don't trust US tech giants with their personal files, despite increasing reliance on cloud services due to COVID-19.

The survey of 4,500 people across the UK, France and Germany, conducted by pCloud, one of Europe's fastest-growing file-sharing and cloud storage providers, finds the biggest concerns are personal data being used for commercial gain (51 percent) and the possibility of hacks (43 percent).

Continue reading

Dreaming of an insecure Christmas

Christmas smartphone worker

What do you want for Christmas? How about a coffee maker that can eavesdrop on your conversations, or a fitness tracker that can analyze the tone of your voice?

The fourth-annual Privacy Not Included holiday shopping guide from Mozilla aims to arm shoppers with the information they need to choose gifts that protect the privacy and security of their friends and family while spurring the tech industry to do more to safeguard consumers.

Continue reading

Shift to remote work drives overhaul of enterprise access technology

Access management

This year's massive and sudden shift to remote working has boosted the adoption of cloud technology and the security implications of this transition will reverberate for years to come, according to the latest Trusted Access report from Cisco company Duo Security.

Daily authentications to cloud applications surged 40 percent during the first few months of the pandemic, the bulk of these coming from enterprise and mid-sized organizations looking to ensure secure access to services.

Continue reading

DDoS attacks become smarter and easier to carry out

DDoS attack

Although ransomware has dominated 2020's cyber threat landscape, DDoS attacks haven’t gone away. In fact the year has seen the largest DDoS attack ever recorded, peaking at 2.3 Terabytes per second.

The attack was carried out by deploying hijacked CLDAP (Connection-less Lightweight Directory Access Protocol) web servers and caused three days of downtime for the unnamed targeted business. This is one of the things highlighted in new analysis from Digital Shadows.

Continue reading

The rise of the shopping bot and what it means for security teams [Q&A]

If you've ever tried to order a recently released tech product, like a new game console or the latest hot graphics card only to find it's sold out, you've no doubt felt frustrated. It's even more frustrating when the product then appears on secondary market sites at many times the original price.

What you're seeing here is probably the action of automated shopping bots that scoop up products for resale at a profit. Is this a form of cyber attack or is it just rather shady commercial activity? We spoke to Ameya Talwalker, co-founder of Cequence Security, to find out more about the behavior of these bots and what can be done to curb their activity.

Continue reading

CISOs look for flexibility to manage new security challenges

business security

A new survey of UK CISOs by cybersecurity company F-Secure looks at how IT decision makers are adapting to a fast changing landscape.

With more people working remotely budgets are being moved around to allow businesses to cope with new ways of working and the resulting security vulnerabilities, and 13 percent of respondents say that budgets are going to increase as a direct response to the challenges presented by the pandemic.

Continue reading

Getting real about ransomware [Q&A]

Ransomware sign

For every high-profile ransomware incident in the headlines, there are many more that never get reported. Particularly among small- and medium-sized businesses, often with small IT and cybersecurity teams, a ransomware attack can be an existential problem.

To understand how companies should respond when they discover they're in the grip of a ransomware threat actor, we spoke with Kurtis Minder, CEO and co-founder of GroupSense, which helps companies navigate through these attacks to get their businesses back online.

Continue reading

Network access to over 7,000 organizations for sale on hacker forums

hack money

Hackers have breached 7,500 organizations and are selling network access on multiple Russian hacker forums.

An investigation by CyberNews.com reveals compromised networks located in the USA, Canada, and Australia which include educational, entertainment and bar industry organizations.

Continue reading

Hackers exploit business VoIP system vulnerability

Researchers at Check Point have uncovered a fraud operation targeting more than 1,200 business VoIP phone systems worldwide.

Hackers are exploiting vulnerabilities in the popular Sangoma and Asterisk VoIP phone systems to gain control of the system. They then seek to monetize that access by selling auto-generated calls and forcing systems to call premium numbers owned by the hackers to collect revenues, without the targeted business being aware.

Continue reading

Consumers overconfident of their connected device security

WiFi hotspot

A new study from the National Cyber Security Alliance (NCSA) into perception and behavior around connected device security reveals that most US consumers are confident that the connected devices they own are secure.

However, the survey of 1,000 respondents in two age groups (500 aged 18-34 and 500 aged 50-75) reveals this confidence may be misplaced, along with some interesting generation gaps.

Continue reading

Threat actors get more creative in their attacks

Insider threat

The latest quarterly threat intelligence report from Kaspersky shows that many actors behind advanced persistent threats (APTs) have continued to diversify their toolsets, at times resorting to extremely tailored and persistent tools.

At the same time though others have reached their goals by the employment of well-known, time-tested attack methods.

Continue reading

How AI can help enterprises stay on top of data governance [Q&A]

Data governance

Security breaches and privacy violations can cost businesses dearly. not only in financial penalties but also by causing damage to their reputation.

Keeping tabs on your data and how it's used is an essential part of staying in control and it's an area where AI can help. We spoke to Amar Kanagaraj, founder and CEO of AI-powered data protection and data governance specialist oneDPO to find out more.

Continue reading

Small can be ugly when it comes to third-party cybersecurity

security flaw

Digital transformation initiatives often involve closer relationships with other businesses, but these can expose a company to additional risk if the other party's security isn't up to scratch.

New research from CyberGRX, based on data collected from the third parties on its exchange, finds that company size correlates with the maturity of cybersecurity programs, more specifically, as companies get smaller, they have fewer controls in place and less mature programs.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.