Poor Working Relationships Between Security and Networking Teams Preventing Benefits of Digital Transformation

Poor Working Relationships Between Security and Networking Teams Preventing Benefits of Digital Transformation

Organizations’ digital transformation projects are being held back through lack of collaboration between security and networking teams, according to a new study by Netskope. The survey of IT professionals in the UK, France, and Germany, undertaken by Censuswide on behalf of the cloud security firm, revealed that two key components of IT teams—networking and security—often have a poor working relationship. Despite nearly half (45%) of security and networking teams operating within the same group and…

Read More

Cyber-Attack on Belgian Parliament

Cyber-Attack on Belgian Parliament

A coordinated cyber-attack has been carried out against Belgium’s parliament, scientific institutions, police services, and universities. Internet service provider Belnet, which serves the country’s government agencies, fell victim to what it described as a “large-scale attack” on Tuesday. At around 11:00am CEST, the company was hit by a distributed denial of service (DDoS) attack that overloaded its servers, preventing the availability of online services. Websites with .be domains were impacted. As a result of the hack,…

Read More

Misconfigs and Unpatched Bugs Top Cloud Native Security Incidents

Misconfigs and Unpatched Bugs Top Cloud Native Security Incidents

Over half of organizations have suffered a security incident due to misconfiguration or a known vulnerability in their cloud native applications, according to new research from Snyk. The open source security firm’s first ever State of Cloud Native Application Security Report revealed that adoption of cloud native techniques is soaring, with over 78% of production workloads now deployed as containers or serverless applications. However, this comes with its own risks: 60% of developers have had…

Read More

Global Phishing Campaign Drops New Malware Trio

Global Phishing Campaign Drops New Malware Trio

Security researchers have uncovered a sophisticated global phishing campaign featuring three new malware families, which landed back in December last year. Mandiant observed two waves of the campaign, beginning December 2, targeting nearly 50 organizations around the world. It tracked the financially motivated threat group as UNC2529. “Based on the considerable infrastructure employed, tailored phishing lures and the professionally coded sophistication of the malware, this threat actor appears experienced and well resourced,” the security vendor…

Read More

Shoppers Choose Guest Checkouts Over Security Fears

Shoppers Choose Guest Checkouts Over Security Fears

A quarter (22%) of shoppers use guest checkouts because they’re concerned about handing more personal data over to e-commerce providers, according to a new study. E-commerce search specialist Empathy.co commissioned Censuswide to poll a representative sample of 4000 British consumers to better understand their online preferences. It revealed widespread mistrust of online stores and a desire to gain more control over personal data. Only 13% said they’re not concerned about how their data is used…

Read More

World Password Day: Using passphrases to strengthen security

World Password Day: Using passphrases to strengthen security

Human nature has shown that people re-use passwords, at least for non-work accounts that aren’t requiring quarterly changes. How can it affect your current security that you’ve reused an old password or passphrase from 2012? Surprisingly, quite a lot. Hashed passwords and the plain text equivalent from a breached site can be paired with your then-username. Malicious hackers have compiled lists of these pairs in a dictionary. Many sites use your email address as your…

Read More

When good leaders are poor practitioners

When good leaders are poor practitioners

When good leaders are poor practitioners | 2021-05-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Why security has broken down—and what it means now

Why security has broken down—and what it means now

Why security has broken down—and what it means now | 2021-05-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Ensuring the security of arts, museums and cultural heritage facilities during lockdown and beyond

Ensuring the security of arts, museums and cultural heritage facilities during lockdown and beyond

Ensuring the security of arts, museums and cultural heritage facilities during lockdown and beyond | 2021-05-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Exploitation in the time of COVID

Exploitation in the time of COVID

Exploitation in the time of COVID | 2021-05-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2,292 2,293 2,294 2,295 2,296 2,576