Security News

Untrained and Malicious Users Biggest Cause for Concern Among UK IT Professionals

Following on the success of last year’s global report, KnowBe4 has today released the findings of ‘The 2020 What Keeps You Up at Night Report”. This year, KnowBe4 delves into the issues that specifically trouble UK-based organisations and IT experts, including attack types, security initiatives as well as organisational constraints. An in-depth analysis examined just how prepared these organisations are in managing such cyber threats, risks and concerns.   The report compiled information gathered from...

Read more
Angry employee

A brand-new Insider Threat Report authored by Shareth Ben, director of insider threat and cyber threat analytics at Securonix has found that employees deemed “flight risks” are linked to around 60% of the insider threat incidents detected. Ben explained in the report that flight risks are those employees about to terminate employment with the company for various reasons and can be determined by Securonix’s advanced user behaviour analytics. The Securonix Threat Research Team analysed hundreds...

Read more
wfh

In the span of a couple months, the world as we knew it was turned upside-down. As scientists across the globe conduct experiments in search of the COVID-19 vaccine, the labour market has found itself within its own experiment. That is, the experiment of remote working on a massive scale.   In an effort to slow down the spread of the virus, millions of employees around the world are being told to write their emails, compile their spreadsheets, and hold their meetings from the confines of their dining room...

Read more
One Identity Offers Free Privileged Session Management Capability to Support Critical Infrastructure Providers

As emergency services, public health organisations, utilities and other critical organisations rush to enable as many remote workers as possible, best practices for keeping users secure have understandably become an ongoing challenge. Any organisation relies on privileged IT users to configure systems and perform vital functions so their enterprise stays up and running. If this privileged access is not controlled as it shifts to remote administration, organizations face heightened risk. Un-managed privileged access opens the...

Read more
Woman in grey working from home

Given the current state of uncertainty surrounding the coronavirus and many organizations mandating or recommending that employees work from home, KnowBe4 has a few security recommendations: Be on the lookout for emails or text messages related to COVID-19 and confirm the information directly with the vendor, bank or your boss. If an employee will be using shared equipment that their family also uses at home, ensure that the latest security updates are installed. Conduct a...

Read more
World and data

Jan Karremans, Director of Sales Engineering at EnterpriseDB Disruption has come to the role of the database administrator (DBA). Automation is eating up tasks typically completed by a DBA – and the technology is evolving to become ever smarter, ever more capable. This automation has sparked concern that humans will inevitably become redundant in running databases.  Already, cloud services have threatened to render the role obsolete. Now, with automation infiltrating more and more areas of...

Read more
Robot playing piano

This week’s question: What does automation mean for IT security teams?  What automation primarily means is that teams now have the chance to scale their tasks to meet the needs of the business. Nowadays, given that vulnerabilities are discovered on a daily basis, organisations need tools that can keep track of these weaknesses as these are made public and patches become available.   The great strategic advantage of using an automation tool for vulnerability management is the frequency at which it allows IT...

Read more
Reeses_Peanut_Butter_Cup

With Halloween fast approaching, it’s a great time to discuss some of our favourite things in life: the creation of chocolate peanut butter cups and what these can teach us about phishing. Hard to imagine a time when before the “age of the cup” because there are many that never got to know the delicious glory that accompanies the unification of chocolate and peanut butter. Prior to that time, people walked around in total ignorance...

Read more
Page 1 of 23 1 2 23