Why machines protecting themselves is the future of cybersecurity

Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves.

Any nation's digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal and advanced persistent threat (APT) groups are attempting to capitalise on the...

Q&A, Simon Cuthbert, Tenfold: On the problem of over-privilege and IAM best practices

To misquote Benjamin Franklin, in this world nothing can be certain except death, taxes, and security being the biggest concern for cloud migration. Flexera's most recent State of the Cloud report last month laid it bare; more than four in five (81%) enterprises said security was the main challenge, ahead of managing spend and governance.

The latter two areas are, naturally, also linked to security. But as cloud workloads become increasingly complex, and as multi-cloud moves from...

Three reasons to perform your cloud security risk assessment ASAP

The unprecedented shock to world markets in the wake of the COVID-19 pandemic will likely permanently change the way we work. Millions must work from home, and businesses are scrambling to find ways to maintain productivity.

The shift to utilising a completely remote workforce has been relatively seamless for some companies and utterly chaotic for others. Adding to the chaos, cybercriminals are targeting organisations of all types with coronavirus-related phishing campaigns and...

Q&A, Alex Giordmaina, Giotech: How to get remote working right amid Covid-19

The lockdown enforced in many countries due to the coronavirus crisis has led to businesses - some of whom in an impromptu fashion - implementing remote working and working from home policies.

As this publication has previously explored, this has resulted in a test of organisations' infrastructure. While there have been issues raised - particularly in terms of the consequences in enabling employees to do work wherever, whenever - analysts and execs have noted how a more positive...

Chris Burtenshaw, Strata Security: On cloud and IT complexity – and keeping off the front page

Editor's note: Strata Security is hosting a webinar on June 11 exploring how to maximise infosec efficiency post-Covid-19. You can find out more about it and register here.

Times may change, but standards must remain. Or, rather, technologies may change but user behaviour remains. Shadow IT has been in place at many organisations long before the launch of the smartphone, and attempts to take control of it, from the clunkily-named bring your own PC (BYO PC), to the more streamlined...

DivvyCloud: On automation, bill shock, and a three-point cloud security plan for Covid-19

Cloud and cybersecurity disaster stories are commonplace in the industry and among the journalists who cover it. While they may have the whiff of tabloid which makes them irresistible to the media - look who's been caught with their pants down now - the problem is that they keep happening.

Take Marriott International as a recent example. The company reported a major data breach on March 31, which according to reports leaked the information of more than five...

Enterprises need cloud for innovation but security and automation gap remains, says report

The gap between the haves and have nots when it comes to enterprise cloud implementation continues to be ploughed: according to a new study from security provider DivvyCloud, less than half of enterprises polled are equipped to operate in the cloud securely.

The 2020 State of Enterprise Cloud Adoption and Security report, which polled around 2,000 IT professionals, found that while 85% of enterprise organisations believe cloud adoption is necessary for innovation, only two in five...

Marriott reported another data breach: Why cyber risk assessment is important

Marriott International — the multinational hospitality company behind the third-largest hotel brand in the world — reported a major data breach on March 31 2020, marking its second major data breach in the last two years. This data breach is expected to leak the information of 5.2 million guests worldwide.

“Marriott said Tuesday approximately 5.2 million guests worldwide may have been affected. The information taken may have included names, addresses, phone numbers,...

AWS makes Amazon Detective generally available for greater security awareness

Amazon Web Services (AWS) has announced the general availability of Amazon Detective, a new offering which aims to help customers remediate security issues across their AWS workloads more easily.

Amazon Detective, which was launched in preview at re:Invent last year, automatically collects log data from a customer's resources and uses machine learning and statistical analysis to build interactive visualisations which customers can use to deduce security...

Realising the impact of unsecured container deployments: A guide

A recently published report by StackRox on the state of containers and Kubernetes security has revealed the statistics related to security concerns in data centres with containerised workloads. 94% of respondents out of 540 IT and security professionals who participated in the survey had experienced security incidents in the last 12 months. Misconfigurations and human errors were the primary issues which came out of the survey.