Smaller businesses are ready to embrace AI

Artificial intelligence

According to a new report, 61 percent of SMBs expect their AI usage to increase in the next year, and younger groups are more likely to incorporate AI into regular tasks.

The study from DigitalOcean also finds that while 70 percent have used ChatGPT in some capacity, it's still in the early testing stages and only nine percent of companies have policies in place concerning its usage. 62 percent of those using ChatGPT say they are just testing it out, with 23 percent integrating it into regular tasks.

Continue reading

Meeting the challenges of the digital workspace [Q&A]

home working security

Remote and hybrid teams are increasingly adopting digital tools to get their jobs done. But while this strengthens productivity for workers it risks compromise to the business's security. In turn, this has exacerbated the need for additional layers of supervision and oversight.

Ungoverned connections leave businesses open to supply chain attacks, data breaches and more. We spoke to Astrix Security CEO and co-founder Alon Jackson to discuss these challenges and how to safely and securely manage the new digital workplace.

Continue reading

Cybersecurity teams are overconfident of their ability to deal with threats

Relaxed man

A study from Immersive Labs finds that while businesses have high confidence in their overall resilience, teams are insufficiently prepared for threats.

The study, carried out by Forrester, surveyed 316 global cybersecurity training strategy decision-makers in the UK, US, Canada, Germany, and Sweden, finds that 82 percent agree they could have mitigated some to all of the damage of their most significant cyber incident in the last year if they were better prepared.

Continue reading

Why 5G/LTE network security needs a different approach [Q&A]

5G circuit board

The continuing rollout of 5G offers faster mobile networking which will pave the way for new apps and devices connecting to the internet and to corporate networks.

Liron Ben-Horin VP of systems engineering at OneLayer argues that this world of faster connections and more devices will need a new approach to security. We spoke to him to find out more.

Continue reading

Deepfake fraud hits a third of businesses

DeepFake Artificial intelligence abstract human 3d face

Deepfake fraud is on the rise, with 37 percent of organizations experiencing voice fraud and 29 percent falling victim to deepfake videos, according to a survey by identity verification specialist Regula.

Fake biometric artifacts like deepfake voice or video are perceived as real threats by 80 percent of companies, with businesses in the USA most concerned, about 91 percent of organizations considering them to be a growing threat.

Continue reading

New community helps businesses to collaborate like scammers

Database community

Cybercriminals and fraudsters have long relied on a dark web community to exchange information on vulnerable businesses and individuals as well as trading fraud-as-a-service schemes.

In an effort to turn the tables, Sift is launching a new online community called 'Sifters' to allow its customers to learn from, interact with, and share information with each other, including on any emerging fraud threats they encounter.

Continue reading

Java retains its popularity in a changing landscape

Java code

The Java programming language dates back to 1996, released by Sun Microsystems as a way of developing multimedia applications in a portable and interactive way.

That Java is still immensely popular almost 30 years on suggests that it must have got something right. New Relic's 2023 State of the Java Ecosystem report takes an in-depth look at the use of one of the most popular programming languages.

Continue reading

Versa delivers zero trust access across the enterprise

zero trust

Hybrid cloud and hybrid work have changed where and how we access systems, challenging organizations to find ways to secure the enterprise while delivering the best user experience.

While cloud-delivered Zero Trust Network Access (ZTNA) solutions are now widely adopted to secure remote work, they don't deliver the application performance and inline policy enforcement needed for workers at the office.

Continue reading

How analytics can boost the supply chain [Q&A]

Analyzing data on computer

Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.

We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.

Continue reading

Behavioral AI platform defends against multi-channel attacks

Cyber Security lock icon Information Privacy Data Protection internet and Technology

While email remains the most common path to target an organization, we're increasingly using other tools like Slack, Teams and Zoom too, so cybercriminals are steadily shifting their tactics and targeting these additional entry points across the enterprise.

AI-based email security platform Abnormal Security is launching a range of new additions to its product focused on expanding security detection for these collaboration tools.

Continue reading

86 percent of developers knowingly deploy vulnerable code

code

According to a new study, 86 percent of software developers and AppSec managers surveyed have or know someone who has knowingly deployed vulnerable code.

What's more the study from Checkmarx shows 88 percent of AppSec managers surveyed have experienced at least one breach in the last year as a direct result of vulnerable application code.

Continue reading

71 percent of businesses hit with insider attacks from malicious employees

identity individual crowd

Insider attacks including fraud, sabotage, and data theft, plague nearly three quarters (71 percent) of US businesses, according to Capterra's 2023 Insider Threats Survey.

Perhaps unsurprisingly companies that allow excessive data access are much more likely to report falling victim to insider attacks. However, only 57 percent of companies limit data appropriately while 31 percent allow employees access to more data than necessary and 12 percent allow employees access to all company data.

Continue reading

Integration is a top priority for enterprises

integration jigsaw

A new report finds that 71 percent of enterprises are actively planning to implement integration technology this year.

The study from enterprise integration platform as a service (iPaaS) company Digibee surveyed over 1,000 US and Canada-based CIOs, CTOs, developers, and enterprise architects, and finds integration strategies being hampered by technology that isn't cloud-native and lack the agility to respond quickly.

Continue reading

New hyperautomation tool aims to improve enterprise security workflows

Automation

In today's complex cybersecurity landscape, keeping track of all the processes and workflows involved can be a difficult task.

Today sees Torq launch an enterprise-grade security 'hyperautomation' platform that is capable of automating the most complex security infrastructures. It also offers a GPT AI-based analytics capability for auto-analyzing cybersecurity incidents, making strategic responses, and informing immediate and long-term defensive measures.

Continue reading

Business and tech leaders collaborate to exploit the edge

Edge computing

Business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business decisions.

A new report from AT&T Cybersecurity finds that collaboration among leaders, as well as external partners in the ecosystem, will be critical for the edge journey ahead. But while the report finds organization's silos are beginning to erode and converge, more progress needs to be made.

Continue reading

Load More Articles