UK government set to make all your licenses and other official documents available via a digital wallet


Hot on the heels of its plans to turbocharge AI usage, the UK government has today announced that it wants to introduce a new GOV.UK Wallet, a digital wallet that will hold official documents.
Starting with Veteran Cards and Driving Licenses this year, it will expand to take in things like Blue Badges for disabled drivers, Personal Independence Payment (PIP) letters, Disclosure and Barring Service (DBS) checks and every other credential issued by the government.
CrowdStrike outage prompts businesses to overhaul supply chains


The CrowdStrike outage of July 2024 has triggered a major rethink of tech supply chains, as businesses around the world look to build IT resilience and minimize risk.
New research from Adaptavist shows that in the wake of the incident, which affected 8.5 million devices worldwide, there's a decisive shift in vendor relationships and a loss of confidence in traditional single-vendor approaches, with only 16.25 percent of respondents expressing satisfaction with their current providers.
Key developments and challenges in LLMs [Q&A]


Large language models (LLMs) have undergone rapid evolution in recent years, but can often be viewed as something of a 'black-box' as a lack of transparency makes it difficult to identify how decisions are made, trace errors, or understand biases within the model.
We spoke to Pramod Beligere, vice president -- generative AI practice head at Hexaware, to discuss this along with the tools that are being developed, such as explainable AI and interpretable models, to make AI systems more understandable, trustworthy and accountable.
How much power does your AI use? Most businesses don't know


According to new research only 13 percent of businesses are monitoring their AI’s energy consumption despite escalating power demands.
The study from SambaNova Systems gathered responses from 2,012 business leaders (1,004 in Europe and 1,008 in the US) finds that 49.8 percent are concerned about the energy and efficiency challenges posed by AI.
Supply chain 'butterfly effects' what are they and how do you navigate them? [Q&A]


The world is a pretty unstable place at the moment, which can lead to problems when it comes to making decisions on whether to invest in new technologies -- particularly in the context of a rapidly changing landscape for supply chains.
We spoke to Jonathan Barrett, CEO of Kallikor, to discuss how a new generation of AI-powered digital twin technology can help businesses to anticipate changes brought about by events outside their control, and adopt efficiency-driving technologies, such as robotics and automation, with confidence.
Nearly half of UK financial businesses not ready for a date with DORA


The EU's Digital Operational Resilience Act (DORA) comes into force tomorrow (Jan 17th) but new research shows that 43 percent of the UK's financial organizations are set to miss the deadline for compliance, with 20 percent expecting to do so by at least four months.
Although the UK is outside the EU its strong financial ties with Europe mean firms operating in or interacting with EU markets will need to align with DORA standards to continue their business relationships.
Ransomware victim numbers hit an all-time high


The number of ransomware victims reached an all-time high with more than 1,600 in Q4 2024 alone according to the latest GuidePoint Research and Intelligence Team's (GRIT) annual Ransomware and Cyber Threat Report.
The number of attackers peaked too with a 40 percent year-on-year increase in active threat groups. GRIT identified more than 88 total active threat groups in 2024, including 40 newly observed adversaries.
Perilous as a picture -- attackers sneak malware into website images


A new report from HP Wolf Security reveals that attackers are hiding malicious code in images on file hosting websites like archive.org, as well as using the same loader to install the final payload.
These techniques help attackers avoid detection, as image files appear benign when downloaded from well-known websites, bypassing network security like web proxies that rely on reputation.
Security and compliance are biggest barriers to cloud adoption


Cloud adoption is at the heart of digital transformation, providing organizations with the agility and flexibility they need to stay competitive in today's rapidly changing marketplace.
A new report from Fortinet looks at the latest trends, challenges, and strategies shaping cloud security, include safeguarding sensitive data, ensuring regulatory compliance, and maintaining visibility and control across increasingly complex hybrid and multi-cloud environments.
68 percent of organizations don't fix critical vulnerabilities on time


A newly-released report from Swimlane shows that a worrying 68 percent of organizations say remediating a critical vulnerability takes them more than 24 hours.
The survey of 500 cybersecurity decision-makers across the US and UK reveals that 37 percent cite the top challenge in prioritization as a lack of context or accurate information. Similarly, 35 percent report this lack of context hampers their remediation efforts.
New LLM-powered engine helps secure complex cloud environments


While moving systems to the cloud delivers many benefits, it also leads to complex dynamic environments that can be a real challenge when it comes to keeping them secure.
With the launch of a new Large Language Model (LLM)-powered cloud detection engine, Sweet Security aims to cut through the noise and allow security teams to tackle these environments with greater precision and confidence.
SIEM and its role in the enterprise SOC [Q&A]


SIEM (security information and event management) is currently one of the cybersecurity field’s most active markets. It holds the promise of making sense of the disparate data sources across enterprise environments to detect and respond to malicious activity.
Over the past year, we’ve witnessed a wave of innovation, mergers and acquisitions and consolidation in this area, largely driven by AI advancements and the push toward the AI-native security operations center (SOC). But there's also a 'data paradox' involved in balancing cost with importing and storing as much data as possible.
Threat actors move from email to browsers


New research from the eSentire Threat Response Unit (TRU) shows a shift towards browser-based threats last year as more traditional email malware declines.
Moving onto 2025 the report predicts an increase in politically motivated cyberattacks, with adversaries disrupting the physical infrastructure of the Internet to disrupt internet access. It also expects we’ll see continued growth in ransomware attacks against all industries, abuse of certificate authority, and further increase in browser-based threats to deploy malware.
Enterprises risk falling behind in AI adoption


Despite the excitement around AI as a transformative force, many enterprises are struggling to adopt the technology in meaningful ways, according to a new survey from Unily.
This has resulted in a growing gap between AI 'haves' and 'have nots,' where enterprises adopting AI tools for their people are making quicker gains than those without. At the same time employees who are open to using AI tools increasingly want more exposure to them and may even choose employers who are early AI adopters over those who are slower to adapt.
CISOs take on extra responsibilities


The majority of CISOs are taking on responsibilities beyond cybersecurity, including business risk, IT oversight, and digital transformation. Three percent of CISOs attribute their raise to taking on larger scope, while others see it reflected in merit increases.
New research from IANS Research and Artico Search surveyed over more than 830 CISOs and other security leaders to understand the key trends and challenges reshaping CISO role.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.