Automation releases us from our false sense of SAP security
When it comes to the protection of our most vital devices and systems, we could be forgiven for being lulled into a false sense of security. After all, the Apples and Microsofts of this world come to us, not even when there’s a problem, but just to check-in. To update us. To add that layer of reassurance even when our …
Tovább a bejegyzéshez
Most firms think they’ll be hit by a security attack this year
Most organizations suffered a cyberattack in 2020, and many executives have come to believe that suffering multiple attacks a year is inevitable. This is according to a new report from cybersecurity experts at Proofpoint, which polled 150 Chief Information Security Officers (CISO) and Chief Security Officers (CSO) on their organizations’ cyber-preparedness. More than half (53 percent) suffered at least one …
Tovább a bejegyzéshez
Security concerns ‘biggest barrier’ to public cloud adoption
Among the businesses that are yet to adopt public cloud, the majority (58 percent) are holding off due to cybersecurity concerns. This is according to a new report from Centrify, based on a poll of 200 UK business decision makers, which also states that more than a third of public cloud adopters are less than 80 percent confident in its …
Tovább a bejegyzéshez
Most security staff have little say in app security
Security staff in global businesses don’t have much of an influence when it comes to budgeting and developing secure applications, according to a new report from cybersecurity firm Radware. As a result, businesses are having a hard time maintaining consistent application security across multiple platforms and API security is now the biggest threat to enterprises, the report claims. Polling 205 …
Tovább a bejegyzéshez
More than half of organizations that store customer data in the cloud had security incidents in 2020
Of all the companies storing customer data in the cloud, more than half (54 percent) suffered a security incident last year. This is according to a new report from Netwrix, which states that most businesses (62 percent) are contemplating removing sensitive data from the cloud as a result. Some have already done so, it was added. Data theft scenarios are …
Tovább a bejegyzéshez
Cybercriminals are using security tools to facilitate attacks
Some of the world’s most popular penetration testing tools have been compromised and used to host malware, as well as command and control (C&C) servers, experts are saying. A new report from threat intelligence firm Recorded Future claims that two tools used to simulate an attacker’s action, Cobalt Strike and Metasploit, have been used for hosting malware C&C servers, the …
Tovább a bejegyzéshez
How to prevent the security risks of a remote workforce
The outbreak of Covid-19 has completely shifted how companies operate. Organizations have had to quickly adapt and implement new work-from-home policies to keep their employees safe and productive. While remote working comes with flexibility and better work-life balance, it also poses several IT security challenges. With a significant number of employees in the UK working from home, it makes company …
Tovább a bejegyzéshez
The future of telecom security: Opportunities and challenges
Today’s communication networks power economies, revolutionise societies, empower businesses and are vital for future nation growth. But these networks are also constantly exposed to persistent and complex cyber threats from a wide variety of vectors. As such, and quite rightly, they have been classified as critical national infrastructure of a national security concern. The creation of the ‘High Risk Vendor’ …
Tovább a bejegyzéshez
Public sector businesses could be facing serious legacy security issues
Applications used by public sector organizations contain more flaws than those used by private sector firms, which significantly increases the chances an attack might expose sensitive data. This is according to a new report from application security testing company Veracode, which claims that four in five apps used in the public sector have at least one flaw. The problem, according …
Tovább a bejegyzéshez
Why you don’t have to trade agility or collaboration for data security
Bad actors thrive in chaos. Email scammers taking advantage of Covid-19, have heard this message clearly: large scale uncertainty and mass digital change is fertile ground for those looking to exploit others. Never has there been a more uncertain time for workers than earlier this year, as the pandemic swept the globe and businesses had to move to digital-first approaches …
Tovább a bejegyzéshez