Ian Barker

How RISC-V standards are changing the world [Q&A]

You may have heard of RISC-V -- usually pronounced 'risk-five' -- it's an instruction set architecture originally designed to support computer architecture research and education but which has evolved to become a standard open architecture for industry.

We spoke to Calista Redmond, CEO of standards body RISC-V International to find out more about the latest developments.

Continue reading

Malicious emails bypass SEGs every 45 seconds

New data from Cofense shows one malicious email bypassing customers' Secure Email Gateways (SEGs) every 45 seconds -- up from every 57 seconds in 2023.

The report also highlights the rapid rise in Remote Access Trojans (RATs) and the evolution of credential phishing techniques that exploit trusted platforms. Remcos RAT emerged as the predominant malware, using methods to bypass SEGs with ease.

Continue reading

Microsoft and Atom Computing set to launch commercial quantum computer next year

Quantum computing has up to now been one of those things that's always seemed to be on the horizon but just tantalizingly out of reach.

Now though, Microsoft in partnership with Atom Computing have used the Ignite conference to announce a breakthrough in quantum computing that they say will allow them to deliver quantum computers based on this technology to commercial customers next year. Those machines will feature over 1,000 physical qubits.

Continue reading

With AI agents, Microsoft aims to change the way you work

We're constantly told that AI will make our lives easier by taking on the tedious everyday tasks that we don't really like doing. Who wouldn't want to have an AI agent do some of your office donkey work?

That's what Microsoft is offering with new out-of-the-box, purpose-built agents in Microsoft 365 Copilot that will take on unique roles, working alongside or on behalf of a team or organization to handle simple, mundane tasks as well as complex, multi-step business processes.

Continue reading

Use of GenAI in development raises security concerns

Most developers (85 percent) and security teams (75 percent) have security concerns over relying on GenAI to develop software.

A report from Legit Security, based on a survey of over 400 security professionals and software developers across North America, finds 96 percent of security and software development professionals report that their companies use GenAI-based solutions for building or delivering applications.

Continue reading

Businesses taking longer to recover from cyber incidents

In 2024, businesses have reported taking an average of 7.3 months to recover from cybersecurity breaches -- 25 percent longer than expected and over a month past the anticipated timeline of 5.9 months.

This is among the findings of the latest Global Security Research Report from Fastly which also shows that recovery times are even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each -- 70 percent above the average -- and their recovery times stretched to 10.9 months.

Continue reading

The future of facilities management software [Q&A]

The facilities management sector is in the midst of a digital evolution, driven by trends such as sustainability and smart buildings, and there are also increased regulatory demands in the mix.

We spoke to Phil Meyers, CEO of mpro5, to discuss what this means for facilities management software providers.

Continue reading

Meet Daisy, the AI granny designed to waste scammers' time

We all know how frustrating it can be to get scam phone calls, whether they're pretending to be your bank or trying to claim your computer needs fixing.

Of course it can be fun to keep them talking and string them along for a while, but most of us don't have the time to do that. Now though UK telco Virgin Media O2 has created an AI pensioner specifically designed to waste the scammers' time so we don't have to.

Continue reading

How enterprises can maximize the value of automation [Q&A]

The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.

So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.

Continue reading

New platform protects organizations by assuming they've been breached

Most organizations now recognize that some form of cybersecurity breach is a matter of when rather than if. So why not just assume that the site has been breached in the first place?

That’s exactly what Tide Foundation has done with its new platform. TideCloak is an identity, immunity, and access management system that starts with a 'breach assumed' approach.

Continue reading

AI redefines priorities for IT leaders

A new survey from Flexera shows that 42 percent of IT leaders say they believe if they could integrate AI, it would make the most difference to their organizations.

The study surveyed 800 IT leaders from the US, UK, Germany and Australia to determine how IT decision makers' priorities have evolved over the past 12 months and outline their focus for next year.

Continue reading

Skills gap leads enterprises to outsource cybersecurity

Outsourcing

A new survey of over 1,700 senior decision makers and influencers in leadership, technology and security roles across Europe finds that 48 percent manage their security operations in house compared to 52 percent who use a third party.

The study from Logpoint finds more than a quarter (28 percent) of UK businesses intend to outsource security over the course of the next two years.

Continue reading

Bluesky thinking -- why left-wingers are leaving X and why X will get over it

Are you still on Twitter (sorry, X)? You can tell us, we won't judge. If you are you may have noticed something interesting since the recent US election.

Celebrities along with people and organizations of a left-wing persuasion have been announcing -- in a markedly flouncy manner it must be said -- that they're leaving the platform. This peaked yesterday with the UK's standard bearer of the liberal left the Guardian broadcasting its intention to depart X -- on X, ironically.

Continue reading

Three-quarters of most visited websites not compliant with privacy regs

A new report finds that 75 percent of the 100 most visited websites in the US and Europe are not compliant with current privacy regulations.

The study from privacy solution provider Privado.ai shows despite stricter privacy enforcement in Europe a surprising 74 percent of top websites do not honor opt-in consent as required by Europe's General Data Protection Regulation (GDPR).

Continue reading

The challenge of encrypted traffic for network defenders [Q&A]

Data encryption

When it comes to protecting sensitive information like financial data, personal information, and intellectual property, encryption has become a must. By scrambling data through the use of algorithms, only those with access to decryption keys are able to read what's being secured.

Encrypted traffic has fulfilled its intended mission: to lock down data. But, could it simultaneously be helping bad actors slip by undetected? And could encrypted traffic actually make it harder for network defenders to spot threats before it's too late?

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.