Ian Barker

robotic public speaker

AI video tools and how they’re changing business communication [Q&A]

The use of AI video has exploded in the past year. But while it’s deepfakes that make the headlines the technology also has the potential to change how businesses create and use video content in their messaging.

We spoke to Victor Erukhimov, chief executive officer of CraftStory, to find out more about AI video and how businesses can exploit it to their advantage.

By Ian Barker -
Doctor laptop healthcare

AI risks, greater regulation and remote consultations -- healthtech predictions for 2026

Understandably perhaps the health sector has been slower than some to embrace the rush to AI. But more medical devices are now connected and AI is having an impact, offering benefits to patients but also opening up new risks.

We spoke to some leading industry figures to find out how they see healthtech developing in 2026

By Ian Barker -
AI protection security

AI as a target, web-based attacks and deepfakes -- cybersecurity predictions for 2026

The very nature of cybersecurity makes it a constant arms race between attackers and defenders and recently that’s meant both sides utilizing AI.

This seems unlikely to change in 2026 but what else might we expect? Some industry experts give us their views.

By Ian Barker -
Artificial-intelligence

Agent vs agent, reliable interfaces and value for money -- artificial intelligence predictions for 2026

Artificial intelligence has been driving much of the technical agenda for the last couple of years and is still evolving rapidly, finding its way into more and more areas.

Here some industry experts look at what we can expect to see from the AI space in 2026.

By Ian Barker -
network router switch

The silent danger of SSH key mismanagement [Q&A]

The recent AyySSHush botnet campaign compromised over 9,000 ASUS routers worldwide via SSH key injection. Unlike traditional botnets, this campaign flips the C2 model -- routers silently await inbound contact from the attacker, making detection incredibly difficult.

And since SSH key authentication happens after encryption is established, key usage remains invisible to most monitoring tools. Combine that with the fact that routers are critical, often unmonitored devices, and it’s easy to see why this attack is a sweet spot for adversaries.

By Ian Barker -
Facial recognition identity AI

Adapting to AI agents, growing risks and perimeter focus -- identity predictions for 2026

Identity remains key to cybersecurity with stolen IDs opening the door to many attacks. And with the rise of AI agents and machine identities it isn’t just just humans that we have to worry about. Here’s what some leading industry figures think we can expect from the identity landscape in 2026.

Itamar Apelblat, CEO and co-founder of Token Security, thinks compliance frameworks will need to be rebuilt to account for AI agents. “Traditional compliance models were designed for human-centric workflows, and they are already breaking. Over the next year, frameworks will evolve to recognize AI agents as workforce identities with their own permissions, accountability requirements, and control expectations. Organizations that fail to adapt will fall out of step with regulators and customers.”

By Ian Barker -
AI personal data

AI data transparency shapes shopping behavior

A new survey of over 1,000 US consumers looks at how holiday shopping behavior is impacted by brand management of personal data in AI systems.

The study from Relyance AI suggests Americans are entering the gifting season emotionally depleted and digitally exposed, with most planning to shop online. But feeding more personal data into systems during periods of high stress and emotional depletion sets the stage for a fragile purchasing environment.

By Ian Barker -
SaaS security

Why SaaS apps are a prime target for attackers [Q&A]

Attackers will always use tactics that are proven to work and with more business turning to SaaS for their systems obviously these apps are on the cybercriminal’s radar.

We spoke to Martin Vigo, lead offensive security researcher at SaaS security company AppOmni, to explore the reasons why SaaS apps are such fertile ground for attackers.

By Ian Barker -
Medical tech scanner

Hospitals struggle with visibility of connected medical devices

A new survey of CISOs at North American hospitals finds that 43 percent identified complete device visibility as the challenge they would most want to solve immediately, followed by ransomware threat detection (24 percent) and compliance automation (22 percent).

The study from Asimily also uncovered fragmentation in how hospital security teams approach vulnerability remediation. Only 22 percent of hospital CISOs base their prioritization on device usage and criticality, which is the most effective method for focusing resources on the highest-risk assets. Meanwhile, 18 percent rely on manual review and 15 percent report having no clear process at all for addressing IoMT (Internet of Medical Things) vulnerabilities.

By Ian Barker -
CISO graphic

Increased workloads, strategic influence and technical focus -- CISO predictions for 2026

The task of the CISO has historically been an underappreciated one. But as businesses wake up to the fact that cybersecurity issues can represent a threat to the entire business it has taken on more significance.

Here’s how a range of industry experts see the future for CISOs and their role as we head into 2026.

By Ian Barker -
frustrated office worker

87 percent of enterprises are ready to switch productivity suites

IT leaders are unhappy with their productivity current setup and are forced to manage an average of over nine different tools. This is why, according to a new study, 87 percent of IT leaders will consider changing from their current productivity suite to adopt a more unified and secure platform.

The research from JumpCloud in collaboration with Google Workspace is based on a survey of 250 US IT leaders from enterprise organizations. Its findings show that IT teams are urgently searching for a new platform to make work simpler and more secure.

By Ian Barker -
Agentic AI agent

Generative simulators allow AI agents to learn their jobs safely

As AI systems increasingly shift from answering questions to carrying out multi-step work, a key challenge has emerged. The static tests and training data previously used often don't reflect the dynamic and interactive nature of real-world systems.

That’s why Patronus AI today announced its ‘Generative Simulators,’ adaptive simulation environments that can continually create new tasks and scenarios, update the rules of the world in a simulation environment, and evaluate an agent's actions as it learns.

By Ian Barker -
Firewall bypass

Over half of public vulnerabilities bypass web application firewalls

According to a new report 52 percent of public vulnerabilities bypass leading web application firewalls (WAFs). Yet over 91 percent of bypassed vulnerabilities can be mitigated when rules are tailored with AI for the actual vulnerability and application context instead of generic attack patterns.

The report from Miggo Security is based on analysis of a sample of 360+ CVEs for WAF testing across leading WAF vendors.

By Ian Barker -
Cybersecurity threat intelligence

Most schools underprepared for cybersecurity threats

A new report from endpoint management company Action1 shows cyber incidents have become the norm in schools worldwide, with most IT leaders now adopting a more realistic view of their cybersecurity readiness.

But despite rising budgets, persistent staffing shortages and structural barriers continue to leave learning environments exposed to increasingly sophisticated threats, especially AI-driven phishing and ransomware.

By Ian Barker -
AI deployment development

Less than a quarter of organizations are securing AI-generated code

A new report reveals that 95 percent of organizations now rely on AI tools to generate code, yet only 24 percent apply comprehensive IP, license, security, and quality evaluations to that AI-generated code.

The study from Black Duck shows that that organizations without strong dependency management, automation, and SBOM validation are already falling behind on their ability to detect and remediate critical issues.

By Ian Barker -

© 1998-2025 BetaNews, Inc. All Rights Reserved.