EU urged to pause rollout of new AI rules

AI PC

Businesses and politicians are calling on the EU to pause the rollout of its wide-ranging new AI Act which became law last year. The act relies on technical standards which have been slow to emerge. Provisions of the act such as new rules for General-Purpose AI (GPAI) models, due to apply on August 2nd, still lack essential guidance.

Swedish prime minister Ulf Kristersson has called the new rules ‘confusing’ and said that he worried the continued rollout could lead to Europe falling behind technologically or specific applications not being available on the European market.

Continue reading

‘Innovator passports’ set to boost UK health tech rollouts

Health tech

A new ‘innovator passport’ -- set to be introduced over next two years -- will allow new technology that has been robustly assessed by one part of the UK’s National Health Service (NHS) to be more easily rolled out to others.

Healthcare innovations need to be thoroughly tested before being widely adopted, but of course this can slow down potentially life saving innovations from reaching the people who would benefit from them.

Continue reading

How AI is changing the way organizations nurture talent [Q&A]

Job interview

Recruiting, training and retaining staff is very much a human issue rather than a technology one, right? Not necessarily, using data and insights from AI organizations can measure and improve employee performance as well as creating a more welcoming and inclusive work environment.

We spoke with Dr. Serena Huang, founder of Data with Serena and author of The Inclusion Equation: Leveraging Data & AI for Organizational Diversity and Well-Being, to learn more about how data can be used to drive meaningful progress in DEI and employee well being.

Continue reading

Lack of 'digital dexterity' set to harm public sector AI investment

Future artificial intelligence robot and cyborg.

We reported a few weeks ago on the challenges businesses face in getting workers to adapt to new generative AI technology.

The latest report from digital experience specialist Nexthink, based on a survey of 220 public sector IT decision makers, shows that this is a particular problem in the public sector, with 96 percent of IT leaders believing this new era of digital transformation will increase digital friction.

Continue reading

Shadow AI a major concern for enterprise IT

Shadow artificial intelligence

A new report reveals that nearly 80 percent of IT leaders say their organization has experienced negative outcomes from employee use of generative AI, including false or inaccurate results from queries (46 percent) and leaking of sensitive data into AI (44 percent).

Notably the survey of 200 US IT directors and executives from Komprise shows that 13 percent say that these poor outcomes have also resulted in financial, customer or reputational damage.

Continue reading

84 percent of attacks now use legitimate tools

Glowing security padlock

New research from Bitdefender shows that 84 percent of high severity attacks are using Living off the Land (LOTL) techniques, exploiting legitimate tools used by administrators.

One of the findings is that the netsh.exe tool -- used for network configuration -- management is the most frequently abused tool, appearing in a third of major attacks. While checking firewall configurations is a logical initial step for attackers, this clearly demonstrates how data analysis can spotlight trends that human operators might instinctively disregard.

Continue reading

Vendor email compromise attacks get more effective in large enterprises

Alerts email security

A new report from Abnormal AI shows that employees in large enterprises engage with malicious vendor messages 72 percent of the time.

Drawing on behavioral data from over 1,400 organizations worldwide, the report reveals the extent to which employees are actively engaging with advanced text-based threats like vendor email compromise (VEC) and explores the blind spots attackers are exploiting with highly targeted, socially engineered attacks.

Continue reading

Meeting the challenges of running a modern service desk [Q&A]

Telephone handset

In today's interconnected world, the IT service desk often serves as the invisible backbone of any successful organization, from troubleshooting minor glitches to resolving critical system outages.

But beneath this seemingly straightforward function lies a complex web of challenges that can significantly impact efficiency, user satisfaction, and ultimately, an organization's bottom line.

Continue reading

New AI analytics platform is designed for enterprise frameworks

Data analytics graphs

As data demands across organizations intensify they need to scale productivity and enable business users to explore data independently.

Cube is launching an agentic AI analytics platform built on a universal semantic layer which allows it to operate autonomously within enterprise frameworks, automating work while preserving trust, governance, and transparency.

Continue reading

65 percent of IT professionals have too many security tools

Frustrated ignored

New research from Barracuda Networks finds 65 percent of IT and security professionals say their organizations are juggling too many security tools.

What's more, over half (53 percent) of respondents also say their security tools cannot be integrated -- creating fragmented environments that are difficult to manage and secure.

Continue reading

The practical approach to building a data mesh [Q&A]

Data mesh

As businesses continue to generate and rely on vast amounts of data, the traditional approach to managing that data is no longer sufficient.

Enter the concept of a data mesh -- a decentralized, domain-driven approach to data architecture that promises to transform how organizations handle and leverage their data. But the question remains: should a business create a data mesh? What value does it add, and what challenges does it help solve?

Continue reading

UK tech leaders want the government to stop buying US cloud

UK cloud data

New research reveals a surge in interest in data sovereignty among UK IT leaders since the implementation of the United States government's historic raft of tariffs in April.

The study from Civo, of over 1,000 UK-based IT leaders, shows more than 60 percent now feel that the UK government’s use of US cloud services exposes the country's digital economy to significant risks, damages its domestic industry, and threatens data security.

Continue reading

The top priorities and biggest worries for cyber leaders [Q&A]

worry stress

The technology world is a fast moving one and keeping up with the latest trends can be difficult. Yet it's also essential if you're not to lose competitive edge or get caught out by new risks.

We spoke to Myke Lyons, CISO of data infrastructure company Cribl, to discuss what the priorities for cyber leaders should be and what things are likely to keep them awake at night.

Continue reading

The rise of the million dollar CISO

Confidence smug millionaire

While the average total compensation for CISOs at large enterprises is $700K, those at $20B+ firms average $1.1M, with top earners exceeding $1.3M. These people are often managing $100M+ security budgets and teams of over 200 staff.

A new report from IANS Research along with Artico Search looks at data from more than 860 CISOs, including 406 at enterprises with $1B+ in annual revenue.

Continue reading

Less than eight percent of top domains implement the toughest DMARC protection

Email DMARC

New research from EasyDMARC reveals that just 7.7 percent of the world's top 1.8 million email domains are fully protected against phishing and spoofing, having implemented the most stringent DMARC policy.

While this configuration, known as 'p=reject', actively blocks malicious emails from reaching inboxes, many businesses have only adopted the passive monitoring setting known as 'p=none', which passively monitors inboxes for threats without intercepting them. This means it doesn't block fraudulent emails or provide full visibility into authentication failures.

Continue reading

Load More Articles