Ian Barker

Let's Encrypt makes free security certificates available for IP addresses

Transport Layer Security. Secure Socket Layer. TLS SSL. Cryptographic protocols provide secured communications.

We’re all familiar with the idea of TLS/SSL security certificates that verify the identity of a website and ensure trust and security on the web by confirming that the site you’re visiting is what it says it is.

Usually these relate to the domain name of the site, since that’s how most people gain access, indeed if you type in the underlying IP address instead you’ll often get an error because of the lack of a certificate.

Continue reading

New solution helps to secure AI application development

Futuristic robot artificial intelligence huminoid AI programming coding

AI is revolutionizing how software gets built, making the process faster, smarter, and more autonomous. But it also introduces more risk than we’ve ever seen and challenges application security, which wasn’t designed for AI-driven development processes.

In response to this Legit Security is launching Legit MCP (Model Context Protocol) Server. This new offering brings application security posture management (ASPM) to AI-led development, making vulnerability management simpler.

Continue reading

EU urged to pause rollout of new AI rules

AI PC

Businesses and politicians are calling on the EU to pause the rollout of its wide-ranging new AI Act which became law last year. The act relies on technical standards which have been slow to emerge. Provisions of the act such as new rules for General-Purpose AI (GPAI) models, due to apply on August 2nd, still lack essential guidance.

Swedish prime minister Ulf Kristersson has called the new rules ‘confusing’ and said that he worried the continued rollout could lead to Europe falling behind technologically or specific applications not being available on the European market.

Continue reading

‘Innovator passports’ set to boost UK health tech rollouts

Health tech

A new ‘innovator passport’ -- set to be introduced over next two years -- will allow new technology that has been robustly assessed by one part of the UK’s National Health Service (NHS) to be more easily rolled out to others.

Healthcare innovations need to be thoroughly tested before being widely adopted, but of course this can slow down potentially life saving innovations from reaching the people who would benefit from them.

Continue reading

How AI is changing the way organizations nurture talent [Q&A]

Job interview

Recruiting, training and retaining staff is very much a human issue rather than a technology one, right? Not necessarily, using data and insights from AI organizations can measure and improve employee performance as well as creating a more welcoming and inclusive work environment.

We spoke with Dr. Serena Huang, founder of Data with Serena and author of The Inclusion Equation: Leveraging Data & AI for Organizational Diversity and Well-Being, to learn more about how data can be used to drive meaningful progress in DEI and employee well being.

Continue reading

Lack of 'digital dexterity' set to harm public sector AI investment

Future artificial intelligence robot and cyborg.

We reported a few weeks ago on the challenges businesses face in getting workers to adapt to new generative AI technology.

The latest report from digital experience specialist Nexthink, based on a survey of 220 public sector IT decision makers, shows that this is a particular problem in the public sector, with 96 percent of IT leaders believing this new era of digital transformation will increase digital friction.

Continue reading

Shadow AI a major concern for enterprise IT

Shadow artificial intelligence

A new report reveals that nearly 80 percent of IT leaders say their organization has experienced negative outcomes from employee use of generative AI, including false or inaccurate results from queries (46 percent) and leaking of sensitive data into AI (44 percent).

Notably the survey of 200 US IT directors and executives from Komprise shows that 13 percent say that these poor outcomes have also resulted in financial, customer or reputational damage.

Continue reading

84 percent of attacks now use legitimate tools

Glowing security padlock

New research from Bitdefender shows that 84 percent of high severity attacks are using Living off the Land (LOTL) techniques, exploiting legitimate tools used by administrators.

One of the findings is that the netsh.exe tool -- used for network configuration -- management is the most frequently abused tool, appearing in a third of major attacks. While checking firewall configurations is a logical initial step for attackers, this clearly demonstrates how data analysis can spotlight trends that human operators might instinctively disregard.

Continue reading

Vendor email compromise attacks get more effective in large enterprises

Alerts email security

A new report from Abnormal AI shows that employees in large enterprises engage with malicious vendor messages 72 percent of the time.

Drawing on behavioral data from over 1,400 organizations worldwide, the report reveals the extent to which employees are actively engaging with advanced text-based threats like vendor email compromise (VEC) and explores the blind spots attackers are exploiting with highly targeted, socially engineered attacks.

Continue reading

Meeting the challenges of running a modern service desk [Q&A]

Telephone handset

In today's interconnected world, the IT service desk often serves as the invisible backbone of any successful organization, from troubleshooting minor glitches to resolving critical system outages.

But beneath this seemingly straightforward function lies a complex web of challenges that can significantly impact efficiency, user satisfaction, and ultimately, an organization's bottom line.

Continue reading

New AI analytics platform is designed for enterprise frameworks

Data analytics graphs

As data demands across organizations intensify they need to scale productivity and enable business users to explore data independently.

Cube is launching an agentic AI analytics platform built on a universal semantic layer which allows it to operate autonomously within enterprise frameworks, automating work while preserving trust, governance, and transparency.

Continue reading

65 percent of IT professionals have too many security tools

Frustrated ignored

New research from Barracuda Networks finds 65 percent of IT and security professionals say their organizations are juggling too many security tools.

What's more, over half (53 percent) of respondents also say their security tools cannot be integrated -- creating fragmented environments that are difficult to manage and secure.

Continue reading

The practical approach to building a data mesh [Q&A]

Data mesh

As businesses continue to generate and rely on vast amounts of data, the traditional approach to managing that data is no longer sufficient.

Enter the concept of a data mesh -- a decentralized, domain-driven approach to data architecture that promises to transform how organizations handle and leverage their data. But the question remains: should a business create a data mesh? What value does it add, and what challenges does it help solve?

Continue reading

UK tech leaders want the government to stop buying US cloud

UK cloud data

New research reveals a surge in interest in data sovereignty among UK IT leaders since the implementation of the United States government's historic raft of tariffs in April.

The study from Civo, of over 1,000 UK-based IT leaders, shows more than 60 percent now feel that the UK government’s use of US cloud services exposes the country's digital economy to significant risks, damages its domestic industry, and threatens data security.

Continue reading

The top priorities and biggest worries for cyber leaders [Q&A]

worry stress

The technology world is a fast moving one and keeping up with the latest trends can be difficult. Yet it's also essential if you're not to lose competitive edge or get caught out by new risks.

We spoke to Myke Lyons, CISO of data infrastructure company Cribl, to discuss what the priorities for cyber leaders should be and what things are likely to keep them awake at night.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.