Ian Barker

How RISC-V is changing the server market [Q&A]

Data centers have a strong emphasis on performance and delivering workloads whilst remaining power efficient.

In order to deliver on these aims the open instruction set architecture RISC-V is increasingly being used as an accelerator in data centers since it offers a lot of flexibility, which is especially important with AI. We spoke to Ian Ferguson, senior director at SiFive to discuss why this technology has become key to the server market.

Continue reading

78 percent of organizations view AI as an emerging tech risk

A new study from cloud-based risk management platform AuditBoard finds 78 percent of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves.

The report, based on a survey of over 400 security professionals in the US, finds more than half of enterprises surveyed report using AI to improve efficiency and enhance their digital risk posture.

Continue reading

Cybersecurity training needs a human touch

training key

A new study from CybSafe finds that only 42 percent of office workers are satisfied with their current cybersecurity training.

The research aims to gain deeper insights into workers' opinions on cybersecurity training, their motivations for security, and their views on Cybersecurity Awareness Month -- held annually in October. It finds that cybersecurity training is generally a standardized, solitary process that would benefit greatly from a more personalised and human-centred approach.

Continue reading

How the IT infrastructure landscape is evolving [Q&A]

Earlier this year the MACH Alliance published new research looking at the evolving landscape of IT infrastructure, highlighting the growing importance of MACH technologies.

We spoke to Casper Rasmussen, MACH Alliance president, to find out about the key trends, insights, and implications shaping the digital landscape in 2024 and beyond.

Continue reading

How risk profiling can help prevent cyberattacks [Q&A]

Recent cyberattacks like Volt Typhoon, BlackCat ransomware syndicate, and NuGet serve as stark reminders of the critical importance of monitoring cyber risks as these attacks could all have been prevented.

We spoke to Randy Watkins, chief technology officer at Critical Start, to discuss why organizations must know the difference between cyber risks and threats, and how those enterprises that fail to mitigate against cyber risk will remain reactive, and ultimately fall behind their competitors.

Continue reading

New nation-state campaigns target government, banking and healthcare

Hacker

Researchers at secure browser company Menlo Security have uncovered three new nation-state campaigns employing highly evasive and adaptive threat (HEAT) attack techniques.

In a 90-day period, the campaigns -- LegalQloud, Eqooqp, and Boomer -- compromised at least 40,000 high-value users, including C-suite executives from major banking institutions, financial powerhouses, insurance giants, legal firms, government agencies, and healthcare providers.

Continue reading

CISOs believe AI will outpace security teams

AI is set to outpace security teams according to 91 percent of security leaders in a new Bugcrowd report.

AI is clearly seen as a double-edged sword. Despite plans to hire, 70 percent report that they plan to reduce the security team headcount within the next five years due to the adoption of AI technologies. Over 90 percent believe that AI already performs better than security professionals, or at least will in the near future. While 58 percent believe that the risks of AI are worse than its potential benefits.

Continue reading

63 percent of organizations fall victim to supply chain attacks

supply chain

A new study from Checkmarx reveals that 63 percent of organizations surveyed have been victims of a supply chain attack in the last two years, while 18 percent have suffered an attack in the last year.

Even more worrying is that that 100 percent of the large enterprises represented by 900 AppSec professionals responding from the United States, Europe and Asia-Pacific have been the victims of a software supply chain attack at some point.

Continue reading

Half of IT pros think there are devices on their network they don't know about

Network switch

Half of IT professionals believe there are devices connected to their network that they're unaware of, despite nearly 60 percent admitting that insecure devices pose a 'very high' or 'high' risk to their organization.

This is among the findings of a survey of 250 IT professionals by Advanced Cyber Defence Systems (ACDS) which also finds over two-thirds of organizations have experienced three or more data breaches in the past 24 months.

Continue reading

Enterprise secrets leaked in code management systems

Enterprise secrets could be inadvertently leaking via GitHub repositories, according to new research from Aqua Security.

By scanning the most popular 100 organizations on Github, which collectively includes more than 50,000 publicly accessible repositories, Aqua researchers found active secrets from open source organizations and enterprises such as Cisco and Mozilla providing access to sensitive data and software. The exposed secrets could lead to significant financial losses, reputational damage, and legal consequences.

Continue reading

API attacks on the rise but organizations are not prepared

A new report shows that while 14 percent of organizations experienced an API attack in the last 12 months, only 38 percent say they have an API security solution in place.

The research from Traceable AI, based on a security of cybersecurity delegates at the RSA conference, finds that although 43 percent of organizations say they do not struggle with API sprawl, 33 percent are unsure if they are managing it effectively, and 24 percent acknowledge they are struggling.

Continue reading

Organizations suffer multiple ransomware infections

ransomware laptop

A new report reveals that organizations are suffering multiple ransomware infections, 18 percent have suffered a ransomware infection 10 or more times in a 24-month period, a further 18 percent were infected five to nine times, and 30 percent were infected between two and four times.

The study from anti-ransomware platform Halcyon also shows that data exfiltration occurs in nearly every major ransomware attack today, and nearly 60 percent of respondents say that sensitive or regulated data was exfiltrated from their organization, with 55 percent reporting the attackers issued an additional ransom demand to protect the exfiltrated data.

Continue reading

Most consumers ready to switch banks over fraud protection measures

A new study reveals growing anxiety among consumers that weaknesses in their banks' fraud-protection measures could leave them exposed to scammers, this would result in the vast majority (75 percent) switching providers.

For the report from Jumio sampled the views of more than 8,000 adult consumers, split evenly across the UK, US, Singapore, and Mexico, with research carried out by Censuswide.

Continue reading

Shadow SaaS -- a persistent problem and how to confront it [Q&A]

Shadow IT

There's an abundance of apps and SaaS solutions readily available these days to make the lives of employees easier and perform many work-related tasks. And the list keeps growing, with the likes of ChatGPT and Gemini paving the way for more AI-driven virtual assistants.

This is all well and good, unless your organization doesn't sanction the use of the software in question, turning something seemingly innocuous into shadow SaaS -- and a security risk. We spoke to John Stringer, head of product at data loss prevention specialist Next DLP, to learn more.

Continue reading

Businesses regularly face AI-driven fraud

AI-Fraud-hacker

A new report finds that 76 percent of fraud and risk professionals believe their business has been targeted by AI-driven fraud, with over half reporting this type of fraud happening daily or weekly.

The study, from anti-fraud platform Sift, finds the emergence and increased adoption of AI tools, including publicly available chatbots, enables cybercriminals to conduct scalable fraud attacks against both individuals and businesses.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.