Exaforce brings AI to the security operations center
Today's security operations center has to deal with a relentless flood of telemetry from IaaS, SaaS, identity providers, endpoints, and email providers. While AI can help many existing solution focus only on a small portion of SOC challenges.
Exaforce is launching its agentic security operations (SOC) platform, combining AI-native capabilities for the entire SOC lifecycle alongside a fully managed MDR service. It aims to employ agentic AI across the entire security operations lifecycle, spanning threat detection, alert triage, investigation, threat hunting, and response.
Human risk and Gen AI-driven data loss top CISO concerns
As cyber threats become more frequent and complex, CISOs are increasingly concerned about their organization’s ability to withstand a material attack. 76 percent feel at risk of experiencing a material cyberattack in the next 12 months, yet 58 percent say they are unprepared to respond.
The latest Voice of the CISO report from Proofpoint surveyed 1,600 global CISOs across 16 countries and finds human behavior remains a critical vulnerability, with 92 percent attributing at least some data loss to departing employees.
UK Online Safety Act sparks greater privacy awareness
The UK’s Online Safety Act has already led to controversy in a number of areas, but it seems that, on a positive note, it may have helped drive a growing level of privacy awareness among internet users.
New research from AstrillVPN shows a surge in searches related to privacy tools. Data breach checker ‘Have I Been Pwned’ has topped the list of the UK’s most searched online privacy tools, receiving an average of 67,542 monthly searches.
Off-the-shelf tools make life easier for phishing attackers
New research from Fortinet’s FortiGuard Labs highlights a recently identified phishing campaign that uses carefully crafted emails to deliver malicious URLs linked to convincing phishing pages.
These pages are designed to entice recipients into downloading JavaScript files that act as droppers for UpCrypter, malware that ultimately deploys various remote access tools (RATs).
Maximizing value from Microsoft 365 [Q&A]
Many organizations have now adopted Microsoft 365 as a central part of their office service provision. But are they getting the most out of the software that they’re paying for?
We spoke to Vadim Vladimirskiy, CEO of Nerdio, about how businesses can use more than just the big services and why it’s important to understand sizing and bolt-ons in order to extract maximum value from their M365 investment.
Chatbots account for over 58 percent of all AI tool traffic
Over the year from August 2024 to July 2025 the top 10 AI chatbots collectively pulled in 55.88 billion visits, accounting for 58.8 percent of all AI tool traffic.
Within this group, ChatGPT is the undisputed leader, drawing 46.6 billion visits (up 106 percent year-on-year) and holding 48.36 percent of the entire AI tools market share.
Boards should bear ultimate responsibility for cybersecurity
A new State of the Security Profession survey from The Chartered Institute of Information Security (CIISec) shows that 91 percent of the profession believe ultimate responsibility for cybersecurity lies with the board and not security managers or CISOs (just 31 percent).
The survey focused on regulation in the light of a wave of major regulations either recently passed or coming into force -- including the EU AI Act, DORA, NIS2 and the UK’s Data (Use and Access) Bill.
The challenge of moving AI from prototype to production [Q&A]
More organizations are turning to AI to assist in their digital transformation efforts, but many projects get stuck in the pilot phase.
That’s not necessarily a sign of failure though. Rather, it reflects that AI is still in its formative stage, with its most transformative impact still ahead. We spoke to Nadav Eiron, SVP of cloud engineering at Crusoe to learn more about how AI can transition from experimentation to integration, and from potential to permanence.
Insider threats become more effective thanks to AI
Artificial intelligence is making insider threats more effective according to a new report which also shows that 53 percent of respondents have seen a measurable increase in insider incidents in the past year.
The survey, of over 1,000 cybersecurity professionals, from Exabeam finds 64 percent of respondents now view insiders, whether malicious or compromised, as a greater risk than external actors. Generative AI is a major driver of this, making attacks faster, stealthier, and more difficult to detect.
87 percent of organizations are turning to AI-powered SOC tools
A new survey from Gurucul in collaboration with Cybersecurity Insiders finds that 87 percent of respondents are deploying, piloting or evaluating AI-powered SOC tools, but only 31 percent are using them across core detection and response workflows.
The study, based on responses from over 700 cybersecurity leaders around the world, finds human and identity risks are still a major concern. 78 percent of security leaders identify social engineering and phishing as their top threat, followed closely by identity-based attacks (73 percent). However, 67 percent say they still lack visibility into access behavior and lateral movement.
Employee distraction is a bigger risk than attack sophistication
Cybersecurity professionals are sounding the alarm, not about increasingly sophisticated cyber threats, but about something far more human -- distraction.
New research from KnowBe4 shows distraction (43 percent) and lack of security awareness training (41 percent) are identified as the primary reasons employees fall victim to cyberattacks, rather than sophistication of the attacks themselves.
Automated red-teaming helps protect enterprise AI
Artificial intelligence is being used to streamline many business tasks, but at the same time it opens up new attack vectors and risks.
Secure AI specialist WitnessAI is announcing two new products aimed at securing enterprise LLMs and AI applications through automated red-teaming and behavioral runtime protection.
Enterprises spend 11 hours on resolving each security alert
On average, enterprises spend 11 hours of employee time investigating and remediating a single critical identity-related security alert.
A new study from Enterprise Strategy Group, of 370 IT and cybersecurity decision makers, shows this affects the capacity of security teams to manage alert volume, and this is only made worse in the age of AI.
New techniques help malicious QR codes evade detection
Threat researchers at Barracuda have uncovered two new techniques being used by cyber attackers to help malicious QR codes evade detection in ‘quishing’ attacks.
Quishing is a form of phishing that involves the use of QR codes embedded with malicious links that, when scanned, redirect victims to fake websites designed to steal their credentials or other sensitive information.
How AI is transforming customer service interactions [Q&A]
If you’ve contacted a company recently it’s more than likely that you have encountered some form of AI either online or over the phone.
We spoke to Priya Vijayarajendran, CEO of ASAAP to find out how AI is transforming real-time customer service interactions in the contact center, and what it means for the evolving relationship between humans and machines.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.