Cryptojacking moves to the top of cyber criminals’ toolkit, says Symantec

As the ransomware market becomes ever more overpriced and overcrowded, cryptojacking is fast becoming the method du jour for cyber criminals, according to Symantec.

The findings, in the latest volume of the company’s Internet Security Threat Report (ISTR), argues this represents a personal threat to both cyber and personal security. Over the past year, the enormous increase in the value of cryptocurrencies has led to a cryptojacking ‘gold rush’; in 2017, the detections of coinminers on...

By Enterprise CIO, 26 March 2018, 0 comments. Categories: Data & Analytics, Malware, Security.

VMware boosts Workspace ONE features with greater security and automation

VMware has added new features around its Workspace ONE platform to include data-driven intelligence and predictive security.

The new features include Workspace ONE Intelligence, a cloud-based service which integrates with the main platform to aggregate users, apps, networks and endpoint data, as well as the Workspace ONE Trust Network, which combines the security of the primary platform with best practices from featured partners. The seven companies combining with VMware on this are Carbon Black, CrowdStrike,...

By James Bourne, 23 March 2018, 0 comments. Categories: App Platforms, Data & Analytics, Enterprise Mobility, Security.

Why C-suite expertise does not always translate to InfoSec awareness

Their experience and judgement has led C-suite executives to the head of their organisations – yet according to new research from Bitdefender, these employees are most likely to expose the company to a major cyberattack.

According to the study, which polled 250 CIOs, CISOs and CSOs, more than two in five (41%) perceive their C-suite colleagues as InfoSec averse. A similar number (42%) say they are most concerned with a loss of customer and stakeholder trust with data breaches, while more than a quarter...

By James Bourne, 20 March 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employees, Security.

Why enterprises are losing by default to cybercriminals

In sport, if one team does not have enough players to field a team they lose by default. This is the easiest way to win for the victorious party. Not a drop of sweat was produced and there was no risk of injury or embarrassment. The only thing the victors had to do was show up and they get to take home the trophy.

On the other side, this is also the most disappointing loss for the losing party. No matter what their reason is for not showing up, they still...

By Alastair Hartrup, 13 March 2018, 0 comments. Categories: CIO, Security.

Why cryptocurrency is the newest DDoS battlefield

It is hard to pretend that cryptocurrency is still a niche fad. In January, James Altucher, entrepreneur and editor of the Altucher report, predicted to CNBC that cryptocurrencies will replace some or all paper money in the long run. He believes enterprises will eventually adopt the Bitcoin as the cryptocurrency begins to rise to prominence. And it’s not just finance and tech getting in on the cryptocurrency boom. Celebrities such as 50 Cent revealed recently that he had $7 million in Bitcoin that he...

By Ronald Sens, 05 March 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

A guide: How to better manage your personal information

Today, information is being collected at a rapid pace. If you don't take the right steps to protect your information, you could suffer from a breach that would endanger your private banking and other personal information. Therefore, you need to manage it with the right tools and strategies. But this can seem overwhelming at first.

Luckily, it doesn't have to be. If you use the advice below you can have peace of mind and be efficient while using your information in the best way possible.

IT

The first...

By Rick Delgado, 20 February 2018, 0 comments. Categories: Big Data, CIO, Employees, Security.

Gartner identifies seven steps to bring down risk of security threats from Spectre and Meltdown

It is beneficial for leaders in the security and risk management field to adopt a pragmatic and risk-based approach to deal with the ongoing security threats posed by the "Spectre" and "Meltdown” vulnerabilities, according to Gartner.

Gartner identifies seven steps that security and risk heads can follow to bring down the risks associated with security threats.

Almost all modern IT systems are at risk of security threats so all desktops, mobiles, servers, virtual machines, IoT devices and...

By Enterprise CIO, 16 February 2018, 0 comments. Categories: CIO, Privacy, Security.

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options – but 37.3% opted for...

By James Bourne, 08 February 2018, 0 comments. Categories: Authentication, Employee Education, Employees, Identity, Security.

MobileIron and Google Cloud partner on enterprise cloud services for operators

Enterprise mobility management (EMM) provider MobileIron and Google Cloud have announced they are to collaborate on a new end-to-end platform for enterprise cloud services.

The two companies will combine Orbitera, a cloud commerce platform which Google Cloud acquired in 2016, with MobileIron’s app distribution, security, and analytics. The proposed result will be aimed at operators and enterprises, with potential features including customised bundles and customised branding.

As MobileIron sees it, the...

By James Bourne, 30 January 2018, 0 comments. Categories: Enterprise Mobility, Marketing, Security.

Latest Okta report showcases increased enterprise need for security apps and tools

The latest Businesses @ Work report from identity management provider Okta has revealed many of the fastest growing apps in the enterprise are based around security – and suggests that GDPR may be behind the renewed push.

Of the 15 fastest growing apps in the Okta network last year, seven were based around security. These were, in order of popularity, Jamf, KnowBe4, Cisco Umbrella, DigiCert, Sophos, Mimecast and CloudFlare.

Writing in an official company blog, Okta CEO Todd McKinnon argues that the...

By James Bourne, 24 January 2018, 0 comments. Categories: Applications, Enterprise Mobility, Security.