Ian Barker

Cyber resilience

Druva launches new AI agents to help boost cyber resilience

New AI agents launched today by Druva, the company says, will fundamentally change the way customers secure, recover, and manage their data.

A major expansion to DruAI, the company’s suite of AI capabilities for customers, features intelligent agents that can interpret user intent, analyze data, and take meaningful action. This shift aims to move enterprises beyond traditional, query-based AI to agentic systems designed for action -- helping teams strengthen cyber resilience with greater speed, simplicity, and confidence.

By Ian Barker -
Transport Layer Security. Secure Socket Layer. TLS SSL. Cryptographic protocols provide secured communications.

96 percent of organizations worry about the impact of shorter certificate life

The radical shortening of SSL/TLS certificate lifespans from 398 days to 47 days by 2029 is shaking up the cybersecurity world. New research shows 96 percent of organizations are concerned about the impact of shorter SSL/TLS certificate lifespans on their business.

The study from Sectigo, developed in collaboration with global research firm Omdia, surveyed over 270 IT decision makers and finds fewer than one in five organizations feel very prepared to support the coming shift to 47-day certificate renewal cycles.

By Ian Barker -
Source-code

Insecure code is behind a wave of data breaches

New research reveals that insecure code is behind a shocking number of cyber breaches in the UK, with two-thirds of tech leaders admitting their organization suffered an incident in the past year.

The study from SecureFlag, of 100 UK C-suite and tech leaders, shows that despite the risks, many companies are still failing to train developers properly, leaving a gap that attackers are exploiting.

By Ian Barker -
DevSecOps

How the SOC is evolving to meet new threats [Q&A]

As cybersecurity threats grow more sophisticated and relentless, the role of the Security Operations Center (SOC) has never been more critical.

In response organizations are re-imagining their SOCs to address the dual challenges of an evolving threat landscape and a shifting workforce dynamic. We spoke to Scott Scheppers, chief experience officer at LevelBlue to find out more about this shift and how SOC teams are pivotal in safeguarding operations, fostering innovation, and mentoring the next generation of cybersecurity talent.

By Ian Barker -
Web link check internet

Malicious URLs overtake attachments as top email threat

Cybercriminals increasingly favor malicious URLs over attachments, as they are easier to disguise and more likely to evade detection, according to the latest report from Proofpoint.

These links are embedded in messages, buttons, and even inside attachments like PDFs or Word documents to entice clicks that initiate credential phishing or malware downloads.

By Ian Barker -
Robots machine identity

Dealing with the challenge of securing machine identities [Q&A]

Machine identities have proliferated in recent years, but while they offer convenience they also introduce new vulnerabilities.

We spoke to Ev Kontsevoy, Teleport CEO, to learm more about the problem of securing machine IDs and what enterprises can do to address it.

By Ian Barker -
Future artificial intelligence robot and cyborg.

Demand for .AI domain names soars along with values

For the second consecutive quarter sales of .AI domain names have surged -- with a quarterly record of $4.5 million in volume in the last quarter (up from $3.48 million in the first quarter of this year) as demand for artificial intelligence-related branding accelerates.

The latest Domain Investment Index from online payments service Escrow.com reflects the embrace of AI. “Two huge tech trends are colliding here: the incredible uptake of AI in business and the realization that domains are the commercial real estate of the Internet,” says Escrow.com chief executive Matt Barrie.

By Ian Barker -
login and password cyber security concept Data protection and secure internet access cyber security. secure access to users personal information security and encryption

Enterprises struggle with too many identity tools

With identity security growing more complex a new report shows that of 70 percent of enterprises recognize the need to consolidate their identity security tool stack.

The study by Enterprise Strategy Group for Silverfort finds that while 70 percent of teams plan to expand their use of an existing tool to cover a new use case in the next 12-18 months, 62 percent of organizations plan to implement a new tool to satisfy a use case, hinting that current solutions may not be adequate to satisfy evolving priorities.

By Ian Barker -
Code scan

Over 80 percent of organizations knowingly ship vulnerable code

New research shows 81 percent of organizations knowingly ship vulnerable code, and 98 percent experienced a breach stemming from vulnerable code in the past year, that’s a sharp rise from 91 percent in 2024.

The survey from Checkmarx, of more than 1,500 CISOs, AppSec managers and developers around the world, also shows that AI‑generated code is becoming mainstream, but governance is lagging.

By Ian Barker -
worry stress

Shifts in federal cyber priorities put stress on security teams

Recent shifts in US federal cybersecurity efforts, most notably cuts to key CISA programs and the disbanding of the Cyber Safety Review Board, are having an impact beyond Washington according to a new report.

Security automation company Swimlane surveyed 500 IT and security decision-makers across the US and UK The findings show how private-sector leaders are now shouldering greater responsibility for resilience, investment and public‑private coordination.

By Ian Barker -
The AI CPU is generating code

Popular LLMs share strengths and weaknesses when it comes to creating code

Increasing pressure to build and launch applications quickly has seen a rise in the use of AI to generate code. New analysis from Sonar, looking at the quality and security of software code produced by top Large Language Models (LLMs), finds significant strengths as well as material challenges across the tested models.

The study used a proprietary analysis framework for assessing LLM-generated code, tasking the LLMs with over 4,400 Java programming assignments. The LLMs evaluated in the study include Anthropic's Claude Sonnet 4 and 3.7, OpenAI's GPT-4o, Meta's Llama-3.2-vision:90b, and OpenCoder-8B.

By Ian Barker -
Man working on computer laptop with triangle caution warning sig

Why browser security is increasingly essential for the enterprise [Q&A]

As enterprises embrace hybrid work, SaaS applications, and AI tools at unprecedented scale, one critical access point is being increasingly targeted by attackers: the browser.

To better understand the risks and what can be done to secure the browser, we spoke with Alon Levin, vice president of product management at Seraphic Security, and an expert in enterprise browser security.

By Ian Barker -
Foxit SDK

Foxit streamlines PDF document workflows with new developer tools

Developers building browser-based PDF applications have traditionally faced challenges related to performance bottlenecks, limited form handling, cumbersome signing workflows, and inconsistent cross-browser experiences.

PDF software specialist Foxit is aiming to change that with the launch of a new SDK for Web v11, which with its WebAssembly-powered rendering engine, modular architecture, and deeply refactored core components, eliminates many of the long-standing problems.

By Ian Barker -
identity theft hacker

How access to company networks is sold on the dark web for under $1,000

New analysis of illicit dark web marketplaces where cybercriminals buy and sell access to corporate networks uncovers new insights into how initial access to compromised businesses is being sold -- often for less than $1,000 -- and the steps defenders can take to disrupt the process in its earliest stages.

Rapid7’s threat intelligence researchers analyzed hundreds of posts by Initial Access Brokers (IABs) offering access to compromised networks across a range of industries and regions. Their findings show that ‘initial’ access doesn’t necessarily equate to minimal; in many cases, this access represents a deep compromise.

By Ian Barker -
Agentic-AI

Spread of AI agents sparks fears of a cybersecurity crisis

A new report reveals an increasing trust gap between businesses deploying agentic AI for external communications and consumers wary of sharing personal information due to security concerns.

The research, carried out by Censuswide for Salt Security, also warns that without proper API discovery, governance and security, the very technology meant to drive smarter customer engagement could open the door to cybersecurity issues including attacks or data leakage.

By Ian Barker -

© 1998-2025 BetaNews, Inc. All Rights Reserved.