Biggest hindrance to enterprise network visibility is lack of IT staff
Network performance monitoring specialist AppNeta has released its 2019 State of Enterprise IT Report, which finds that as enterprise IT deals with fundamental changes networking infrastructure teams are being stretched to the limit.
The biggest hindrances to network visibility are seen as lack of IT staff (25.6 percent), poor network management tools, (24.8 percent) and lack of visibility into app delivery paths (24.7 percent).
Dark net malware becomes more targeted
The dark net has become a haven for custom-built, targeted malware, with threats tailored to specific industries or organizations outnumbering off-the-shelf varieties by two to one, according to a new study.
The research from application containment company Bromium also finds four in 10 dark net vendors are selling targeted hacking services aimed at FTSE 100 and Fortune 500 businesses.
SecureAuth enhances identity management with intelligent cloud service
Secure identity company SecureAuth is launching enhancements to its solution with the announcement of Intelligent Identity Cloud.
This gives CISOs and IT professionals the ability to deploy the same capabilities in the cloud, on-premises, or as a hybrid of the two, addressing business demands of agility and dramatically improving identity security.
Microsoft and Oracle connect their clouds
Two of the giants of enterprise cloud technology have today announced a cloud interoperability partnership, enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.
Enterprises can now seamlessly connect Azure services, like Analytics and AI, to Oracle Cloud services, like Autonomous Database. By enabling customers to run one part of a workload within Azure and another part of the same workload within the Oracle Cloud, the partnership delivers a highly optimised, best-of-both-clouds experience.
iOS app developers take shortcuts on security
Despite Apple mandating developers to build end-to-end encryption into their apps, a high number of apps don't comply, according to a new report.
The study from mobile security company Wandera analyzed more than 30,000 of the iOS apps most commonly used by employees and found that more than two-thirds of apps don't enable App Transport Security (ATS).
Secure contact center payment solution comes to the cloud
Contact center data security specialist Semafone is making its Cardprotect available as a cloud solution in the US for the first time.
Companies now have the choice of running Cardprotect on premise, as a managed appliance, in a hybrid could or fully cloud solution. The new, cloud version enables a much faster, more scalable, flexible and cost-effective deployment, as there is no need for contact centers to purchase or manage equipment.
64 percent of organizations believe they have suffered a breach due to privileged access
A global survey of over 1,000 IT security decision makers by privileged access management specialist BeyondTrust reveals that 64 percent believe they've had either a direct or indirect breach due to employee access in the last year, and 62 percent believe they've had a breach due to vendor access.
Employee behavior continues to be a challenge for a majority of organizations. Writing down passwords, for example, is cited as a problem by 60 percent of organizations, while colleagues telling each other passwords was also an issue for 58 percent of organizations in 2019.
Data breaches exposed 2.8 billion consumer records in 2018
New data from digital identity platform ForgeRock reveals that data breaches cost US organizations over $654 billion as well as exposing more than 2.8 billion consumer records.
Personally identifiable information (PII) was the most targeted data for breaches in 2018, accounting for 97 percent of all breaches, with unauthorized access encompassing 34 percent of all attacks.
Phishing attacks grow in sophistication to evade defenses
Despite businesses investing in next-gen technologies, phishing threats continue to become more sophisticated and effective according to a new report.
The study from intelligent phishing defense company Cofense shows how threat actors, armed with an ever-growing arsenal of tactics and techniques, continue to tweak their campaigns and enhance their capacity to deliver malware, ultimately getting more messages past perimeter controls to user inboxes.
81 percent of SMEs think AI is crucial to cyber security
New research from threat detection specialist Senseon looking at the state of cyber security in SMEs reveals increasing uncertainty about whether the investment into the security solutions they’re currently using is worth the cost.
The survey also reveals that SMEs have been slow to implement AI solutions, despite the vast majority of SMEs surveyed (81 percent) thinking that AI will be fundamental to the future of cyber security.
Staff break IT rules in order to do their jobs with management the worst offenders
A new survey of more than 3,000 people around the world finds 46 percent of employees access personal documents on their work device without the IT department's permission.
The study from Snow Software also shows 41 percent of global employees are going behind IT's back to get professional software and applications.
Why digital transformation must be optimized for speed and success [Q&A]
Companies worldwide across all industries are enacting digital transformation (DX) initiatives -- and for good reason. If completed successfully, modern technology implementation drives competitive advantage and makes business operations much more real-time.
However, the journey to the DX finish line is unfortunately sometimes much more of sprint than a marathon, as speed is the currency for organizations to complete the process.
New tool allows files to be encrypted and shared wherever they’re stored
One of the best ways of preventing sensitive files from falling into the wrong hands is to encrypt them, but the process of encrypting and decrypting can be a chore, especially if you want to share the information.
VPN service NordVPN is set to launch its own NordLocker security tool, designed to safeguard files whether they are stored locally or in the public cloud, and make them easy to share.
More than 70 percent of consumers fear becoming ID theft victims
The more the internet has become essential to our daily lives, the more people are waking up to the threats that it poses to their safety.
In a new study by F-Secure, 71 percent of respondents say they feel that they will become a victim of cybercrime or identity theft, while 73 percent express similar fears about their children.
Identity and access management proving too difficult for many businesses
According to a new study, businesses find identity and access management (IAM) and privileged access management (PAM) among their most difficult operational tasks.
The survey, by access management firm One Identity, of 200 attendees to the 2019 RSA Conference, finds that while a third of respondents say PAM is the most difficult operational task, only 16 percent of respondents cite implementing adequate IAM practices as a top-three concern when it comes to securing the cloud.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.