Home > RSS Feeds > Security
  • The recent ransomware attack on an Austrian Hotel's room key system may have served as a wake-up call about the expanding risks introduced by the internet of things, but, as they say in show business, "You ain't seen nothing yet!" The emergence of IoT botnets has made fighting cyber-criminals even more difficult. An endless array of devices, many of which are equipped with little or no on-board security, can now be exploited to overwhelm targets with larger, more frequent attacks. Such is one of the key findings of "Arbor Networks' 12th annual Worldwide Infrastructure Security Report." "The survey respondents have grown accustomed to a constantly evolving threat environment, with steady increases in attack size and complexity over the past decade," said Darren Anstee, Arbor's chief security technologist. "However, IoT botnets are a game-changer because of the numbers involved. There are billions of these devices deployed, and they are being easily weaponized to launch massive attacks." Nearly two-thirds of the 356 network and security professionals Arbor surveyed represent service providers, while the rest are from companies in the enterprise, government and education segments.

  • The state's 14 agencies needed a way to track and secure all devices accessing the network. They deployed a system that provided continuous endpoint protection.

  • A Disaster Recovery as a Service solution safeguards the Wilson Center's data from threats, while offering flexibility, cost savings and peace of mind.

  • Many connected products have weak security and controls, and that creates points of weakness in a user’s critical private networks, systems and data.

  • Online security is full of holes, according to a recent survey of 9,000 consumers in the United States and 10 other countries. Most consumers who are active online—nearly six out of 10— believe they will be a victim of a data breach at some point. In fact, many have already been affected: 21 percent have experienced fraudulent use of their financial information, and 14 percent have experienced identity theft. The "2016 Data Breaches and Customer Loyalty report," conducted by digital security firm Gemalto, shows that survey participants believe most of the responsibility for safeguarding their data lies with the companies involved, but many consumers believe companies don't take that charge seriously. Further, the majority would stop using a business that experienced a breach in which their financial and other sensitive information was stolen, and many would take legal action against the company. Weak security measures could be contributing to the lack of confidence. Many organizations rely solely on passwords to protect user data; far fewer use more stringent measures, such as two-factor authentication and data encryption. "Implementing such advanced protocols and educating consumers about them should show consumers that businesses take the protection of their personal data very seriously," said Jason Hart, CTO, Data Protection at Gemalto. "Failure to do so makes a company vulnerable to repercussions that can potentially ruin a reputation and the company itself." However, the study clearly shows that consumers could do more to help themselves: Though they are conscious of the risk that using online accounts can pose to their personal data, many leave themselves more vulnerable by using the same passwords across multiple accounts.

  • Today's cyber-threats present challenges for even the most tech-savvy IT executives in the most tech-savvy organizations. It's not news that the volume and velocity of threats continue to grow. At the center of the problem? Recruiting and retaining the security talent necessary to mitigate and minimize cyber-risks. The IT security skills gap—which could currently be called a chasm—is growing worse by the day. A January 2017 research study conducted by Osterman Research for information security vendor Trustwave, "Money, Minds and the Masses: A Study of Cybersecurity Resource Limitations," offers insights into industry trends and problem points. Among other things, the research found that a fast-changing threat landscape, high staff turnover and budgeting conflicts are undermining protection strategies. In addition, many business and security leaders feel constrained by a lack of support from senior management. Here are some of the key findings from the study of 147 IT security decision-makers from across North America.