How RISC-V standards are changing the world [Q&A]
You may have heard of RISC-V -- usually pronounced 'risk-five' -- it's an instruction set architecture originally designed to support computer architecture research and education but which has evolved to become a standard open architecture for industry.
We spoke to Calista Redmond, CEO of standards body RISC-V International to find out more about the latest developments.
Malicious emails bypass SEGs every 45 seconds
New data from Cofense shows one malicious email bypassing customers' Secure Email Gateways (SEGs) every 45 seconds -- up from every 57 seconds in 2023.
The report also highlights the rapid rise in Remote Access Trojans (RATs) and the evolution of credential phishing techniques that exploit trusted platforms. Remcos RAT emerged as the predominant malware, using methods to bypass SEGs with ease.
Microsoft and Atom Computing set to launch commercial quantum computer next year
Quantum computing has up to now been one of those things that's always seemed to be on the horizon but just tantalizingly out of reach.
Now though, Microsoft in partnership with Atom Computing have used the Ignite conference to announce a breakthrough in quantum computing that they say will allow them to deliver quantum computers based on this technology to commercial customers next year. Those machines will feature over 1,000 physical qubits.
With AI agents, Microsoft aims to change the way you work
We're constantly told that AI will make our lives easier by taking on the tedious everyday tasks that we don't really like doing. Who wouldn't want to have an AI agent do some of your office donkey work?
That's what Microsoft is offering with new out-of-the-box, purpose-built agents in Microsoft 365 Copilot that will take on unique roles, working alongside or on behalf of a team or organization to handle simple, mundane tasks as well as complex, multi-step business processes.
Use of GenAI in development raises security concerns
Most developers (85 percent) and security teams (75 percent) have security concerns over relying on GenAI to develop software.
A report from Legit Security, based on a survey of over 400 security professionals and software developers across North America, finds 96 percent of security and software development professionals report that their companies use GenAI-based solutions for building or delivering applications.
Businesses taking longer to recover from cyber incidents
In 2024, businesses have reported taking an average of 7.3 months to recover from cybersecurity breaches -- 25 percent longer than expected and over a month past the anticipated timeline of 5.9 months.
This is among the findings of the latest Global Security Research Report from Fastly which also shows that recovery times are even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each -- 70 percent above the average -- and their recovery times stretched to 10.9 months.
The future of facilities management software [Q&A]
The facilities management sector is in the midst of a digital evolution, driven by trends such as sustainability and smart buildings, and there are also increased regulatory demands in the mix.
We spoke to Phil Meyers, CEO of mpro5, to discuss what this means for facilities management software providers.
Meet Daisy, the AI granny designed to waste scammers' time
We all know how frustrating it can be to get scam phone calls, whether they're pretending to be your bank or trying to claim your computer needs fixing.
Of course it can be fun to keep them talking and string them along for a while, but most of us don't have the time to do that. Now though UK telco Virgin Media O2 has created an AI pensioner specifically designed to waste the scammers' time so we don't have to.
How enterprises can maximize the value of automation [Q&A]
The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.
So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.
New platform protects organizations by assuming they've been breached
Most organizations now recognize that some form of cybersecurity breach is a matter of when rather than if. So why not just assume that the site has been breached in the first place?
That’s exactly what Tide Foundation has done with its new platform. TideCloak is an identity, immunity, and access management system that starts with a 'breach assumed' approach.
AI redefines priorities for IT leaders
A new survey from Flexera shows that 42 percent of IT leaders say they believe if they could integrate AI, it would make the most difference to their organizations.
The study surveyed 800 IT leaders from the US, UK, Germany and Australia to determine how IT decision makers' priorities have evolved over the past 12 months and outline their focus for next year.
Skills gap leads enterprises to outsource cybersecurity
A new survey of over 1,700 senior decision makers and influencers in leadership, technology and security roles across Europe finds that 48 percent manage their security operations in house compared to 52 percent who use a third party.
The study from Logpoint finds more than a quarter (28 percent) of UK businesses intend to outsource security over the course of the next two years.
Bluesky thinking -- why left-wingers are leaving X and why X will get over it
Are you still on Twitter (sorry, X)? You can tell us, we won't judge. If you are you may have noticed something interesting since the recent US election.
Celebrities along with people and organizations of a left-wing persuasion have been announcing -- in a markedly flouncy manner it must be said -- that they're leaving the platform. This peaked yesterday with the UK's standard bearer of the liberal left the Guardian broadcasting its intention to depart X -- on X, ironically.
Three-quarters of most visited websites not compliant with privacy regs
A new report finds that 75 percent of the 100 most visited websites in the US and Europe are not compliant with current privacy regulations.
The study from privacy solution provider Privado.ai shows despite stricter privacy enforcement in Europe a surprising 74 percent of top websites do not honor opt-in consent as required by Europe's General Data Protection Regulation (GDPR).
The challenge of encrypted traffic for network defenders [Q&A]
When it comes to protecting sensitive information like financial data, personal information, and intellectual property, encryption has become a must. By scrambling data through the use of algorithms, only those with access to decryption keys are able to read what's being secured.
Encrypted traffic has fulfilled its intended mission: to lock down data. But, could it simultaneously be helping bad actors slip by undetected? And could encrypted traffic actually make it harder for network defenders to spot threats before it's too late?
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.