HP offers enhanced protection for enterprise endpoints


The rise of remote and hybrid work has increased the risk of PCs being compromised by attackers with brief physical access, underscoring the need for protection and visibility into the integrity of devices throughout their lifetimes.
To combat this, HP is launching a new HP Enterprise Security Edition, a unique suite of capabilities designed to enhance the physical security of PC endpoints.
Why you might soon find yourself talking to adverts


We've probably all shouted at an advert on TV or muttered darkly at one that pops up when surfing the web, but how would you feel about ads you can actually converse with?
Communications company GMS has developed Generative Response Ads, a technology that enables consumers to engage in real-time conversations directly within ad spaces using AI.
More than half of organizations think their cloud security is inadequate


A new survey, from infrastructure management provider Pulumi, reveals that 58 percent of organizations feel their cloud security is inadequate, underscoring the critical need for enhanced security measures in cloud environments.
This echoes research from other sources which show a 75 percent increase in cloud intrusions from 2022 to 2023, and 44 percent of organizations having faced a cloud data breach -- 14 percent reporting one in the past year.
Attackers target holidays and weekends to catch enterprises off guard


Cyberattackers are targeting holidays and weekends to cause maximum disruption, yet many businesses remain underprepared outside of standard working hours.
A new report from Semperis, based on a survey of almost 1,000 cybersecurity professionals, shows that 86 percent of surveyed organizations in the US, UK, France and Germany that were attacked were targeted during a holiday or weekend.
How RISC-V standards are changing the world [Q&A]


You may have heard of RISC-V -- usually pronounced 'risk-five' -- it's an instruction set architecture originally designed to support computer architecture research and education but which has evolved to become a standard open architecture for industry.
We spoke to Calista Redmond, CEO of standards body RISC-V International to find out more about the latest developments.
Malicious emails bypass SEGs every 45 seconds


New data from Cofense shows one malicious email bypassing customers' Secure Email Gateways (SEGs) every 45 seconds -- up from every 57 seconds in 2023.
The report also highlights the rapid rise in Remote Access Trojans (RATs) and the evolution of credential phishing techniques that exploit trusted platforms. Remcos RAT emerged as the predominant malware, using methods to bypass SEGs with ease.
Microsoft and Atom Computing set to launch commercial quantum computer next year


Quantum computing has up to now been one of those things that's always seemed to be on the horizon but just tantalizingly out of reach.
Now though, Microsoft in partnership with Atom Computing have used the Ignite conference to announce a breakthrough in quantum computing that they say will allow them to deliver quantum computers based on this technology to commercial customers next year. Those machines will feature over 1,000 physical qubits.
With AI agents, Microsoft aims to change the way you work


We're constantly told that AI will make our lives easier by taking on the tedious everyday tasks that we don't really like doing. Who wouldn't want to have an AI agent do some of your office donkey work?
That's what Microsoft is offering with new out-of-the-box, purpose-built agents in Microsoft 365 Copilot that will take on unique roles, working alongside or on behalf of a team or organization to handle simple, mundane tasks as well as complex, multi-step business processes.
Use of GenAI in development raises security concerns


Most developers (85 percent) and security teams (75 percent) have security concerns over relying on GenAI to develop software.
A report from Legit Security, based on a survey of over 400 security professionals and software developers across North America, finds 96 percent of security and software development professionals report that their companies use GenAI-based solutions for building or delivering applications.
Businesses taking longer to recover from cyber incidents


In 2024, businesses have reported taking an average of 7.3 months to recover from cybersecurity breaches -- 25 percent longer than expected and over a month past the anticipated timeline of 5.9 months.
This is among the findings of the latest Global Security Research Report from Fastly which also shows that recovery times are even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each -- 70 percent above the average -- and their recovery times stretched to 10.9 months.
The future of facilities management software [Q&A]


The facilities management sector is in the midst of a digital evolution, driven by trends such as sustainability and smart buildings, and there are also increased regulatory demands in the mix.
We spoke to Phil Meyers, CEO of mpro5, to discuss what this means for facilities management software providers.
Meet Daisy, the AI granny designed to waste scammers' time


We all know how frustrating it can be to get scam phone calls, whether they're pretending to be your bank or trying to claim your computer needs fixing.
Of course it can be fun to keep them talking and string them along for a while, but most of us don't have the time to do that. Now though UK telco Virgin Media O2 has created an AI pensioner specifically designed to waste the scammers' time so we don't have to.
How enterprises can maximize the value of automation [Q&A]


The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.
So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.
New platform protects organizations by assuming they've been breached


Most organizations now recognize that some form of cybersecurity breach is a matter of when rather than if. So why not just assume that the site has been breached in the first place?
That’s exactly what Tide Foundation has done with its new platform. TideCloak is an identity, immunity, and access management system that starts with a 'breach assumed' approach.
AI redefines priorities for IT leaders


A new survey from Flexera shows that 42 percent of IT leaders say they believe if they could integrate AI, it would make the most difference to their organizations.
The study surveyed 800 IT leaders from the US, UK, Germany and Australia to determine how IT decision makers' priorities have evolved over the past 12 months and outline their focus for next year.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.