Biometric Mobile Payments Set to Exceed $1 Trillion by 2027

Biometric Mobile Payments Set to Exceed  Trillion by 2027

The value of biometrically authenticated remote mobile payments will reach an estimated $1.2 trillion globally in five years’ time, up from just $332bn today, according to a new study. Juniper Research evaluates the transition from traditional security like PINs and passwords, to biometric authentication, in its paper, Mobile Payment Biometrics: Key Opportunities, Regional Analysis & Market Forecasts 2022-2027. It claims the use of facial and fingerprint recognition via mobiles will lead to an astonishing 365%…

Read More

What is TOGAF? An enterprise architecture methodology for business

What is TOGAF? An enterprise architecture methodology for business

TOGAF definition The Open Group Architecture Framework (TOGAF) is an enterprise architecture methodology that offers a high-level framework for enterprise software development. TOGAF helps organize the development process through a systematic approach aimed at reducing errors, maintaining timelines, staying on budget, and aligning IT with business units to produce quality results. The Open Group developed TOGAF in 1995, and by 2016, 80% of Global 50 companies and 60% of Fortune 500 companies used the framework. TOGAF…

Read More

VPNs can complement SASE

VPNs can complement SASE

The pandemic has accelerated the development of better ways to serve and secure remote workers, which make it a good time to rexamine VPNS. Recently VPNs have received technical boosts with the addition of protocol options that improve functionality far ahead of where they were when first invented. At the same time, new security architectures zero trust network access (ZTNA), secure access service edge (SASE), and security service edge (SSE) are making inroads into what had…

Read More

Third of UK Firms Have Experienced a Security Breach Since 2020

Third of UK Firms Have Experienced a Security Breach Since 2020

Cyber-threats are behind soaring fraud and economic crime in the UK, where rates are now second only globally to South Africa, according to PwC. The consulting giant’s latest Global Economic Crime Survey revealed that nearly two-thirds (64%) of UK businesses experienced fraud, corruption or other economic/financial crime during the past 24 months, a significant increase on the 56% recorded in 2020, and 50% in 2018. It’s also much higher than the 2022 global average of…

Read More

Linux malware is on the rise—6 types of attacks to look for

Linux malware is on the rise—6 types of attacks to look for

Linux is a coveted target. It is the host operating system for numerous application backends and servers and powers a wide variety of internet of things (IoT) devices. Still, not enough is done to protect the machines running it. “Linux malware has been massively overlooked,” says Giovanni Vigna, senior director of threat intelligence at VMware. “Since most of the cloud hosts run Linux, being able to compromise Linux-based platforms allows the attacker to access an…

Read More

Mobile Threat Volumes Slump 58% in a Year

Mobile Threat Volumes Slump 58% in a Year

The volume of mobile threats detected globally fell by nearly nine million from Q1 2021 to the first three months of 2022, according to new data from Kaspersky. The Russian AV vendor based its analysis on information collected from customer environments over the period. In total, 6,463,414 mobile malware, adware and “riskware” attacks were blocked in the first quarter of 2022, down from over 15 million in Q1 2021. The number of malicious installation packages…

Read More

Protecting Against Bad Chemistry (with Cybersecurity)

Protecting Against Bad Chemistry (with Cybersecurity)

Do you recall one of the first really fun chemistry experiment you performed as a child?  If your school followed the usual curriculum, then you probably made a model volcano and then added some baking soda to the opening, followed by the addition of vinegar.  A variation of this experiment was to add the ingredients to a plastic bottle, then stretch a balloon over the mouth of the bottle to watch the balloon inflate with…

Read More

Tripwire Patch Priority Index for May 2022 | The State of Security

Tripwire Patch Priority Index for May 2022 | The State of Security

Tripwire’s May 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority list this month are 2 remote code execution vulnerabilities for Excel and a security feature bypass vulnerability for Office. Up next are patches that affect components of the Windows operating systems. These patches resolve over 40 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and denial of service vulnerabilities. These vulnerabilities affect…

Read More

Cybersecurity Doesn’t Have to be a Game of Last Man Standing

Cybersecurity Doesn’t Have to be a Game of Last Man Standing

Nor should tackling cybersecurity be a solo mission. Leaning into partnerships and changing where security investments are made may be critical to a more secure future. By John DeSimone, President, Cybersecurity, Intelligence and Services at Raytheon Intelligence & Space We all understand the principles of the game “tag.” One player is “it” and everyone else is left running around to fend for themselves to avoid being tagged. There are no trusted alliances, every person is…

Read More

How The Updated CMMC 2.0 Rule Impacts DoD Contractors

How The Updated CMMC 2.0 Rule Impacts DoD Contractors

What Small Businesses Must Do to Stay Compliant By Dan Clarke, President of Truyo, and Jeff Sizemore, Chief Governance Officer at Egnyte Every year, the Department of Defense (DoD) relies on hundreds of thousands of entrepreneurial businesses to provide critical technologies and innovations that help support the men and women who are working to protect the US. Equally, DoD contracts are often the lifeblood for many of those private-sector businesses. More recently, those companies––known as…

Read More
1 3,069 3,070 3,071 3,072 3,073 4,179