Ian Barker

Real-time hybrid data access is key to AI success

A new report from data lakehouse company Starburst highlights the critical role of real-time hybrid data access and robust security in successful AI implementations.

Based on a survey of 300 IT professionals from diverse industries in the United States and Western Europe, carried out by TheCUBE Research, the report shows 90 percent of respondents believe their data management practices are either somewhat or very aligned with their AI innovation goals, highlighting the critical role of coherent data strategies.

Continue reading

The EU Digital Markets Act and what it means for business [Q&A]

The Digital Markets Act (DMA) is aimed at ensuring a higher degree of competition in European digital markets. It seeks to prevent big companies from abusing their market power and allow new players to enter the market.

We spoke to Chris Hewish, chief strategy officer at video games commerce company Xsolla, to discuss the implications the DMA has on game developers and publishers, particularly in the context of digital distribution platforms, app stores, and online marketplaces.

Continue reading

Ransomware attacks rise over 60 percent

Ransomware Malware Cyber Attack

In the last year, the US has experienced a dramatic 63 percent increase in ransomware attacks, with the UK seeing an even greater rise of 67 percent.

The latest State of Ransomware report from Malwarebytes shows the share of attacks carried out by gangs outside the top 15 increased from 25 percent to 31 percent, indicating that ransomware is becoming more accessible to a broader range of cybercriminals.

Continue reading

Accusoft uses IBM AI to automate document tagging

Document processing specialist Accusoft is releasing new Auto Tagging and Classification modules within its PrizmDoc secure document viewer.

The modules use the IBM watsonx data and AI platform with the IBM Granite foundation model to automate manual tagging and classification providing consistency and ensures documents are meticulously organized, easily searchable, and compliant with regulations.

Continue reading

Over half of enterprises suffer data breaches in non-production environments

A new study shows 91 percent of organizations are concerned about the expanded exposure footprint across non-production environments (including software development, testing, and data analytics).

Once a production dataset is copied many times over into non-production environments, more workers have access to it and the data is no longer subject to the same strict security controls.

Continue reading

72 percent of executives targeted by cyberattacks

Senior executives are prime targets for cybercriminals, with 72 percent of surveyed cybersecurity professionals in the US reporting that this group has been targeted by attacks in the past 18 months.

The study from GetApp also highlights the rising use of AI-generated deepfakes, which have been involved in 27 percent of the attacks.

Continue reading

Raspberry Pi 5 now offers less memory and a lower price

The Raspberry Pi 5 was first released almost a year ago, today the Raspberry Pi Foundation is unveiling a new 2GB version of the popular one-board computer.

The lowest-cost Raspberry Pi 5 has so far been the 4GB variant, priced at $60. The new 2GB Pi comes in at only $50 and is built on a cost-optimised D0 stepping of the BCM2712 application processor.

Continue reading

Combating information overload with different data sources [Q&A]

The majority of teams today are contending with too much data which means they struggle to generate meaningful insights from their information, and can become overwhelmed by the sheer volume.

We spoke to CallMiner CMO Eric Williamson who believes sourcing customer feedback from different sources might help solve the problem.

Continue reading

Enterprises need to update application security practices

Organizations urgently need to modernize their application security practices so that they can support growth and mitigate risks according to a new report.

Thew study from Legit Security and TechTarget's Enterprise Strategy Group (ESG) finds nearly all organizations reporting difficulties in fixing vulnerabilities after applications are deployed, reinforcing the significance of incorporating security processes and tools in the build process.

Continue reading

The challenges of securing Active Directory [Q&A]

Microsoft Active Directory is used by a majority of the world’s organizations. But Cyberattacks and misconfigurations targeting AD have surged in recent years, leading to critical outages and data loss.

We spoke to Bob Bobel, CEO of Cayosoft, about how to address critical weaknesses in enterprise infrastructure associated with Microsoft Directory services.

Continue reading

DDoS attack activity soars in first half of 2024

In the first half of 2024, web DDoS attacks surged globally 265 percent compared to the second half of 2023, according to the latest threat analysis report from Radware.

Organizations in EMEA were the primary target of web DDoS attacks between January and June of 2024, being subject to more than 90 percent of the attacks.

Continue reading

Why automation isn't the answer to zero-day attacks [Q&A]

Zero Day

Last year saw almost 100 zero-day attacks, putting a strain on security teams and becoming known as the 'Hot Zero-Day Summer.'

In response to these attacks, the first instinct of many organizations has been to turn to automation. But Marc Rubbinaccio, manager, compliance at Secureframe, doesn't believe that this is the right approach. We spoke to him to find out more.

Continue reading

BSOD hits one in 200 devices daily

Blue Screen of Death

New analysis of system crashes shows that, without preventative IT in place, one in every 200 devices falls victim to the dreaded blue screen of death (BSOD) per day, even under 'good' operating conditions.

The research from Nexthink shows the recent CrowdStrike outage pushed the number as high as one in 10.

Continue reading

Enterprises make significant investments in AI

Almost one in 10 decision-makers in both the UK (eight percent) and US (seven percent) are planning to spend over $25 million on AI this year.

A survey from Searce, of 300 C-Suite and senior technology executives at organizations with more than $500 million, finds that for US decision-makers, data privacy and security are ranked as the number one hurdle to adopting AI (20 percent), whereas UK decision-makers rank lack of qualified talent as their number one challenge (19 percent).

Continue reading

How are CISOs coping with developer gatekeeping? [Q&A]

CISOs are under the microscope to prove they can reduce vulnerabilities in the software development life cycle -- particularly, that they can do so from the start of code creation. As such, CISOs are searching for the most effective way to ensure the security awareness of their developers before they take on the responsibility of writing and introducing code.

Secure Code Warrior's co-founder and CTO, Matias Madou, believes that a 'gatekeeping' standard -- where developers are incrementally given access to more sensitive projects -- is the key to building a strong foundation for secure coding processes.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.