Over reliance on passwords compromises security
Four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused credentials.
A new report on access management from Thales also reveals that a majority of respondents say their organization plans to expand the use of usernames and passwords, even though the limitations could pose security challenges.
Protecting IoT and OT with zero trust and network segmentation [Q&A]
In recent years we've seen a surge in the numbers of IoT and operational technology devices appearing on networks.
But while this technology offers many advantages it also brings new risks, both for the devices themselves and the networks they're attached to. What can businesses do to benefit from the technology but still keep their networks safe?
Security industry responds to FBI warning of increased mobile banking risks
Earlier this week the FBI issued an alert about the risk of mobile banking platforms being targeted by cybercriminals during the current pandemic lockdown.
More than 75 percent of Americans used mobile banking in some form in 2019, but since the start of this year, a 50-percent spike in the usage of banking apps has been observed. Security professionals have been responding to the news.
New platform helps prevent data loss when employees leave
Around a third of employees take data with them when they leave a business according to email security firm Tessian.
In order to help companies understand and tackle the risks it's launching a new Human Layer Security (HLS) Intelligence platform to provide businesses with deeper insights into human layer security threats and the tools required to trend down the risk of accidental data loss, data exfiltration and advanced impersonation phishing attacks.
Data analysts spend only half their time analyzing data
During the course of a typical workday, data analysts only spend half their time actually analyzing data according to a new study.
Conducted by Dimensional Research for Fivetran, the online survey of around 500 data professionals across five continents also shows 68 percent of the analysts who responded say they have ideas that would drive more profit for their organizations, but they lack time to implement them.
How hackers are targeting enterprises from the outside
In the past businesses have needed to worry about protecting their networks. But the expansion of internet use, cloud and as-a-service products means there are now more potential threats to worry about.
A new study from attack surface management specialist RiskIQ looks at the digital presence of organizations, where they lack visibility, and the pathways hackers are using to exploit these blind spots.
UK government invests in security by design
The UK government is announcing that it will provide £10 million ($12.5 million) over four years to develop groundbreaking cyber security technologies.
Nine grant winners have been revealed as the recipients in the government's Digital Security by Design program, which aims to help the tech infrastructure of UK organizations and digital devices be more resilient to cyber attacks.
70 percent of security professionals say election infrastructure is at risk
A new survey of security professionals shows that 70 percent of respondents believe their governments can't adequately defend election infrastructure against domestic and international cyber attacks.
In addition the study, from machine identity protection company Venafi, finds that 75 percent believe the spread of disinformation is the greatest threat to election integrity.
Protocol flaws leave 5G and other mobile networks open to vulnerabilities
Vulnerabilities affecting mobile and 5G networks are putting industrial equipment, smart homes, and city infrastructure at risk according to a new report.
Produced by Positive Technologies, this is the fourth in a series of reports on the greatest threats and vulnerabilities in the mobile ecosystem. It highlights the cyber security risks to networks that originate with the GTP protocol -- which is used to transmit user data and control traffic on 2G, 3G, and 4G networks.
Secure access solution delivers SD-WAN connectivity for remote workers
Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.
Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.
Microsoft partners with NTT DATA to boost public cloud for digital transformation
Businesses are increasingly looking to bring about digital transformation through agile system integration utilizing cloud computing and other technologies.
NTT DATA is expanding its alliance with Microsoft to bring together NTT's global IT services with Microsoft's cloud to help digital transformation projects using Microsoft Azure as a preferred cloud solution.
The impact of open source on security [Q&A]
Open source software is commonly used to save time as it means developers don't end up repeating the same things over and over.
One of the key things about open source is that the source code is open to examination by everyone, In security terms this means it’s open to both the attackers and defenders.
60 percent of organizations expect to suffer attacks by email
Email is still a favorite attack route for cyber criminals a new study reveals, 77 percent of respondents say they have or are actively rolling out a cyber resilience strategy, yet an astounding 60 percent of respondents believe it is inevitable or likely they will suffer from an email-borne attack in the coming year.
Respondents to the Mimecast survey of more than 1,000 IT decision makers cite other worries as data loss (31 percent), a decrease in employee productivity (31 percent) and business downtime (29 percent) due to a lack of cyber resilience preparedness.
Executives believe their companies will benefit from 'continuous intelligence'
New data released today by Sumo Logic highlights increasing demand for a new category of software called 'continuous intelligence' among C-level executives.
Continuous intelligence allows organizations to more rapidly deliver reliable applications and digital services, protect against modern security threats, and consistently optimize their business processes in real time.
Vectra integrates threat detection with Microsoft security
Network threat detection and response company Vectra AI is announcing deep product integration with Microsoft Defender Advanced Threat Protection (ATP) and Microsoft Azure Sentinel to allow enterprises to better protect their networks.
Vectra has also been invited to become a member of The Microsoft Intelligent Security Association, an ecosystem of independent software vendors purpose-built to defend against increasing cyber threats.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.