July 22, 2019
Via: Security IntelligenceAccording to IDC, Google Android is expected to capture 86.7 percent of the worldwide operating system market by the end of 2019, continuing to show growth from the already eye-popping 85.1 percent reported last year. The popularity of Android lends […]
July 20, 2019
Via: Kelly RedmondEvery headline-grabbing cyberattack unveils new sophisticated hacking techniques, but the attacker’s portrait remains the same: a modern-day professional with a strong sense of curiosity, patience, and social skills that thoroughly examines a company’s systems, takes note of every vulnerability, then […]
July 12, 2019
Via: Help Net SecurityThe increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption management solutions which will help prevent such cyber attacks. Enterprises are implementing BYOD policies and integrating […]
July 10, 2019
Via: Help Net SecurityWorldwide spending on public cloud services and infrastructure will more than double over the 2019-2023 forecast period, according to IDC. With a five-year compound annual growth rate (CAGR) of 22.3%, public cloud spending will grow from $229 billion in 2019 […]
July 2, 2019
Via: Help Net SecurityThe recent FlipBoard breach shines a spotlight again on password security and the need for organizations to be more vigilant. Password storage is a critical area where companies must take steps to ensure they don’t leave themselves and their customer […]
June 27, 2019
Via: Help Net SecurityRansomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and Deutsche Bank have all been hit in recent years, and the […]
June 26, 2019
Via: Help Net SecurityThe growth of fraudulent domains corresponds to the growth of the overall domain landscape, according to Proofpoint. Between Q1 and Q4 2018, registrations of fraudulent domains grew by 11 percent. Nearly all fraudulent domains detected by Proofpoint remain active and […]
June 19, 2019
Via: William PalmerFacial recognition technology is the new gold standard for the modern business world. Although these face-detecting systems have been around for decades, their use has expanded tremendously in a rather short period of time. So much, in fact, that they […]
June 10, 2019
Via: Help Net SecurityRecent research revealed that blockchain is set to become ubiquitous by 2025, entering mainstream business and underpinning supply chains worldwide. This technology is set to provide greater transparency, traceability and immutability, allowing people and organizations to share data without having […]
Cyber-crime, Malware, Network security
June 5, 2019
Via: Help Net SecurityGlobal businesses continue to house ‘dark data’ within their organizations, creating a honeypot for cybercriminals, finds research from Veritas Technologies. The Value of Data study, conducted by Vanson Bourne for Veritas, surveyed 1,500 IT decision makers and data managers across […]
May 27, 2019
Via: Security IntelligenceIBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world. In campaigns observed by X-Force in April and May 2019, the HawkEye malware focused on targeting business users, aiming to infect them with […]
May 24, 2019
Via: Help Net SecurityThe travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security research. Compounding the problem, a new survey conducted by Morning Consult on behalf […]
Mobile security, Network security
May 21, 2019
Via: Security IntelligenceI travel frequently for business — to industry conferences such as RSA Conference and Black Hat and meeting with clients. Whenever I travel, I bring my work laptop, my personal cellphone enabled with work email and calendar, and, of course, […]
Application security, Mobile, Network security, Privacy protection, Security
May 1, 2019
Via: Dark ReadingNew tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy. Microsoft is rolling out a series of new capabilities designed to give businesses greater control over their data privacy practices, help […]
April 19, 2019
Via: Dark ReadingGrowth corresponds with a greater reliance on public cloud services. Businesses are expected to spend $12.6 billion on cloud security tools by 2023, up from $5.6 billion in 2018 and with an especially close focus on public cloud native platform […]
April 16, 2019
Via: Help Net SecurityCloud adoption is gaining momentum, as 36 percent of organizations are currently in the process of migrating to the cloud while close to 20 percent consider themselves to be in the advanced stages of implementation, according to the second annual […]
April 12, 2019
Via: Help Net SecurityHow prepared are organizations when it comes to withstanding and recovering from a cyberattack? The fourth annual benchmark study on Cyber Resilience by IBM Security and the Ponemon Institute showed that 77 percent of them are still do not have […]
Application security, Cloud security
April 9, 2019
Via: Security IntelligenceAs more companies migrate to the cloud and expand their cloud environments, security has become an enormous challenge. Many of the issues stem from the reality that the speed of cloud migration far surpasses security’s ability to keep pace. What’s […]
April 3, 2019
Via: Dark ReadingIt’s definitely a job seeker’s’ market out there in the cybersecurity employment pool. According to an about-to-be released report from ISSA and ESG, 74% of organizations today have been impacted by the cybersecurity skills shortage. Meantime, a report released last […]
March 29, 2019
Via: Security IntelligenceWho doesn’t love new technology, especially when it promises to make tasks easier and improve productivity? That eagerness to add new technology — something IT staff often encourages security leadership to do — has led to the digital transformation, the […]