Keeping attackers out of the 'atomized network' [Q&A]

As the network as we know it has changed and adversaries are finding success with new attack routes that exploit gaps in defenses.
As enterprise security undergoes a major shift we need to change the way we think about this complex 'atomized network'. We spoke to Martin Roesch, CEO of Netography, to find out about the challenges this presents and how to address them.
Microsoft issues emergency patches for Windows Hyper-V problems

Earlier this month, Microsoft released the KB5021237 and KB5021249 updates which it later confirmed were causing Hyper-V issues for some users.
Now the company has now released a pair of out-of-band patches to address the virtual machine problems. The KB5022553 and KB5022554 updates have been issued as emergency fixes for affected systems.
You should replace Windows 11 with Linux Mint 21.1 on grandma's PC this Christmas

Grandmothers can be great ladies, but let's be honest -- they aren't very good at using computers. It's not their fault though -- they didn't grow up with them. That's why every time you visit grandma for Christmas, she asks you to fix her computer.
If you are sick of removing malware from grandma's PC, there is a simple solution -- install Linux! Yes, by formatting grandma's hard drive and replacing Windows with Linux, she will have the best Christmas ever.
Refurbished vs remanufactured: What's the difference and why does it matter?

Second-hand products have seen a surge in popularity of late as businesses and consumers alike look to save money and live more sustainably. The technology industry hasn’t been without its own mini revolution, seeing refurbished goods flood the market as online marketplaces and new business models disrupt the industry. And this trend is only set to continue with ongoing supply chain issues, the cost-of-living crisis rumbling on and the ever-growing pressures to become more sustainable.
Due to these tensions, finding cost-effective tech that does not drain the planet’s resources can lead you down two paths: Refurbishing or Remanufacturing.
Third-party behaviors increase risk to organizations

A new Third-Party Risk Report from secure enterprise browser tech company Talon Cyber Security focuses on the ways in which third-party workers increase security risks and organizations vulnerable to data breaches.
Talon surveyed 258 third-party workers, including contractors and freelancers, and finds 89 percent work from personal, un-managed devices, which organizations lack visibility into and therefore cannot enforce the enterprise’s security posture on.
Enterprise management undervalues the power of search in digital transformation efforts

A new study from Coveo shows 81 percent of IT and business stakeholders agree that it's hard to engage management when talking about search.
The study of 600 people carried out by Dimensional Research shows 83 percent of respondents say that enterprise search is crucial to digital transformation efforts, but that company leadership rarely talks about it.
A hybrid approach and risks to security -- quantum computing predictions for 2023

Quantum computing holds the promise of much faster processing speeds but is still widely viewed as still being some way in the future as a commercial proposition. It could boost machine learning and AI, and unlock the power of unstructured data.
Of course quantum also comes with security challenges thanks to its potential to crack passwords and break encryption. Here's what industry experts expect to see happening in the quantum world in 2023.
Why IAM alone is no longer sufficient to defend against today's evolving threat landscape

It’s a fact -- today’s businesses are using multiple, fragmented identity management tools to control access; and most are even paying for identity tools that they’re not even using. A recent survey found that 52 percent of organizations manage over 10,000 digital identities and 96 percent of those organizations have multiple identity management tools in place. More doesn’t always mean better protection, as 89 percent of organizations surveyed were still hit by an identity-based cyberattack in the last year.
Identity sprawl is a real thing and it’s an obstacle that is making many organizations more susceptible and more vulnerable to attacks.
Poor website experience makes 60 percent of consumers abandon a purchase

A new survey of 6,000 online shoppers in the US and EU finds that many websites are causing problems for eCommerce companies due to poor design.
The study from Storyblok shows that 42 percent say they decide whether to stay on or leave a website within 10 seconds -- 20 percent within five seconds -- while 60 percent have abandons a purchase because of poor website experience.
Apple fixes Gatekeeper-bypass vulnerability after Microsoft discovers macOS security flaw

A Microsoft security researcher has unearthed a security vulnerability in macOS which has been named Achilles.
Tracked as CVE-2022-42821, Jonathan Bar Or found that the flaw could be used to bypass the Gatekeeper security feature of macOS in order to execute malicious apps. Apple has now fixed the vulnerability in Big Sur, Monterey and Ventura versions of macOS.
Microsoft confirms KB5021233 update is causing 0xc000021a errors and blue screens in Windows 10

The curse of the problematic Windows update strikes again! Following the release of the KB5021233 update for Windows 10 last week, Microsoft has acknowledged that the cumulative security update is causing blue screens for some users.
The company is now investigating the cause the issue that leads to a BSoD (Blue Screen of Death) and a 0xc000021a error. The problem affects Windows 10 versions 20H2, 21H1, 21H2 and 22H2, and Microsoft has a workaround for users to try until a fix is developed.
No more either/or: How a layered, data-centric approach to security removes outdated restrictions

Viewing security as a modern data challenge is something different from simply recognizing the crucial role of data. IT security has always been about gathering, analyzing and acting on data. But modern cloud data challenges are about handling ever increasing amounts of disparate, differently-structured and unstructured data, from a changing mix of dynamic sources.
The challenge is not about battling to handle data overload. But rather, rethinking the underlying data technologies you use at the core of your security platform, so that as more data floods in, it makes your security tighter and more effective.
Hyperscale, cyber vaulting and tougher policies -- storage and data predictions for 2023

Data is increasingly seen as being among and organization’s most valuable assets and businesses are generating more and more of it.
But of course it has to be stored and kept secure. Much of it is in an unstructured form too, which creates additional challenges. We asked some experts in the data and storage field to give us some predictions for this sector in the coming year.
Increasing eCommerce sales place onus on retailers protecting customers from downtime and data breaches

With the annual Christmas/New Year shopping season in full swing, high network traffic is expected to accompany the sales throughout December and into 2023. During this time, retailers will expect to see a higher-than-average number of visitors to both their stores and their online websites.
But with soaring inflation and energy price rises causing economic uncertainty, predicting the level of sales traffic that eCommerce sites can expect isn’t an easy task. Therefore, adapting their strategies to ensure they are ready for any level of network traffic must be a priority.
Meeting the challenge of securing cloud-native apps [Q&A]

As more and more of our computing moves to the cloud, protecting information and apps throws up a new set of challenges for enterprises.
We spoke to Ratan Tiperneni, president and CEO of cloud-native app protection specialist Tigera, to find out more about the security implications of going cloud native and how to deal with them.