New UK privacy laws aim to cut red tape for business


The UK's new Data Protection and Digital Information Bill is set to reduce costs and burdens for British businesses and charities, and remove barriers to international trade.
We know from when it was first brought before parliament last summer that it will also cut the number of repetitive data collection and cookie pop-ups online.
Economic uncertainty puts the focus onto cloud costs


This year marks the first time in more than a decade that managing cloud spend has overtaken security as the top challenge facing organizations, according to the latest State of the Cloud report from Flexera.
The report is based on responses of 750 respondents from a survey conducted in late 2022 and finds optimizing existing use of the cloud (cost savings) is the top initiative (reported by 62 percent of all respondents).
Weak passwords are still allowing attackers into networks


A new study from Specops Software finds that 88 percent of passwords used in successful attacks consisted of 12 characters or less, with the most common being just eight characters (24 percent).
The research, largely compiled through analysis of 800 million breached passwords, finds the most common base terms used in passwords are depressingly familiar: 'password', 'admin', 'welcome' and 'p@ssw0rd'.
Cloud adoption leaves regulated industries open to attack


Switching to the cloud has left organizations in heavily regulated industries like healthcare and financial services with a greater attack surface, according to a new report.
Research published today by Blancco Technology Group, based on responses from 1,800 IT professionals in healthcare and finance, shows 65 percent of respondents say that the switch has also increased the volume of redundant, obsolete or trivial (ROT) data they collect.
Tackling cloud costs and multicloud networking in a bad economy [Q&A]


It's become common for businesses to use more than one cloud, however, service providers have no incentive to offer unified management tools as they want to keep customers for themselves.
This means enterprises end up relying on multiple tools as their cloud footprint expands which is not only inefficient but can be costly. We spoke to Rod Stuhlmuller, VP of solutions marketing at Aviatrix, to find out how organizations can monitor and control their cloud usage and costs at a time when budgets are coming under increased pressure.
Free scanning service helps companies build an up-to-date SBOM


As developers increasingly rely on open source components in their projects, knowing which have been used is a key part of being able to identify updates and potential threats. This is where a software bill of materials (SBOM) is essential.
Application security testing and software research services company GrammaTech is launching a no cost SBOM service, alongside a new version of its CodeSentry software composition analysis (SCA) tool.
Financial services is the most impersonated industry in phishing attacks


Threat protection company Vade has released its latest Phishers' Favorites report for 2022 which finds that financial services is the most impersonated industry, accounting for 34 percent of phishing pages as attackers continue to follow the money.
There are also seven finance brands in the top 20, with PayPal, MTB, Crédit Agricole, and La Banaque Postale all securing a spot in the top 10.
Social engineering remains the top threat for enterprises


The latest Annual Trends Report from Jamf, based on a sample of 500,000 devices protected by the company's technology, looks at the threats impacting devices used in the modern workplace and finds social engineering tops the list.
The combination of an increasingly distributed workforce with the relative ease with which bad actors can carry out phishing campaigns, leads to the leakage of user credentials. In 2022, 31 percent of organizations had at least one user fall victim to a phishing attack.
Deploying at scale -- what does it mean and why does it matter? [Q&A]


One of the popular buzzwords in development circles in recent years has been 'deployment at scale'. Now, while it's nice to have a universally recognized term, opinions about what deployment at scale actually means tend to vary.
So what exactly does 'at scale' mean in the development community and how can companies define their own approach? We spoke to Adam Frank, VP, product and marketing at Armory.io, to find out.
Generative AI -- what it is and why there's no rush to adopt it [Q&A]


Generative AI has been getting attention recently for its novelty, unique applications and potential impact on the business world.
But, like any new invention, there's some confusion around what it actually is and what it can do. We spoke to Scott Varho, chief evangelist of 3Pillar Global, who argues that companies shouldn't be rushing to adopt generative AI without considering their needs and potential value.
New Radiant Logic solution improves identity decision making


Enterprises need real-time access to lots of data, but it's important that access to that data is properly controlled.
Radiant Logic is launching a new data intelligence offering that offers identity observability and visualization capabilities, all built on an extensible API-layer and available as a SaaS offering.
Scammers turn to AI to improve their campaigns


The latest quarterly Consumer Cyber Safety Pulse Report from Norton looks at how cybercriminals can use artificial intelligence to create more realistic and sophisticated threats.
Tools like ChatGPT have captured people's attention recently and it seems cybercriminals have noticed them too. Its impressive ability to generate human-like text that adapts to different languages and audiences also makes it great for generating malicious threats.
Smooth integration is a challenge for machine learning professionals


A new survey of 200 US-based machine learning decision makers looks at the trends, opportunities and challenges in machine learning and MLOps (machine learning operations).
The study from ClearML finds that for 41 percent, the biggest challenge of their MLOps platform, tools, or stack, is friction in using tools with other technology. While 22 percent cite vendor lock -- difficulty switching to a different provider without significant costs, time, or disruptions -- as the biggest challenge.
Developer interest in AI and deep learning grows


New research from O'Reilly, looking at the most sought-after technology topics consumed by the 2.8 million users on its online learning platform, shows that there's been a 42 percent increase in interest in AI.
Interest in deep learning showed a 23 percent increase. Developers also increasingly searched for content related to transformers -- the AI model that's led to tremendous progress in natural language processing -- reflecting the impact of advancements in Open AI's GPT-3 and ChatGPT and the anticipation for upcoming offerings from Google, Meta, and others.
IBM and OWASP announce projects to help secure the software supply chain


The OWASP Foundation (Open Web Application Security Project) and IBM have today announced IBM’s contribution of two open source projects aimed at increasing trust across open hardware and software supply chains.
The two projects are SBOM Utility and License Scanner, which add to CycloneDX, a flagship OWASP project and a leading Bill of Materials (BOM) standard. These promote validation, content analysis and accuracy of software license information included within BOMs.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.