Enterprise tech buyers reveal their 2025 spending priorities
A new report from Crane Venture Partners looks at the priorities of senior executives who collectively influence $3–$4 billion in annual technology spending.
Respondents include leaders from major companies such as Microsoft, Bloomberg, Procter & Gamble, Kohl's, Arm, Comerica Bank, and NBC Universal. The report finds that while 100 percent of surveyed executives believe AI will shape enterprise operations, only 10 percent have so far fully integrated AI into their workflows.
The security threats organizations are most concerned about [Q&A]
The cybersecurity landscape is constantly evolving and organizations need to stay up to date if they're to adequately protect themselves.
At the end of last year, O'Reilly released its 2024 State of Security survey, which analyzes the threats that concern frontline practitioners most, the projects they're implementing to safeguard systems and infrastructure, the skills companies are hiring for, and more.
Ransomware up fourfold as threats get more complex
Analysis of data logged by the Barracuda Managed XDR Security Operations Center shows ransomware threats have increased by four times over the last year.
In 2024, Barracuda Managed XDR logged 11 trillion IT events -- 350,000 per second. Just over a million were flagged as a potential risk and of these, 16,812 were identified as high-severity threats that required immediate defensive action. That’s a small percentage but highlights the need for powerful engines, analysis tools and human expertise to detect them.
Nearly half of organizations suffer third-party security incidents
New research finds that 47 percent of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network.
The study, carried out by the Ponemon Institute for Imprivata, also shows 64 percent of respondents believe these types of third-party data breaches will either increase or remain at alarmingly high levels over the next 12-24 months.
Fraud-as-a-Service allows cybercriminals to launch complex attacks with minimal skills
User-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes are widely available on the dark web according to the latest 2024 Report on Global Identity Fraud from AU10TIX.
FaaS platforms provide all the tools, templates and automation that fraudsters need, including deepfake generators to create synthetic selfies and videos, botnets to automate mass-scale account creation and takeover, and phishing kits for email and web-based scams.
The rise of adversarial AI threatens smaller organizations
Email remains a vital channel for business communications, but the availability of easy-to-use AI tools makes protecting the inbox a challenge as it's easier than ever for cybercriminals to launch sophisticated attacks.
A new report from Abnormal Security charts the rise of adversarial AI which has seen a 54 percent year-on-year rise in business email compromise attacks.
Deepgram launches improved AI-based voice transcription for enterprises
Accurate voice transcription is important for enterprises, whether it's to ensure appropriate responses or create accurate records.
However some situations make this challenging to achieve -- where there are multiple speakers or noisy backgrounds, for example. With the launch today of Nova-3, its most advanced speech-to-text (STT) model to date, Deepgram is looking to offer greater accuracy along with self-service customization to tailor results for industry-specific needs.
Enterprises under growing pressure to demonstrate readiness for cyber threats
A new study commissioned by Immersive Labs shows 96 percent of cyber leaders believe effectively communicating cyber-readiness to senior leadership and boards will be crucial in 2025, driven by regulatory compliance requirements and an increase in attacks.
The survey conducted by Sapio Research reveals that 49 percent of those surveyed report having experienced a cyberattack in the past year.
Regulated industry execs say security detection tech falls short
A new report reveals that 74 percent of IT security directors in regulated industries in the US and UK find detection-based security technologies outdated and inadequate.
The study from Everfox shows more than three-quarters of those polled believe security teams in regulated industries must shift their mindset from detecting threats to preventing them. 62 percent agree that AI and emerging malicious actor trends are increasing attack sophistication.
Ensuring transparency when deploying AI [Q&A]
There are many factors to consider when deploying AI into an organization, not least of which is maintaining transparency and trust in the process.
We spoke to Iccha Sethi, VP of engineering at Vanta, to learn more about why transparency is so important and how governments and enterprises are responding to this challenge.
1Password takes pole position with F1 team
Identity security company 1Password is announcing that it will become Oracle Red Bull Racing's exclusive cybersecurity partner in a multi-year deal.
The Formula 1 team will implement 1Password Extended Access Management to strengthen its security posture and safeguard critical information across devices, applications, and locations. The 1Password branding will also be shown on the steering wheel screen of both Max Verstappen and Liam Lawson’s RB21 cars.
Number of active dark web ransomware groups up 38 percent in 2024
A total of 94 ransomware groups listed victims in 2024 (a 38 percent increase on 2023) with 49 new groups observed, according to a new report, reflecting further complexity in the ransomware landscape.
The study from Searchlight Cyber also finds an 11 percent increase in the number of total victims posted on ransomware leak sites in 2024 (5,728) compared to 2023 (5,081).
Sophisticated attack strategies target smaller businesses
Hackers are taking the methods and strategies tested on larger companies and applying them to organizations of every size.
Advanced evasion techniques -- once exclusive to advanced persistent threats -- have become the new normal, according to the latest threat report from Huntress. Techniques include endpoint detection and response (EDR) tampering, bring your own vulnerable driver (BYOVD) privilege escalations, and User Account Control (UAC) bypasses.
Incorporating 'secure by design' into the software supply chain [Q&A]
Developers historically have not been all that security savvy, but as software supply chain security becomes a larger and larger problem every day, enterprises are going to need to secure packages before they are put into production environments.
We spoke to Phylum CEO, Aaron Bray, to learn more about 'secure by design' and how it can make sure developers are being taught security as part of their development and training process and are also being provided with the necessary resources to code securely from the beginning.
GenAI is changing enterprise priorities with privacy a major concern
The latest Enterprise Cloud Index (ECI) survey from Nutanix shows that that while 80 percent of organizations have already implemented a GenAI strategy, implementation targets vary significantly.
Organizations are eager to leverage GenAI for productivity, automation, and innovation, but they also face critical hurdles in the form of data security, compliance, and IT infrastructure modernization. 95 percent of respondents agree that GenAI is changing their organization’s priorities
