Why 2019 was a ‘dynamic’ year for cybersecurity – and what lies in store for 2020 and beyond

The findings of the Cybersecurity Threat Landscape Report 2019, research prepared using threat intelligence gathered from Subex’s global honeypot network now operational in 62 cities globally, have presented the global trends that have the most significant implications for enterprises, governments, citizens and other stakeholders.

The report highlights rising malware complexity and sophistication,...

Emergencies and cyberattacks: Three common scams you need to watch for

Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is going to do so. Whether you’re dealing with a recession, flood, or pandemic, it’s important to keep an eye out for scams that take advantage of emergencies.

From infected links to PDFs containing viruses, here are three types of scams you’ll likely see during an...

Most organisations still think humans are better than AI in detecting cyberthreats

Almost 60 per cent of respondents polled by WhiteHat Security said they were still more confident in cyberthreat findings verified by humans over those intelligent technologies.

In its latest report, titled “AI and Human Element Security Sentiment Study”, which surveyed 102 industry professionals, WhiteHat Security found over half of the organisations use AI or machine learning in their...

IT superheroes: Treat shadow IT as your sidekick, not your arch nemesis

When you think about your favourite superheroes, there is always an arch-nemesis that proves to be a thorn in the side. Think Batman and the Joker, Spiderman and Venom, Superman and Lex Luthor. For most IT leaders, it’s fair to say that one of the biggest archnemeses comes in the form of shadow IT.

And business leaders tend to agree. In our recent Digital Disconnect Study, 78% of IT and...

Many companies still compromising mobile security to get things done: Verizon study

Four in 10 companies admit they have ‘sacrificed’ mobile security in the past year, according to the latest study from Verizon.

The report, Verizon’s third edition of its Mobile Security Index, found many companies are leaving themselves at risk through lax security plans. 43% of respondents had sacrificed mobile security over the most recent 12 months, with two thirds (66%) of...

How three digital banks have been targeted in account takeover scams – and how to avoid it

Financial services companies have always been primary targets for scammers, with account takeover the ultimate prize. If successful, phishing scams reward attackers with sensitive data they can use for financial gain, identity theft, or brand damage.

With this in mind, Segasec monitored several prominent digital banks between October 17 and November 5. The research uncovered hundreds of dangerous URLs...

Are we doing enough to secure our digital business? Why automation is the answer

To nobody’s shock, security shortcomings exist everywhere. Take senior IT leaders and the customers they serve. These customers believe IT leaders have taken every security precaution possible, yet any knowledgeable IT professional can look at their setup and see gaps. Unfortunately, the disparity between perceived protection and actual exposure also exists at the enterprise level.

Most...

Companies need to disclose their cybersecurity risk to attract investors, study finds

When one company experiences a cybersecurity breach, other companies in the same field become less attractive to investors. Yet new research argues that if organisations are open about their efforts, then a brighter picture emerges.

The research, from the North Carolina State University and involving 120 non-professional investors, found organisations that are open about their cybersecurity risk...

Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives...

Most outages can potentially be avoided, argues IT – yet the business side is pessimistic

Outages, for some, remain the great imponderable for IT and business teams alike. On occasions there is little that can be done about it; Google Cloud, for instance, suffered an outage in August that left affected users with hands tied behind backs for hours. Yet according to a new study, more than half of downtime can be avoidable.

The report from LogicMonitor, which surveyed 300 IT decision makers...