SentinelOne raises $120 million in Series D funding to automate enterprise endpoint security

California-based endpoint security software provider SentinelOne has raised $120 million (£94m) in a recently conducted Series D round led by Insight Partners.

Samsung Venture Investment Corporation, Third Point Ventures, Redpoint Ventures, NextEquity, Data Collective, and other firms also participated in the funding round.

SentinelOne offers security services to companies...

By Enterprise CIO, 07 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

The big enterprise security problem posed by small – or at least smaller – businesses

As the threat level grows and diversifies, global enterprises continue to make cybersecurity a top priority. As they should: high-profile attacks continue to wreak havoc on major brands—with Humana and Marriott among the most notable recent victims. One silver lining in the continued fight is that the pervasiveness of threats has elevated cybersecurity from an IT problem to a board-level issue.

In fact, according to

It’s not me, but it is probably you: How IT still views employees with contempt on cybersecurity

A new report from software as a service (SaaS) operations management and security platform BetterCloud begins with a blunt message. “While cybercriminals, hacktivists and ransomware often make a big splash in the news headlines, the reality is that the biggest security threat is often right in front of you.”

According to the study, which featured survey data from 500 IT professionals, the ‘well-meaning but...

By James Bourne, 03 April 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

Not if, but when: The value of cybersecurity awareness

For businesses, a cyber-attack is not a matter of “if” but “when”. Every business is at risk of a cyber-attack. In 2018 alone, cyber-attacks on organisations cost the UK economy tens of billions of pounds, with 7 out of 10 companies falling victim to a cyber-attack or breach.

According to the 2017 Data Breach Investigations Report, more than

By Vinaya Sheshadri, 26 March 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

CXOs increasingly suspicious of employees when it comes to data breaches

When a data breach occurs – and unfortunately today it is a question of when rather than if – then looking for the responsible party and safeguarding against future events is a matter of course. Yet according to new data from security provider Egress, the C-suite differs from their employees in terms of who is to blame.

The study, which polled more than 250 CXO executives and 2000 employees across the UK and US,...

By James Bourne, 25 March 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.

Key tips for SMEs and encryption: Ease of use and accessibility vital – but don’t skimp on security

Becrypt has been in the disk encryption business for more than 15 years and has carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms.

Based on...

By Bernard Parsons, 22 January 2019, 0 comments. Categories: Data & Analytics, Data Loss, Design, Employees, Security.

Four things every CEO needs to know about ransomware

It’s hard to read the news at the moment without ransomware being mentioned. For example, I typed “ransomware” into Google News recently and got more than one million hits in 0.23 seconds. Even when I limited my search to the past 24 hours it returned more than six pages of links. Therefore, with so many experts writing things that are sufficiently interesting or important to feature as “news” — why has the problem not yet been...

By Dr. Sandra Bell, 21 January 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Malware, Security.

New guidelines aim to help healthcare CIOs with cybersecurity initiatives

CIOs in healthcare will without exception have cybersecurity as one of their primary focus areas for 2019 – if not their biggest priority. To help in this quest, the Department of Health and Human Services (HHS) has published a checklist of security best practices to help ensure a ‘holistic view of the intersection between cybersecurity and healthcare’, in the organisation’s own words.

The

By James Bourne, 07 January 2019, 0 comments. Categories: CIO, Data Loss, Security.

Commoditising cybercrime: The rise of ransomware-as-a-service

Recent years have seen a growing number of high-profile ransomware attacks such as WannaCry hit the headlines for their ability to hijack a huge number of computers in a short space of time and extort victims into paying ransoms in order to get their information back. In the case of WannaCry, over 200,000 computers were infected across 150 countries in just four days, with the ransoms being demanded ranging from $300-$600 per computer. Estimates put the...

By Naaman Hart, 21 November 2018, 0 comments. Categories: Data Loss, Malware, Security.

The real deal on cybercrime, breach timelines, and mounting a proactive defence

Here’s something that may seem obvious but is more true today than ever: Organisations that take security breaches seriously (which should be all of them) can’t afford to sit back and take a reactive approach to their defensive strategy. Although a considerable amount of damage can be done in a shockingly short period of time, simple proactive steps can often thwart cybercriminals and defend organisations against a wide variety of attacks.

By Ted Ross, 19 November 2018, 0 comments. Categories: CIO, Data Loss, Malware, Security.

Get to grips with DevSecOps – and address security flaws much more quickly

The number of vulnerable applications in an organisation’s ecosystem remains at a ‘staggeringly high’ level according to new research – but putting DevSecOps practices into action appear to have some benefits.

That’s according to a report from CA Veracode. The latest State of Software Security report – CA Technologies having acquired Veracode last year – gives a ‘promising’...

By James Bourne, 26 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Productivity, Security.

Four cybersecurity challenges that critical infrastructures are facing

Earlier this year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a joint alert, warning that the Russian Government had carried out an attack...

By Anthony Perridge, 16 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

New research shows importance of visibility in mobile device strategy

A lack of visibility into devices and networks is putting businesses at risk of cyberattacks, according to a new report.

The study, put together by Enterprise Mobility Exchange and NetMotion Software and which polled more than 130 respondents at organisations with corporately owned mobile devices, explored employees' relationships with their devices and networks.

Almost half of mobile workers polled said they spent the majority of their working time connected to non-corporate public Wi-Fi and carrier...

By James Bourne, 15 October 2018, 0 comments. Categories: Data Loss, Employees, Enterprise Mobility, Research, Security.

Deflecting DDoS: Key tactics in the battle against IoT-powered attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline.

The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia, claimed responsibility...

By Ronald Sens, 03 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Mobile, Security.

Enterprises are finding open source so alluring that vulnerabilities are less important

The Equifax data breach of 2017 was a bad one. Just how bad it ended up being was only revealed in May this year. This isn’t for the faint of heart: 209,000 payment cards, 99 million addresses, and more than 146 million people affected.

Yet these revelations have had little effect on organisations using vulnerable open source software. According to the latest State of the Software Supply Chain report from Sonatype, the...

By James Bourne, 27 September 2018, 0 comments. Categories: Applications, Data & Analytics, Data Loss, Privacy.

Building trust in a ‘zero trust’ environment: A more dynamic security model

Today’s working environments are no longer governed by the perimeters and boundaries they once were.  As a result, security threats have multiplied and the pressure on IT teams to protect data has increased rapidly. Modern work happens in a mobile-cloud environment outside traditional security controls, and from the perspective of those controls it’s a zero trust environment.

As attacks become more sophisticated, security professionals are forced to reconsider the best practices on which...

By Ojas Rege, 17 September 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.