Akamai adds automation and machine learning to protect user accounts, APIs and applications

Akamai adds automation and machine learning to protect user accounts, APIs and applications

Edge platform cybersecurity enhancements are intended to increase responsiveness and augment decision-making, the company said. Image: Teera Konakan/Moment/Getty Images Content delivery platform provider Akamai announced Wednesday platform security enhancements intended to increase cybersecurity protections for web applications, APIs and user accounts. Akamai said its machine learning algorithms leverage insights from a dataset of over 1.3 billion daily client interactions to automate threat detections, time-consuming tasks and security logic to help cybersecurity analysts make better decisions…

Read More

Digital convenience leads to lax security habits among users, survey finds

Digital convenience leads to lax security habits among users, survey finds

A new IBM global report examining consumer behaviors finds an average of 15 new online accounts were created and 82% are reusing the same credentials some of the time. Screenshot of IBM’s report on Pandemic Security Side Effects. Image: IBM Not surprisingly, consumers shifted further into digital interactions during COVID-19 and are likely to continue a digital-first mindset post-pandemic, a new IBM report finds.  Based on a survey of more than 20,000 people around the…

Read More

Digital acceleration at Stanley Black & Decker places data at the center

Digital acceleration at Stanley Black & Decker places data at the center

For Stanley Black & Decker, digital technologies are transforming every aspect of the company, from internal operations to customer experience to the products and services themselves. Recently, I spoke with Rhonda Gass, CIO, about her approach to strategy, architecture, and change management as well how her CIO role is evolving now and into the future. What follows is an edited version of our interview. Martha Heller: How is Stanley Black & Decker currently deploying digital…

Read More

The many ways a ransomware attack can hurt your organization

The many ways a ransomware attack can hurt your organization

Loss of revenue, brand and reputation damage, employee layoffs and business closures were some of the effects of a ransomware attack, according to Cybereason. vchal, Getty Images/iStockphoto Ransomware attacks can devastate an organization in obvious ways, most notably by preventing it and its customers or users from accessing critical data and resources. But such an attack can also have longer lasting and far wider consequences. A report released Wednesday by cybersecurity firm Cybereason looks at…

Read More

NHS Test and Trace Bolsters its Cybersecurity

NHS Test and Trace Bolsters its Cybersecurity

NHS Test and Trace has announced that an early-stage UK company will be in charge of managing its supply chain cybersecurity risks. Risk Ledger, which was part of the fourth cohort of the government-backed London Office for Rapid Cybersecurity Advancement (LORCA) program to promote cyber scaleups, will allow NHS Test and Trace to utilize its ‘social network’ platform. The platform will enable organizations to connect and share risk data securely, quickly and easily. This move is particularly…

Read More

Football Fever Undermining Password Security

Football Fever Undermining Password Security

Security experts have urged users to think more carefully about their password choice after spotting as many as one million based on simple football-related words. Authentication firm Authlogics manages a Password Breach Database — a collection of previous stolen or cracked credentials which that allows it to spot trends and offer industry advice. It claimed that of the one billion passwords in the trove, over 1.1 million are linked to the beautiful game. These are led…

Read More

Most Ransomware Victims Hit Again After Paying

Most Ransomware Victims Hit Again After Paying

Some 80% of global organizations that have paid a ransom demand experienced another attack, often at the hands of the same threat actors, according to a new study from Cybereason. The security vendor polled 1,263 cybersecurity professionals in multiple verticals across the US, UK, Spain, Germany, France, the United Arab Emirates, and Singapore to compile its latest report, Ransomware: The True Cost to Business. It confirmed what law enforcers and commentators have been saying for some…

Read More

IoT Supply Chain Bug Hits Millions of Cameras

IoT Supply Chain Bug Hits Millions of Cameras

Security experts have warned of a critical IoT supply chain vulnerability that may affect millions of connected cameras globally, allowing attackers to hijack video streams. Nozomi Networks revealed the flaw in a popular software component from ThroughTek, which OEMs use to manufacture IP cameras, baby and pet monitoring cameras, and robotic and battery devices. The bug itself is found in a P2P SDK produced by the firm. In this case, P2P refers to functionality that…

Read More

What’s new in v8 of the CIS Controls from the Center for Internet Security

What’s new in v8 of the CIS Controls from the Center for Internet Security

Back in 2018, the State of Security spent a lot of time going over v7 of the Center for Internet Security’s Critical Security Controls (CIS Controls). We noted at the time how the Center for Internet Security shuffled the order of requirements for many of the existing controls in that version. It also cleaned up the language of the CIS Controls, simplified some working, removed duplicate requirements, and created an abstract for each of the…

Read More

A New Program for Your Peloton – Whether You Like It or Not | McAfee Blogs

A New Program for Your Peloton – Whether You Like It or Not | McAfee Blogs

Executive Summary  The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers provide safer products for businesses and consumers. As security researchers, something that we always try to establish before looking at a target is what our scope should be. More specifically, we often assume well-vetted technologies like network stacks or the OS layers are sound and instead focus our attention on the application layers or software that is specific to a target. Whether that approach is comprehensive sometimes doesn’t…

Read More
1 2,288 2,289 2,290 2,291 2,292 2,645