IBM-backed global code challenge focuses on climate change
Now in its third year, the Call for Code Global Challenge encourages and fosters the creation of practical applications built on open source software. The goal is to employ technology in new ways that can make an immediate and lasting humanitarian impact in communities around the world.
For the 2020 challenge IBM is joining forces with key UN agencies and world leaders to help tackle climate change.
Shadow IoT threatens enterprise security
A 1,500 percent increase in IoT traffic over the past year and a rise in unauthorized devices being used in the workplace represents a major threat to enterprise security, according to a new report.
The latest IoT report from cloud security company Zscaler reveals its customers are now generating more than a billion IoT transactions each month. Analysis of just two weeks of this traffic through Zscaler cloud found 553 different IoT devices across 21 categories from 212 manufacturers.
5G and risks to critical infrastructure [Q&A]
The speed and bandwidth of 5G means that as the roll out continues a lot of industrial automation equipment will eventually be on the 5G network.
So what can be done to protect the integrity and availability of manufacturing networks and other critical infrastructure? We spoke to Dave Weinstein, CSO of Claroty to discuss the link between 5G and the cyber security of critical infrastructure.
New biometric solution guards email against account takeovers
At the root of most data breaches is a compromised account, but these can be very hard to identify, often coming to light only after they've been used to steal data.
Email security specialist GreatHorn is launching a biometric solution that effectively identifies compromised accounts and blocks takeover attempts by validating users using their unique typing patterns.
Cisco launches new cloud-native security platform
As businesses move into the cloud and expand their use of IoT devices, protecting their systems becomes much more complex.
To address this problem Cisco is launching a new integrated cloud-native security platform, Cisco SecureX, aimed at improving visibility, identifying unknown threats, and automating workflows to strengthen customers’ security across network, endpoint, cloud, and applications.
London insurance market turns to tech to maintain its world-leader status
A survey, by IT services provider NTT DATA, of senior leaders in the London insurance market shows a major appetite for technological change within the industry.
It finds that 70 percent of insurance leaders are looking to invest in robotic process automation (RPA) in the future, while 51 percent are focusing their budget on AI and machine learning, exploring use cases like using AI in underwriting to recognize patterns in large data sets and inform human decision making.
Vectra helps enterprises protect against Office 365 breaches
As more services move to the cloud, enterprises are exposed to increased risks from data breaches, and around 40 percent of organizations have suffered from Office 365 account takeovers.
According to Microsoft's Q3 2019 earnings call, there are more than 180 million monthly users on Office 365, which means there's a big attack surface out there for cybercriminals. That's why threat detection and response specialist Vectra AI has announced a new tool to help businesses protect themselves.
Malicious apps found on Google Play Store despite new App Defense Alliance
Researchers at Check Point have recently found eight malicious apps containing malware on the Google Play app store, despite Google forming the App Defense Alliance in November 2019 to improve security of apps in the store.
The apps were camera utilities and kids' games and all carried the Haken malware. Check Point estimates the apps had been installed on over 50,000 Android devices before they were analyzed and removed from the Play store.
Popular document management apps expose sensitive files
Today's employees have access to a vast range of apps on their personal devices, but this can serve to undermine enterprise security because it's hard for IT teams to understand or control where sensitive corporate IP is going and how it's getting there.
The threat research team at Wandera has discovered a number of document management apps from Cometdocs that fail to use encryption when transferring files between the user and the backend service.
Organizations are detecting and containing attacks faster since GDPR
For organizations in the EMEA region, the 'dwell time' between the start of a cyber intrusion and it being identified, has fallen from 177 days to 54 days since the introduction of GDPR.
A new report from FireEye Mandiant also shows a decrease in dwell time globally, down 28 percent since the previous report. Median dwell time for organizations that self-detected their incident is 30 days, a 40 percent decrease year on year.
5G has the biggest potential to create safe cities
The latest communications industry insight report from IWCE (International Wireless Communications Expo) shows that industry insiders believe 5G has more potential than other technologies to create safe cities.
Key elements of a 'safe city' are a shared infrastructure with common sensors, multi-agency collaboration, situational awareness using real-time data, video and data analytics, and automated processes.
The risks of outdated systems in IoT and industrial environments [Q&A]
With Windows 7 now at its end-of-life, the need to update outdated systems is of the utmost importance. This is especially true for Internet of Things (IoT) and Industrial Control System (ICS) environments, as vulnerabilities in these older systems can lead to attacks that result in costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property.
We spoke to Phil Neray, vice president of industrial cybersecurity at CyberX, to find out more about why updating these systems is so imperative and to hear some recommendations about how organizations can go about doing so.
Over 27 million affected by healthcare data breaches last year
Healthcare data breaches affected over 27 million people in the US last year, with the number of records breached having more than doubled compared to 2018. Indeed the total number of records breached has more than doubled each year, from 4.7M in 2017 to 11.5M in 2018, and to 27.5M in 2019.
Cloud security company Bitglass has released its latest healthcare breach report analyzing data from the US Department of Health and Human Services.
Cloud misconfigurations expose over 33 billion records in two years
There's a growing trend towards data breaches caused by cloud misconfigurations, leading to 33.4 billion records being exposed in breaches in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, according to a new report.
The study from cloud security and compliance specialist DivvyCloud finds the number of records exposed by misconfigurations rose by 80 percent from 2018 to 2019 and this trend is expected to persist.
Industries should brace for more threats as criminals expand the attack surface
Increased availability of sophisticated attack toolkits, along with threats aimed at embedded technologies in connected vehicles, manufacturing and mobile devices, and those taking advantage of misconfigurations in cloud computing deployments are all causing concern for business.
The 2020 Annual Threat Report from BlackBerry Cylance says the search to find and exploit vulnerabilities has seen a shift in the industries most targeted, particularly towards the automotive sector.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.