Survey: IT security pros embrace — but fear — artificial intelligence

AI-at-laptop-keyboard

Roughly seven out of eight IT security professionals believe artificial intelligence (AI) would help improve enterprise security, according to a recent survey. But nearly as many respondents are worried about AI being weaponized against their networks. “There is much concern about the impact of AI on company security defenses and about attackers using AI against […]

Protecting the enterprise from consumer-grade IoT devices

twisted-spiked-wrought-iron-fence

Enterprise IT leaders face many challenges trying to implement Internet of Things (IoT) technology into their networks. But they are challenges that cannot be averted or deferred, for the number of installed IoT devices worldwide is expected to more than triple to 75.4 billion in 2025 from 23.1 in 2018. In addition to integrating and managing […]

Meltdown and Spectre bring a world of hurt to the cloud

thunderstorm

Meltdown and Spectre represent a new class of security problem and the cloud — based as it is  on virtual machines — is uniquely vulnerable. The good news is patches are either already in place or coming soon to all major cloud platforms and server operating systems. The bad news is that your data may […]

The dangers of stealth AI in the enterprise

stealth-bomber

All new technologies bring with them new and sometimes unique security concerns. And while some of these concerns can be overblown by security vendors (and, let’s face it, tech writers), a couple of recent news items regarding artificial intelligence (AI) raise some genuinely frightening prospects for enterprise IT security pros and enterprise employees. Item No. […]

When it comes to digital security, millennials are slackers (but so are boomers)

unlocked-gate

Data from a survey of nearly 800 employed U.S. adults makes clear what enterprise IT security professionals have always known: Humans — of all ages! — are the single biggest security vulnerability in any enterprise. Conducted by payment technology solutions vendor First Data, the survey aimed to assess the cybersecurity awareness of different age groups among […]

The three realities of ICT security all senior executives must accept

My colleagues and I are often asked by senior executives how they can make sure their organisation’s data is secure from loss. Security professionals know better than to ask, but they sometimes place false trust in tools that promise greater visibility or better defences. They also often ask us how they can make better sense […]

When your personal digital assistant is a spy

It won’t be long before many or even most of our daily activities in and out of work will be conducted with the help of personal digital assistants (PDAs) such as Alexa, Cortana, Google or Siri. From checking daily appointments to sending messages to capturing personal and professional epiphanies, these PDAs promise to be the […]

Study: 40% of used devices contain personal info

Here’s a new data point for IT professionals to ponder during their sleepless nights: 40% of electronic devices sold in publicly available resale channels contain Personally Identifiable Information (PII). A study by the National Association for Information Destruction (NAID) analyzed hard drives, mobile phones and tablets. “While there have been similar studies over the past decade, […]

Wishful thinking is not a mobile security strategy

Fear is a gift. Sure, it can generate anxiety and discomfort, but fear is a gift because it has the power to motivate changes in behavior that can improve our well-being. We probably all know someone who has redesigned his or her diet and lifestyle after a big health scare. There are endless other examples of fear-based behavior modification, […]

Protect your business by orchestrating and automating security operations

Organizations today face an unprecedented number of security threats, and the risks will only increase as employees, customers and partners embrace new trends and innovations on their road to digital transformation. These changing and growing threats mean that traditional security methods – techniques that defend the enterprise with moats and walls and monitor for things […]