Monday , 15 October 2018
Home » Tag Archives: Technology (page 30)

Tag Archives: Technology

Bitglass 2018 Report: Cloud Security Adoption Trails Cloud Usage, Leaving Two Thirds of Organizations Vulnerable

Bitglass, the Next-Gen CASB company, today released the 2018 Cloud Adoption Report, its fourth such study, which examines cloud adoption in more than 135,000 organizations around the globe. The report corroborates what is now broadly apparent –  the flexibility, productivity and cost savings benefits of cloud apps have fueled widespread adoption in every industry. Surprisingly, the report finds that the ... Read More »

Is the C-suite exempt from cyber-crime anxiety?

Greg Sim, CEO,
Glasswall Solutions

If recent cyber-attacks are anything to go by, cyber-criminals are capable of causing colossal damage to organisations of all sizes. With vital public services such as the NHS succumbing to attacks, it seems that nothing is off the table when it comes down to cyber-criminals deciding who to target. However, according to some reports, the C-suite isn’t sweating over the ... Read More »

Solving the problem of insider threats to enterprise cybersecurity

Ronald Sens, EMEA Director,
A10 Networks

There are many threats to enterprise cyber security with most coming from external threat actors. One of the most overlooked threats that companies are not safe from is insider threats. Security professionals are constantly being warned about insider threats and in A10 Networks AIR report earlier this year almost half (48 percent) of IT leaders say they agree or strongly ... Read More »

CryptON Ransomware used to hack remote desktop services

A new and active campaign for the CryptON Ransomware is currently underway where attackers are hacking into computers with Internet accessible Remote Desktop Services. Once the attackers gain access to the computer they manually execute the ransomware and encrypt your files. This new campaign was first discovered by Malwarebytes security researcher S!Ri who posted about it on Twitter. View Full ... Read More »

WordPress sites targeted by hackers installing backdoored plugins

Hackers have come up with a never-before-seen method of installing backdoored plugins on websites running the open-source WordPress CMS, and this new technique relies on using weakly protected accounts and the Jetpack plugin. The technique is highly complex, and to compromise a site, a hacker must go through different steps, during which multiple things can prevent the attack from ... Read More »

Cryptocurrency Verge (XVG) hit by DDOS attack

Verge (XVG), a cryptocurrency designed for everyday use and an improvement upon the original Bitcoin blockchain, is currently experiencing a DDOS cyber-attack. The company confirmed this with a statement on Twitter, “It appears some mining pools are under ddos attack, and we are experiencing a delay in our blocks, we are working to resolve this.” Ocminer on a BitcoinTalk forum ... Read More »

VPNFilter compromising 500,000 routers

A newly-disclosed malware infection has compromised more than 500,000 home and small office routers and NAS boxes. Researchers with Cisco Talos say the malware, dubbed VPNFilter, has been spreading around the globe, but appears to primarily be largely targeting machines in the Ukraine. “Both the scale and the capability of this operation are concerning,” Talos writes in its alert. View ... Read More »

CISO Chat – Shaan Mulchandani, Chief Global Security Strategy Officer at Aricent

Shaan Mulchandani, Chief Global Security Strategy Officer at Aricent,

Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of the company and its data. ... Read More »

For enterprise cyber defence, there should be more than one solution

Ronald Sens, EMEA Director,
A10 Networks

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even ... Read More »

The Final GDPR Checks You Mustn’t Forget

Adam Mayer, Technical Product Marketing,

We are now less than 48 hours away from the Europe’s General Data Protection Regulation (GDPR) becoming enforceable on 25 May. And unless you’ve been living under a rock for the last two years, you don’t need me to tell you that this new regulation promises to put power back into the hands of consumers, giving them more control over how their ... Read More »