Tag Archive for: greater

iboss Adaptive Private Access for Zero Trust Networks Provides Greater Protection Against Advanced Threats and Malware than Competitors in Independent Laboratory Tests


News Image

At iboss, we are hyper focused on creating technology that makes it easier for organizations to implement a complete Zero Trust Network Architecture to better protect organizations in this modern-day work from anywhere environment

iboss, the leader in cloud-delivered cybersecurity, today announced the results of its third-party efficacy testing for its iboss Zero Trust Adaptive Access for Zero Trust Networks, which was rigorously tested for its malware blocking effectiveness by Miercom, a premier independent testing laboratory. The report concluded that iboss Adaptive Private Access delivered superior malware threat protection and is the only service that provides continuous inspection of Private Access traffic.

The test evaluated iboss’s Adaptive Private Access technology. This cloud native Zero Trust platform protects organizations by ensuring employees or devices accessing sensitive cloud apps are redirected through iboss’s Adaptive Private Access, which acts as a checkpoint that continuously monitors for threats to the protected cloud app. When iboss Adaptive Private Access adaptive identifies a threat, the platform cuts access immediately and automatically, with no human intervention, to prevent infections from spreading and corporate data from being stolen. The test results proved that iboss exceeded the requirements set forth by Miercom, blocking 99.7% of malware, and performed 26% higher in malware blocking effectiveness than the industry average of all platforms tested by Miercom to date.

“At iboss, we are hyper focused on creating technology that makes it easier for organizations to implement a complete Zero Trust Network Architecture to better protect organizations in this modern-day work from anywhere environment,” said Paul Martini, CEO and co-founder of iboss. “This result confirms our commitment to providing the most comprehensive security solution for organizations of all sizes.”

The report concluded that iboss Adaptive Private…

Source…

Consumers Face Greater Risks From Malware But Many are Unprepared and Vulnerable


Consumers experience the same malware threats as do businesses, but are often victimized by inadequate cybersecurity protections, ReasonLabs reports.

Credit: Getty Images

Many consumers face the same malware threats as do businesses, yet they are often victimized by inadequate security to protect themselves from cyberattacks. In many cases, the resources to defend their home networks and devices, ReasonLabs said in a new report.

A good deal of individuals and home users also are saddled with using legacy anti-virus products with antiquated engines that need to be replaced, the New York-based, consumer-centric security provider said:

“One commonality that unites most individuals or home users, no matter where they are in the world or what their socioeconomic status might be, is a lack of adequate cybersecurity with the capabilities of protecting their devices and home networks from next-generation threats.”

Key Findings From the Report

Here are the study’s findings:

  • The emergence of the metaverse and increased adoption of IoT devices carry new cyber risks, such as the metaverse attack vector identified by ReasonLabs researchers in 2022.
  • Malicious web extensions are becoming more and more prevalent; 15% of all malicious extensions detected throughout 2022 came from users in the United States.
  • Trojanized software, such as coin miners, backdoors, infostealers, remote access trojans (RATs), and spyware, continues to be a top threat to home users and remote employees, as they accounted for 31% of all detections.
  • The rise in HackUtilities detections from 4% in 2021 to 20% in 2022 demonstrates that online piracy — the use of pirated or cracked software and applications — is either at or near an all-time high.
  • Cyber warfare is increasingly impacting average citizens around the world, with the most notable examples in 2022 coming from Russia’s war in Ukraine. The study found a large increase in detections in Ukraine throughout February compared to January, signaling that Russia’s invasion was also paired with cyberattacks.
  • The…

Source…

Cyber Security Experts Call For Greater UK Protections For Ethical Hackers


A group of cyber security experts is calling on the UK government to reform the Computer Misuse Act, saying it fails to protect security professionals.

The Act was introduced back in 1990 after BT’s then email system, Prestel, was hacked by journalist Robert Schifreen in an attempt to access the mailbox of Prince Philip. Schifreen – who said he wanted to raise awareness of vulnerabilities – was charged, but acquitted; the new act then made it an offense to access a computer without authorization.

However, 30 years is a long time, and the UK is now looking to introduce new measures – dubbed the ‘Cyber Duty to Protect’ – and has put out a call for information, asking for views on what actions can be taken to reduce risks.

In their letter to incoming prime minister Liz Truss, the Internet Service Providers’ Association (ISPA), security firm NCC Group and the former head of the National Cyber Security Centre (NCSC) Ciaran Martin call for the introduction of a statutory defence to protect ethical hackers.

“As you will be aware, last year the Home Office conducted a review of the effectiveness of the Act. We understand from Freedom of Information requests that 66% of those who responded to the review expressed concerns over the lack of protection in the Act for legitimate cyber activity,” they write.

“You will of course be all too aware of the increased cyber threat posed by our adversaries, not least following Russia’s invasion of Ukraine. We believe this strengthens the case for prioritising efforts to reform the Computer Misuse Act to include a statutory defence.”

At issue is the work of ethical hackers, or penetration testers, who currently must gain permission to access systems and follow agreed rules an what may be done with the data, generally agreed via a contract and non-disclosure agreement (NDA).

However, this means it’s currently illegal for penetration testers to scan systems for vulnerabilities without advance permission, or to access hacked data on the dark web for their research.

And researchers have indeed fallen foul of…

Source…

WhatsApp CEO says Pegasus Project stories show need for greater smartphone security


NSO has also pointed out in court that at one point, Facebook, which owns WhatsApp, solicited NSO’s business. In 2017, Facebook executives reached out to NSO to ask for help in tracking the habits of iPhone users, including which apps they used and how much time they spent on them, according to records obtained by The Post. NSO says it denied the request because it only does business with governments.

Source…