One-Third of UK Teachers Do Not Have Cybersecurity Training

One-Third of UK Teachers Do Not Have Cybersecurity Training

Teachers in schools in England are not receiving sufficient cybersecurity training, a new poll has revealed. A third of teachers haven’t completed any in the last academic year, while only 66% of those who did found it useful. These results come from a Teacher Tapp survey of teachers across England from the Office of Qualifications and Examinations Regulation, or Ofqual. It also revealed the prevalence of cyber attacks within the education sector in the U.K….

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The Urgency of Security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

Global Cyber Attacks to Double from 2020 to 2024, Report Finds

Global Cyber Attacks to Double from 2020 to 2024, Report Finds

On the first day of Cybersecurity Awareness Month in the U.S., research has revealed that the number of significant global cyber attacks in 2024 will be double that of 2020. A new report from insurer QBE, Connected Business: digital dependency fuelling risk, predicts that organisations will be hit by 211 disruptive and destructive cyber attacks this year. Disruptive incidents are reversible and only impact data availability, integrity, or access — such as distributed denial-of-service attacks….

Read More

HackerOne: 48% of Security Professionals Believe AI Is Risky

HackerOne: 48% of Security Professionals Believe AI Is Risky

A recent survey of 500 security professionals by HackerOne, a security research platform, found that 48% believe AI poses the most significant security risk to their organization. Among their greatest concerns related to AI include: Leaked training data (35%). Unauthorized usage (33%). The hacking of AI models by outsiders (32%). These fears highlight the urgent need for companies to reassess their AI security strategies before vulnerabilities become real threats. Must-read security coverage AI tends to…

Read More

5 Compelling Reasons Not To Manage Your Own VoIP Server

5 Compelling Reasons Not To Manage Your Own VoIP Server

Voice over Internet Protocol does away with bulky desk phones and tangled wires, but it introduces something you didn’t need before: a VoIP server. It powers all the standard VoIP features, like call forwarding, recording, and voicemail, plus advanced tools, like call queues, interactive voice response, and integrations. In other words, you can’t use a VoIP system without a VoIP server. You can manage the server yourself, which is not recommended for most, or leave…

Read More

Security Leaders Consider Banning AI-Generated Code

Security Leaders Consider Banning AI-Generated Code

One of the most-touted benefits of the proliferation of artificial intelligence is how it can assist developers with menial tasks. However, new research shows that security leaders are not entirely on board, with 63% contemplating banning the use of AI in coding due to the risks it imposes. An even larger proportion, 92%, of the decision-makers surveyed are concerned about the use of AI-generated code in their organisation. Their main concerns all relate to the…

Read More

Email Attacks a Problem for National Infrastructure Companies

Email Attacks a Problem for National Infrastructure Companies

Cyber attackers are repeatedly using malicious emails to infiltrate critical national infrastructure. Up to 80% of CNI companies experienced an email-related security breach in the last year, according to a new report from security solution provider OPSWAT. Compromising CNI, like utilities, transport, telecommunications, and now data centres, can lead to widespread disruption, making it a prime target for cyber attacks. A recent report from Malwarebytes found that the services industry is the worst affected by…

Read More

Three Quarters of Dependency Vulnerability Patches Lead to Breakages, Report Finds

Three Quarters of Dependency Vulnerability Patches Lead to Breakages, Report Finds

Patches deployed for dependency vulnerabilities cause breakages 75% of the time, a new report has revealed. Minor updates were found to break clients 94% of the time, and for version upgrades this was 95%. Software dependencies — the external code or libraries that a project requires to function properly — are notoriously difficult to manage during application development. Remediating vulnerabilities in dependencies requires a major version update 24% of the time. “Seemingly the most straight-forward…

Read More

Patch Tuesday: Microsoft Catches Four Zero-Day Vulnerabilities

Patch Tuesday: Microsoft Catches Four Zero-Day Vulnerabilities

Every second Tuesday of the month, Microsoft releases a bundle of fixes for Windows. This Tuesday brings four zero-day vulnerabilities, two high-criticality vulnerabilities, and some sister patches from Adobe. On Patch Tuesday, which Microsoft calls “Update Tuesday,” other large software companies like Adobe release major security fixes. It’s a time to launch updates across corporate networks, and it occurs during mid-morning Pacific Standard Time to keep admins and users from having to scramble at the…

Read More

Most Tech Leaders Worry About SaaS Security Threats

Most Tech Leaders Worry About SaaS Security Threats

Software-as-a-Service applications have long been targets of cyberthreats. A new study finds that these threats remain top of mind for 78% of U.S. technology leaders as more SaaS apps find their way into the enterprise. Although enterprises have been prioritizing data privacy and security, their continued reliance on SaaS and cloud offerings means they remain at risk, according to the The SaaS Disruption Report: Security & Data by Onymos and Enterprise Strategy Group. Shiva Nathan,…

Read More
1 2 3 4 5 15