Ian Barker

Facing the security challenge of quantum computing [Q&A]

Now that we're beginning to overcome the obstacles to creating a commercially viable quantum computer it's important to consider the security threat that these vastly more powerful machines will pose.

Not least of these is the threat to encryption which puts everyone's online security at risk. We spoke to Nils Gerhardt, chief technology officer and head of product for Utimaco, to explore what a post-quantum future may look like.

Continue reading

Cloud and AI expansion lead to data protection challenges

Enterprise IT leaders are grappling with unprecedented challenges in data protection and governance, driven by the rapid adoption of cloud applications and generative AI, according to a new report.

The study from backup and recovery platform Keepit finds that although 70 percent of respondents report that their financial applications are covered by data protection strategies, a significant portion of other key systems and custom applications remain vulnerable.

Continue reading

72 percent of Americans worry about deepfakes influencing elections

New research from identity verification company Jumio finds growing concern among Americans about the political influence AI and deepfakes may have during upcoming elections and how they might influence trust in online media.

The study of over 8,000 adult consumers, split evenly across the UK, US, Singapore and Mexico, finds 72 percent of Americans are worried about the potential for AI and deepfakes to influence upcoming elections in their country.

Continue reading

2024 Paris Olympics -- cybersecurity risks and top tips to keep data safe [Q&A]

In recent years, mobile devices have taken center stage and we've become mobile-first users, where mobile devices are our first choice for how we communicate, navigate, work, bank, take photos, shop and stay informed about the world around us. Our increased reliance on mobile phones is not without its risks.

According to Zimperium's Global Mobile Threat Report 2023, 43 percent of all compromised devices were fully exploited (not jailbroken or rooted), an increase of 187 percent year-over-year, a shocking number.

Continue reading

Workplaces plagued by risky security behavior

Research released by KnowBe4 shows that 75 percent of security professionals have witnessed employees displaying risky security behaviors at work and 62 percent admit to risky behavior themselves.

Top risky things that cybersecurity pros admit to include using entertainment or streaming services (33 percent), using GenAI within the organization (31 percent), sharing personal information (14 percent), using gaming or gambling websites at work (10 percent) and using adult entertainment websites (two percent).

Continue reading

Bad CrowdStrike update causes major outages of Microsoft systems worldwide

You'll doubtless be aware already of the major outages of Microsoft systems today causing problems for airports, rail operators, banks, retailers, broadcasters and more.

Among the disruption stores found themselves unable to accept payments and in the UK Sky News’s breakfast show was taken off air. Some airports were forced to use whiteboards to show flight departure information.

Continue reading

How DevOps teams can get ready to explore DORA [Q&A]

It's essential for businesses to get security, privacy and governance right -- not only to prevent breaches, but also comply with increasing numbers of regulations.

DevOps Research and Assessment (DORA) best practices are the gold standard for spotting vulnerabilities across both cloud and mainframe environments and improving development efficiency.

Continue reading

Enterprise supply chain risks not being addressed

supply chain

Although software supply chain breaches are increasing, a new study from JFrog finds that only 30 percent of respondents identified the need to address vulnerabilities in their software supply chain as a top security concern.

It also uncovers a disconnect between management and developers. 92 percent of executives claim their organizations possess tools to detect malicious open-source packages, while only 70 percent of developers think the same.

Continue reading

Fraudulent transactions increase over 70 percent

Fraud

Fraudulent transactions in the first half of 2024 were up over 73 percent year on year, and suspected fraudulent transactions increased by over 84 percent, according to the 2024 Mid-Year Identity Fraud Review, released today by AuthenticID.

The report also looks at the latest trends including a surge in AI-enabled fraud, as well as the increased use of deepfakes for identity fraud tactics like account takeover attacks and injection attacks.

Continue reading

Why adding a 7 might make your password stronger

Including a number in your password doesn't make it much more secure, does it? If that number is a seven then it just might, according to ProxyScrape.

Strange though it may sound, seven is a rare number in terms of people's preference for it. People naturally gravitate towards using predictable patterns in their passwords. Numbers like 0, 1, and 2 are often overused due to their convenience on both keyboards and number pads. The number 7, however, is less predictable and less frequently used, making it a statistically rare choice.

Continue reading

Attackers defeat SEGs using… SEGs

Email security tools such as Secure Email Gateways (SEGs) often encode URLs that are embedded in emails. This enables the security appliance to scan the URL before the recipient visits the website.

But when SEGs detect URLs in emails that have already been SEG encoded they don't scan the URL. A new report from Cofense reveals that threat actors are making use of this to avoid detection.

Continue reading

Cyberecurity budgets increase as complexity grows

money lock

An overwhelming 91 percent of respondents to a new survey say their security budget is increasing this year, demonstrating a growing recognition of the importance of cybersecurity within organizations.

However, the report from Seemplicity shows organizations report using an average of 38 different security product vendors, suggesting high levels of complexity and fragmentation within their attack surfaces.

Continue reading

The impact of generative AI cybersecurity [Q&A]

Since ChatGPT's launch in 2022, there's been an explosion of speculative use cases for generative AI in the workforce -- and concern from the cybersecurity community over an unproven, unvetted, and potentially powerful new tool.

How have those concerns played out in the real world? We sat down with Nick Hyatt, director of threat intelligence at Blackpoint Cyber, to hear about the reality of generative AI's risk to the modern workplace.

Continue reading

Life sciences sector turns to AI to bridge cybersecurity skills gap

A new survey reveals that 73 percent of life sciences companies are turning to artificial intelligence to address the cybersecurity skills gap.

The report from Code42 shows the life sciences sector is at the forefront of artificial intelligence use, with AI tools presenting new opportunities for cybersecurity teams to enable automated detection and response, as well as freeing up the resources to concentrate on strategic tasks.

Continue reading

Druva adds new threat hunting capability

Data security company Druva is adding to its platform with a new threat hunting capability that empowers IT and security teams to search their global data footprint for indicators of compromise (IOCs).

The company is also announcing the expanded global availability of Managed Data Detection and Response (Managed DDR), a service that uses a combination of technology and human expertise to proactively monitor customer backups for faster detection of and response to threats.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.