Thursday, July 19, 2018

The 3 riskiest apps found in the enterprise

The Appthority Pulse Report for Q2 2018 found that messaging apps were risky across Android and iOS.

2.3B credentials were stolen in 2017: These industries suffered the most

Shape Security's 2018 Credential Spill Report reveals the severity of data breaches and offers insight to the lifespan of stolen information.

16 popular VPNs leak your data: Here’s the full list

VPNs are becoming increasingly popular due to data privacy concerns, but a new report found that some aren't effective.

Exclusive: New email malware detection can outperform the top 60 antivirus engines

Research from Ben-Gurion University in Israel leverages 100 unique email features to provide a more robust method for detecting malware.

The 10 airports where your phone is most likely to get hacked

Certain US airports contain Wi-Fi network risks that could put your devices and company data in danger, according to a Coronet report.

BetterCloud bolsters G Suite security with rapid risk identification

Activity-Based Alerts for Google Cloud can help enterprises avoid unauthorized access to company data.

Why a bigger security budget won’t prevent an attack: Here’s a better approach

Enterprises must take a risk-based approach to stop cybercriminals, rather than only throwing money at the problem, according to Gartner.

Cybersecurity rundown: The 5 most critical threats to businesses in 2018

Cybersecurity threats aren't just technical, but societal and political too. Here are the top threats to business in 2018, according to AlienVault.

Why cybersecurity incidents are up 32% from last year

A new report from Positive Technologies details the top threats facing businesses in a variety of sectors.

Lenovo: IT pros can ‘laugh at would-be hackers’ with AMD Ryzen-powered ThinkPads

In the wake of Spectre and Meltdown, some organizations are diversifying their technology buys. Lenovo's new Ryzen-powered ThinkPads bring choice to business notebooks.

Office 365 admins: How to mitigate new attack that bypasses 2FA on Windows systems

A new product launched by Proofpoint works to address a novel Office 365 attack vector that works even if single sign on or multi-factor authentication are enabled.

Bizarre mobile attack in India uses MDM to target only 13 phones

A highly targeted campaign against 13 iPhones used an open source mobile device management system to control devices, according to Cisco Talos.

3 ways to reduce IT issues from impacting downtime, security risks, and costs

Tech issues can lead to significant security risks, costs, and time delays. An expert offers IT pros three tips for reducing and possibly eliminating these outcomes.

Despite the security measures you’ve taken, hacking into your network is trivial

Whatever cybersecurity policies and technologies you have implemented, it's not enough. Unauthorized access remains a simple exercise for hackers. A new solution is needed.

Only 20% of companies believe they’re actually GDPR compliant

New research from TrustArc revealed that, though companies are prioritizing GDPR compliance, some 53% are still in the implementation phase.

Why the Best Defense Is a Good Offensive Security Strategy

When many people think about offensive security, they picture a mysterious figure wearing a hoodie, sitting behind a black-and-green terminal, diligently typing away as he probes enterprise networks. But the cybersecurity world has evolved well beyond this Hollywood hacker...

Google hit with $5.1b fine in EU’s Android antitrust case

This could mean the end of free Android. In the meantime, Google plans to appeal.

Privacy Advocates Say Kelsey Smith Act Gives Police Too Much Power

This bill making its way through Congress would allow law enforcement to more easily uncover location data for cell phones from mobile carriers in an emergency.

IDG Contributor Network: Hack like a CISO

I have written several times over the last couple of years about how the role of today’s CISOs have changed and are now more tuned to support business activities and the management of enterprise risk. Serving an organization as...

Cisco patches critical vulnerabilities in Policy Suite

One of the worst security flaws permits attackers to act as root and execute arbitrary code.