Starburst platform updates boost enterprise AI initiatives


Updates to the Starburst data platform for apps and AI are designed to accelerate enterprise AI initiatives and support the transition to a future-ready data architecture built on a data lakehouse.
At the heart of these changes are Starburst AI Workflows, a purpose-built suite of capabilities that speed AI experimentation to production for enterprises. AI Workflows provides a link between vector-native search, metadata-driven context, and robust governance, all on an open data lakehouse architecture.
Why threat hunting is more vital than ever [Q&A]


The threat landscape is rapidly changing and businesses can no longer simply wait for an attack to be caught by traditional tools or decide how to respond after it occurs.
Mike Mitchell, VP of threat intelligence at Intel 471, has experienced the evolution of threat hunting first-hand as he's been in the industry for decades. We spoke to him to learn more.
How social media is changing workplace communication


Time was when office colleagues would exchange information, ideas and gossip around the water cooler or coffee machine.
That's changing because of technology though, new research reveals that platforms like TikTok and Instagram are directly influencing how 83 percent of people communicate professionally, fueling conflict and misunderstanding among an increasingly intergenerational workforce.
Why subsea cables are essential to business resilience [Q&A]


While businesses focus on cloud services and digital transformation, they often don't realize that their operations depend on the massive cable networks laid underwater.
Recent incidents have highlighted how critical these subsea cables are for business continuity, so do businesses need to rethink their approach to infrastructure as a result? We spoke to Sharat Sinha, director and CEO of Airtel Business to find out.
International fraudsters target US government programs


International bad actors -- like fraudsters from Russia and China -- are driving one in eight fraud attempts in the US, seeking everything from access to government services to loans, according to a new report.
During the pandemic, government agencies were flooded with fraudulent applications that went undetected by outdated methods. This study from Socure shows AI-powered technologies are enabling fraudsters to supercharge their efforts, hitting government agencies and commercial entities at once, with relentless speed, and at scale.
Companies take an average of four months to report a ransomware attack


A new study from Comparitech, based on data collected from 2,600 attacks between 2018 and 2023, shows the average time for a US company to report a data breach following a ransomware attack is 4.1 months.
From 2018 to 2023, the average time to report a ransomware breach has increased, rising from 2.1 months in 2018 to just over five months in 2023. Healthcare has the lowest reporting time with 3.7 months, while businesses (4.2 months) and government entities (4.1 months) are similar.
GenAI vulnerable to prompt injection attacks


New research shows that one in 10 prompt injection atempts against GenAI systems manage to bypass basic guardrails. Their non-deterministic nature also means failed attempts can suddenly succeed, even with identical content.
AI security company Pangea ran a Prompt Injection Challenge in March this year. The month-long initiative attracted more than 800 participants from 85 countries who attempted to bypass AI security guardrails across three virtual rooms with increasing levels of difficulty.
Chainguard launches malware-resistant dependencies for Python


The Python programming language has become the foundation of modern AI and machine learning applications. Of course that makes it a prime target for supply chain attacks.
Public registries do minimal vetting of hosted artifacts, and they don't provide assurance that the distributed library matches its source code, exposing enterprises to supply chain attacks. Python libraries are also susceptible to supply chain attacks because many projects include more than just pure Python code -- for example project maintainers often rebundle shared system libraries into their Python libraries to ensure stable behavior.
Stratoshark has been donated to the Wireshark Foundation to boost open source cloud security


Cloud security company Sysdig has announced the donation of Stratoshark, the company's open source cloud forensics tool, to the Wireshark Foundation.
This move is aimed at fostering innovation within the community, building in the open, and pushing security forward with advanced tools that better understand cloud-native environments.
AI leads to a new phishing threat every 42 seconds


AI-powered phishing campaigns are bypassing traditional defenses as threat actors flood inboxes with polymorphic phishing, spoofed brands, and new malware families.
New research from the Cofense Phishing Defense Center (PDC) has tracked one malicious email every 42 seconds. Many of these were part of polymorphic phishing attacks that mutate in real-time in order to bypass traditional filters.
Poor online experience leads to rise in 'digital rage'


A new report from performance analytics company Conviva highlights a rise in 'digital rage' as 91 percent of consumers report encountering frustrating digital service issues in the past year.
Businesses risk backlash, lost revenue, and damaged reputations if they fail to address these problems. Poor digital experiences have immediate and tangible impacts on revenue as 55 percent of consumers abandon their purchase, 50 percent switch to another company, and 39 percent cancel their subscription.
UK government uses AI 'Humphrey' tool to review consultation responses


Fans of the 1980s British sitcom 'Yes Minister' will know the character Sir Humphrey -- a senior civil servant whose main role seemed to be to prevent ministers from implementing their policies. You may also know that Humphrey is the name of the Downing Street cat.
With its tongue firmly in its cheek then, the UK government is introducing 'Humphrey', a bundle of AI tools designed to speed up the work of civil servants and cut back time spent on admin, and money spent on contractors.
How network APIs are transforming telcos [Q&A]


As network Application Programming Interfaces (APIs) unlock more advanced capabilities like Quality on Demand, Device Location, Number Verification, and SIM Swap, they will also support cutting-edge solutions like private 5G networks using network slicing, which grants enterprises greater autonomy and control over their wireless networks.
We spoke to Doug Makishima, advisor to the Mobile Ecosystem Forum, to discuss the impact of network APIs as well as how mobile network operators (MNOs) are moving from being 'data pipes' to adopting Network-as-a-Service (NaaS) models and what this means for the industry
Digital accessibility a priority ahead of new European law


With the European Accessibility Act (EAA) due to come into force next month, 84 percent of respondents to a new study say that digital accessibility is a priority for their company.
The EAA aims to make technology products and services easier to use for people with disabilities. The study, from quality and testing specialist Applause, shows 94 percent of organizations are preparing for the EAA by the June 28, 2025 deadline.
AppSec is critical to software purchasing decisions


A new survey of 200 chief information security officers (CISOs) from across diverse industries and regions finds that 49 percent of CISOs say buyers now factor application security (AppSec) into their purchasing decisions.
The study from Checkmarx shows 24 percent say that application security is 'always' a factor in those decisions. This trend is most pronounced in Europe, where 58 percent of respondents report that security is always a factor, compared to 33 percent in the Asia Pacific region and only eight percent in North America.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.