Kyndryl unveils Cybersecurity Incident Response and Forensics Service

A graphic of a padlock representing cybersecurity.

IT infrastructure services providerm, Kyndryl, has unveiled a Cybersecurity Incident Response and Forensics (CSIRF) service to help customers proactively prepare for and respond to threats by applying the latest threat intelligence and experience from Kyndryl’s deep domain security experts.

The new service helps customers investigate and respond to a detected security incident by leveraging capabilities such as incident triage, incident response, threat intelligence, compliance...

Console Connect and Vultr collaborate to deliver on-demand cloud access worldwide

Console Connect, a Network-as-a-Service (NaaS) platform, and Vultr, a privately held cloud computing company, have formed a global collaboration that enables businesses to establish their own private, dedicated link between Vultr and the Console Connect platform, improving network security and connectivity for mission-critical applications and workloads.

Today, Vultr is integrated with the Console Connect platform in multiple regions, enabling businesses to directly connect to...

Cloud professionals ‘overly attached to password-based security’

Most cloud professionals remain overly attached to the use of passwords despite their inherent security vulnerabilities, value as a target for threat actors, and widespread frustrations around password hygiene requirements. 

This is one of the key findings from research conducted by Beyond Identity, a provider of passwordless, phishing-resistant MFA.

The survey of more than 150 cloud industry professionals was conducted at the recent Cloud Expo Europe event and...

Intruder joins Google Cloud Partner Advantage

Someone using Google search on a laptop.

Intruder, the vulnerability scanning and attack surface management platform, today announced it has joined the Google Cloud Partner Advantage program as a technology partner, giving organisations the ability to easily monitor their cloud systems for potential security breaches and vulnerabilities.

As part of the collaboration, customers are able to connect Intruder to Google Cloud to synchronise assets.

With the integration and as a Google Cloud partner, Intruder offers...

Cost-of-living crisis fuelling a rise in cybercrime

A graphic of a padlock.

More than a third (34%) of organisations across UK critical national infrastructure (CNI) anticipate a rise in cybercrime as a direct result of the current economic crisis, according to new research by leading cyber security services firm Bridewell.

The ‘Cyber Security in CNI: 2023’ research report, which surveyed 500 cyber security decision makers in the UK, in the transport and aviation, utilities, finance, government, and communications sectors, found concern is...

Malware-delivering cloud apps almost tripled in 2022

A skull symbol within computer code.

More than 400 distinct cloud applications delivered malware in 2022, nearly triple the amount seen in the prior year, according to research conducted by Netskope, a specialist in Secure Access Service Edge (SASE).

The company's researchers also found that 30% of all cloud malware downloads in 2022 originated from Microsoft OneDrive.

Cloud apps are widely used by businesses, a fact not lost on attackers, which view these apps as an ideal home for hosting malware and...

90% of global enterprises are adopting zero trust

Scrabble tiles spelling 'trust'

Cloud security firm Zscaler has found that more than 90% of IT leaders, who have started their migration to the cloud have implemented, are implementing, or are planning to implement a zero trust security architecture.

Supporting the mass migration to zero trust to secure users and the cloud, more than two thirds (68%) believe that secure cloud transformation is impossible with legacy network security infrastructures or that ZTNA has clear advantages over traditional firewalls...

James Todd, KPMG: On automation and machine learning as the future of security 

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

“It’s at that intersection of the cloud environment, being very much aligned to deploying everything as code,” says Todd. “A lot of automation is a big part of that. Being able to take dynamic action within a cloud environment is much easier and well-versed than within a...

Organisations increasing modern data protection for cloud to reduce security risks

Veeam Software, a specialist in modern data protection, has released the findings of the company’s Cloud Protection Trends Report 2023, covering four key 'as a Service' scenarios: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Backup and Disaster Recovery as a Service (BaaS/DRaaS).

The survey found that companies are recognizing the increasing need to protect their SaaS environments. For example, nearly 90% of Microsoft® 365...

Next generation of phishing attacks uses unexpected delivery methods to steal data

A man fishing at a lake.

Netskope, a specialist in secure access service edge (SASE), has unveiled new research that shows how the prevalence of cloud applications is changing the way threat actors are using phishing attack delivery methods to steal data. 

The Netskope Cloud and Threat Report: Phishing details trends in phishing delivery methods such as fake login pages and fake third-party cloud applications designed to mimic legitimate apps, the targets of phishing attacks, where the fraudulent content...