Ian Barker

Who will win the battle of open vs closed AI? [Q&A]

Artificial Intelligence Bias

Closed AI products like Bard and ChatGPT (ironically from OpenAI) have already delivered a practical, powerful chatbot experience and are being employed by many businesses.

Open AI by contrast is still in its early stages and has not seen wide adoption. We spoke to Mike Finley, CTO and co-founder of AnswerRocket, to find out the differences between the two and how they're set to develop.

Continue reading

SecurityScorecard launches industry-specific ratings for the telecoms sector

Some industries make more attractive targets for cybercriminals than others, thanks to the type of data they hold and the services they provide. The telecoms sector is one such. 85 percent of the top telecom companies in the US, UK, France, Italy, Denmark, and Germany experienced a third-party data breach in the past 12 months alone.

Which is why SecurityScorecard is introducing a new set of security ratings developed especially for telecommunications companies, internet service providers, and cloud providers.

Continue reading

Brazilians exposed in massive data leak

Researchers at Cybernews have uncovered a huge data leak which could potentially put the entire population of Brazil at risk.

They uncovered a publicly accessible Elasticsearch instance which contained more than 223 million records-worth of private data belonging to Brazilian individuals -- the country's current population is only around 217 million.

Continue reading

Enterprises struggling with more vulnerabilities than they can handle

stressed overwork pressure

According to new research 82 percent of companies report an increase in the gap between the number of vulnerabilities/exposures in their environment and their ability to remediate them.

The 2024 State of Security Posture Survey from XM Cyber is based on a survey of 300 CISOs and security decision-makers from large organizations in the US and UK, and shows 62 percent of security and IT teams actively engage in the remediation of exposures or vulnerabilities, handling an average of 12 per week.

Continue reading

Ditching passwords in favor of passwordless, phishing-resistant authentication [Q&A]

Passwordless authentication - Inscription on Blue Keyboard Key.

According to the FIDO (Fast Identity Online) Alliance, passwords are the root cause of more than 80 percent of data breaches. And yet, many organizations -- both big and small -- continue to use this antiquated approach to authentication. In fact, recent research from Yubico, which surveyed more than 16,000 employees across eight countries, found 59 percent of respondents still rely on usernames and passwords as their primary method of authentication.

Why do we continue to see the same old same old, especially when the authentication industry has made such significant strides in not only passwordless but also phishing-resistant authentication? We spoke with Axiad founder and co-CEO Bassam Al-Khalidi to get an answer to this question and find out how companies can make the move to a passwordless, phishing-resistant future. Read on to hear what he had to say.

Continue reading

Organizations don't know how to address software supply chain security

supply chain

Organizations are struggling to keep up with vulnerabilities amid software supply chain complexity, with more than 40 percent still in reactive mode according to a new report from Slim.AI.

The 2023 Container Report, based on a survey conducted with Enterprise Strategy Group, shows few organizations know exactly how to address security in the upstream dependencies of the applications and the containers they run in production.

Continue reading

How SMBs are tailoring their cybersecurity programs [Q&A]

SMB laptop

The uncertain economic climate has led to many smaller businesses cutting their budgets over the last year. But where cybersecurity spend is concerned this can be a risky move.

We spoke to Geoff Bibby, senior vice president at OpenText Cybersecurity to discuss how SMBs and managed security providers (MSPs) can adapt their security plans while still remaining protected.

Continue reading

Why not all AI is created equal and how the wrong choice could be hurting your business [Q&A]

intelligence

AI seems to be everywhere at the moment. But despite the fact that it has become ubiquitous, it isn't all the same.

Steve Benton, VP of threat research for Anomali, talked to us about why not all AI is equal and what businesses need to consider to ensure they get the most from the technology.

Continue reading

Why enterprise networks need to move to an as-a-service model [Q&A]

Future-network

For years, the enterprise has built bespoke networks to connect all company resources. These networks were slow to build, but once built did not change much.

That's changing as networks become more complex and dynamic. Workers are highly distributed, edge computing has grown, most enterprises now connect to multiple clouds, and connecting to partners and customers is increasingly common.

Continue reading

Navigating generative AI adoption to minimize risks and maximize benefits in the workplace [Q&A]

digital pioneer

Numerous businesses have embraced generative AI technology to enhance their operational efficiency, boost productivity and foster innovative ideas.

However, it is important to be aware of the potential legal and financial consequences associated with the use of ChatGPT and similar AI systems. We spoke to Sujay Rao, CPO at Sirion to find out more.

Continue reading

A smarter society, rise of the robots and security worries -- Internet of Things predictions for 2024

Internet of things

With ever increasing numbers of smart devices in our homes and workplaces, the Internet of Things has become an established facet of everyday life.

But like the rest of the technology industry the IoT isn't standing still. Here are some expert views on the opportunities and risks it's likely to present in 2024.

Continue reading

The evolution of open source in the enterprise [Q&A]

Open source software has been around for decades, it's thriving, effective and disrupting in the enterprise more than ever.

We talked to, Cédric Gégout, VP product management at Canonical, to discuss the evolution of open source in the enterprise and protecting its fundamentals for continued success.

Continue reading

More integration of LLMs, a switch to private clouds and more emphasis on machine identity -- enterprise IT predictions for 2024

Enterprises are major users of technology and it impacts on most areas of their operation. The big challenges in recent years have come from the switch to remote and hybrid working, and new technologies like generative AI.

So what can we expect enterprise IT to face in 2024? Here are some expert views.

Continue reading

How companies can respond better to security risks [Q&A]

Risk dial

One of the biggest issues when dealing with security risks is the time that it takes to address problems when they come to light.

We spoke to Yoran Sirkis, CEO of remediation operations specialist Seemplicity, to discuss why there's an issue and how workflow problems around responding to risks can be improved.

Continue reading

AI-powered attacks, AI potential and tailored cloud -- healthcare tech predictions for 2024

telemedicine

Technologies like AI are set to impact on many industries but perhaps more than most on healthcare. This is also an industry that's uniquely attractive to hackers thanks to the mix of personal and scientific information that it holds.

So how will healthcare benefit -- or suffer -- from technology in 2024? here's what some experts with their fingers on the pulse think.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.