Home > RSS Feeds > Security
  • The majority of IT decision-makers believe that the rise of citizen-developed apps is ushering in a new wave of integration and security issues, according to a recent survey from Appian, "IT & Citizen Developer Tug of War." As a result, many survey respondents said they would like their organization to acquire a new technology platform to enable the governance of citizen development. Specifically, they're convinced that if every citizen developer worked with a single enterprise low-code platform, they wouldn't encounter as many issues as they face today. Their companies would also benefit from greater operational efficiency, agility, compliance and competitive advantage. "Central IT must accelerate its response to digital transformation," said Matt Calkins, co-founder and CEO of Appian. "Low-code development is that accelerator. It also provides the additional benefit of bringing the citizen development movement under the governance of IT to ensure security, data integrity and operational efficiencies are being met." More than 500 IT decision-makers took part in the research, which was conducted by YouGov. 

  • The recent ransomware attack on an Austrian Hotel's room key system may have served as a wake-up call about the expanding risks introduced by the internet of things, but, as they say in show business, "You ain't seen nothing yet!" The emergence of IoT botnets has made fighting cyber-criminals even more difficult. An endless array of devices, many of which are equipped with little or no on-board security, can now be exploited to overwhelm targets with larger, more frequent attacks. Such is one of the key findings of "Arbor Networks' 12th annual Worldwide Infrastructure Security Report." "The survey respondents have grown accustomed to a constantly evolving threat environment, with steady increases in attack size and complexity over the past decade," said Darren Anstee, Arbor's chief security technologist. "However, IoT botnets are a game-changer because of the numbers involved. There are billions of these devices deployed, and they are being easily weaponized to launch massive attacks." Nearly two-thirds of the 356 network and security professionals Arbor surveyed represent service providers, while the rest are from companies in the enterprise, government and education segments.

  • The state's 14 agencies needed a way to track and secure all devices accessing the network. They deployed a system that provided continuous endpoint protection.

  • A Disaster Recovery as a Service solution safeguards the Wilson Center's data from threats, while offering flexibility, cost savings and peace of mind.

  • Many connected products have weak security and controls, and that creates points of weakness in a user’s critical private networks, systems and data.

  • Online security is full of holes, according to a recent survey of 9,000 consumers in the United States and 10 other countries. Most consumers who are active online—nearly six out of 10— believe they will be a victim of a data breach at some point. In fact, many have already been affected: 21 percent have experienced fraudulent use of their financial information, and 14 percent have experienced identity theft. The "2016 Data Breaches and Customer Loyalty report," conducted by digital security firm Gemalto, shows that survey participants believe most of the responsibility for safeguarding their data lies with the companies involved, but many consumers believe companies don't take that charge seriously. Further, the majority would stop using a business that experienced a breach in which their financial and other sensitive information was stolen, and many would take legal action against the company. Weak security measures could be contributing to the lack of confidence. Many organizations rely solely on passwords to protect user data; far fewer use more stringent measures, such as two-factor authentication and data encryption. "Implementing such advanced protocols and educating consumers about them should show consumers that businesses take the protection of their personal data very seriously," said Jason Hart, CTO, Data Protection at Gemalto. "Failure to do so makes a company vulnerable to repercussions that can potentially ruin a reputation and the company itself." However, the study clearly shows that consumers could do more to help themselves: Though they are conscious of the risk that using online accounts can pose to their personal data, many leave themselves more vulnerable by using the same passwords across multiple accounts.