Ian Barker

Tech investment is needed to fight geopolitical risk to supply chains

Supply chain procurement

A new report finds that nearly three quarters (73 percent) of UK businesses expect geopolitical risk to intensify over the next 12 months, with 62 percent saying their supply chains can’t deal with the shifting geopolitical sands.

The study from Ivalua, based on a survey of 300 supply chain and procurement decision-makers in the UK, shows the war in Ukraine has negatively impacted confidence in their organization’s supply chain the most (77 percent). This is followed by US tariffs (75 percent), military exercises and testing disrupting major shipping straits (73 percent), tensions between China and Taiwan (62 percent), and the war in Gaza (58 percent).

Continue reading

The social media apps harvesting your data for AI

Social media laptop

We all know that data is a valuable commodity, whether it’s to build marketing profiles or target advertising. Increasingly it’s also being used to train AI models, but do you know what the sites you use are doing with your information?

Data privacy and removal company Incogni has released its Social Media Privacy Ranking 2025 report, which ranks major social media platforms on user privacy, compliance, and overall data protection practices.

Continue reading

Proton Mail launches new mobile apps for Android and iOS

Enterprise mobile

Popular encrypted email service Proton Mail is rolling out brand new iOS and Android apps, offering users a faster, more modern and smoother experience.

Email started on desktop computers and was designed accordingly. As a result early mail apps could feel awkward with slow speeds, clumsy tabs unintuitive layouts. But today, phones are users' primary access to the internet. With this in mind, over the past year, Proton has embarked on an ambitious project to rebuild Proton Mail's iOS and Android apps from the ground up.

Continue reading

Skeptic or realist? The contradictions in AI technology adoption

office argument

Research released today by The Adaptavist Group reveals deep-rooted contradictions in how companies are approaching and implementing AI technology.

The survey of 900 professionals responsible for introducing and onboarding AI across the UK, US, Canada, and Germany uncovers a major fault line between the 42 percent who believe their company’s AI claims are over-inflated -- the AI ‘skeptics’ -- and the 36 percent of AI ‘realists’ who do not.

Continue reading

Two-thirds of people working with AI are not in tech roles

AI doctor medicine

We tend to think of artificial intelligence as being at the cutting edge of technical development, but new analysis from Multiverse shows that over two-thirds of people using AI at work in the UK are in roles not traditionally associated with tech.

The analysis of over 2,500 people on Multiverse’s AI apprenticeship programs reveals that over two-thirds (67 percent) are in non-tech roles -- that is, roles whose job titles don’t include keywords related to tech, data and AI. Instead, among the 50 most common ‘invisible’ roles are frontline public service, education, healthcare and construction roles, including nurses, doctors, librarians, pharmacists, therapists, lecturers and surveyors.

Continue reading

AI is an even playing field -- how secure by design can tip the scale [Q&A]

Secure by design

Vibe coding is currently all the rage, with more than 97 percent of respondents to a survey earlier this year reporting having used AI coding tools at work.

The adoption of these tools only continues to grow but it comes with a catch, attackers are also employing the same techniques. We spoke to Pieter Danhieux, co-founder and CEO of Secure Code Warrior, to discuss how vibe coding is redefining the software development landscape, how malicious actors are also leveraging this technology and the need for organizations to implement secure by design strategies from the outset.

Continue reading

Data security spending at record levels but costly breaches continue

Data-Breach-Hand

A new report from Fortinet reveals that despite organizations increasing their data security budgets by 72 percent last year, insider-driven data incidents continue to surge, with 77 percent of companies experiencing at least one breach in the past 18 months.

The study, conducted with Cybersecurity Insiders, exposes a critical disconnect, while security leaders are adopting smarter strategies and securing stronger funding, traditional data loss prevention (DLP) tools are failing to protect against today's sophisticated threats in cloud-heavy, distributed work environments.

Continue reading

AI investment soars but only a tenth of projects are fully deployed

AI investment money

New research reveals that while organizations have nearly doubled their overall AI investment to $27 million (up from $14.7 million in 2024) and 87 percent report that the ROI on their AIOps initiatives has met or exceeded expectations, however, only 12 percent of AI projects have reached full enterprise-wide deployment.

The survey, of 1,200 business decision-makers, IT leaders, and technical specialists, from Riverbed shows organizations report facing several significant barriers to AI implementation. The majority are not fully prepared to roll out AI projects, with challenges including persistent issues with data quality and a gap between leadership optimism and the technical realities of implementation.

Continue reading

New attack tactics look to bypass MFA and target security blindspots

Multifactor authentication

A new report from AI-powered managed extended detection and response company Ontinue shows a sharp rise in MFA-bypassing identity attacks in the first half of the year.

These attacks are using token replay abuse with roughly 20 percent of live incidents involving adversaries reusing stolen refresh tokens to bypass MFA, even after password resets.

Continue reading

Hardware vulnerabilities soar amid spread of IoT devices

Internet of things screen

There’s been an 88 percent increase in hardware vulnerabilities amid a proliferation of IoT devices, and 81 percent of security researchers have encountered new hardware vulnerabilities in the past 12 months.

New attack vectors and often forgotten targets like APIs and hardware are vulnerable and should be a key focus for CISOs today according to a new report from crowdsourced security company Bugcrowd, which shows organizations face growing challenges as applications go through multiple development cycles under pressure to release features quickly, often aided by AI-assisted coding.

Continue reading

Phishing is now the main entry point for ransomware

Phishing key

Phishing has overtaken all other vectors as the leading entry point for ransomware, cited by 35 percent of affected organizations, up sharply from 25 percent in 2024.

This is one of the findings of a new report from SpyCloud which also shows that 85 percent of organizations were affected by ransomware at least once in the past year, with nearly a third (31 percent) reporting six to 10 ransomware events in the last year.

Continue reading

Sumo Logic brings agentic AI to the enterprise security stack

AI cybersecurity

Enterprises face a growing volume and complexity of cyber threats which means security teams struggle with alert fatigue and managing a spread of tools.

Sumo Logic is launching a new agent-powered security operations tool to help automate routine tasks, streamline investigations, and give enterprise security teams the freedom and ability to focus on analyzing the biggest security issues facing their organization.

Continue reading

Why the cybersecurity industry needs to be more accessible [Q&A]

Cloud vulnerability lock

The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.

Organizations today are forced to juggle multiple tools, each with unique UI, costs, and maintenance headaches. They’re also often not able to buy the tools they need, because they are either too expensive or don't exist in the specific capacity they need.

Continue reading

Internal chaos after a cyberattack causes more damage than the attack itself

Office chaos abyss

A new survey from cybersecurity incident response management (CIRM) specialist Cytactic finds 70 percent of cybersecurity leaders say internal misalignment following a cyberattack caused them more chaos than the threat actor itself, leaving many organizations paralyzed by breakdowns in authority, coordination, and clarity.

The report also finds that while 73 percent of leaders describe their response plans as ‘technically comprehensive,’ many admit those plans collapse under real-world pressure. In addition, 86 percent say ‘translation time’ between legal, communications, and technical teams causes costly delays, underlining that breaches are often derailed more by internal breakdowns than by attackers.

Continue reading

Agentic AI and its impact on the healthcare sector [Q&A]

AI-healthcare

Agentic AI is changing healthcare workflows by moving from passive data analysis to active orchestration of decisions.

But with this come risk. We spoke to Rajan Kohli, CEO of CitiusTech, to discuss how AI is changing healthcare and how organizations can prepare for its impact.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.