Cybersecurity qualification adds new quantum and AI modules


The Chartered Institute of Information Security (CIISec) is announcing the addition of artificial intelligence (AI) and quantum computing modules to its CyberEPQ qualification for all students from September 2024 onwards.
Available to any student over the age of 14 in the UK, the CyberEPQ (Extended Project Qualification) is aimed at bringing new and diverse talent into the industry, representing an ideal stepping stone into a cybersecurity career.
UK government announces new plans to protect data centers


Data centers powering the UK economy will be designated as Critical National Infrastructure alongside energy and water systems under new government plans.
This is the first Critical National Infrastructure (CNI) designation in almost a decade, since the space and defense sectors gained the same status in 2015.
Nord Security launches eSIM for businesses


You probably already know about how eSIMs work and their advantages when travelling to different countries.
Of course this functionality is useful for businesses as well as individuals and Nord Security -- the company behind NordVPN -- is launching a new version of its Saily eSIM service aimed specifically at business users.
How did you do that? Almost half of businesses don't understand employee working habits


A new survey of 400 senior US and UK IT decision makers (ITDMs) finds 45 percent of organizations do not conduct any employee journey mapping, leaving them in the dark about how employees complete their work and what digital friction they face.
The study from Scalable Software finds the majority of ITDMs believe they have sufficient data on the digital employee experience (DEX). 92 percent of ITDMs say they have enough insight into the configuration, stability and performance of endpoints and applications to optimize DEX.
How to overcome today's intelligence challenges to uncover the threats that matter [Q&A]


Threat intelligence is critical to protection efforts, but businesses often struggle with effective management and correlation of this data to help prioritize their efforts.
We spoke to Richard Struse, chief technology officer and co-founder of Tidal Cyber, to discuss the challenges presented when organizations scramble to update systems that aren’t actually vulnerable or stop threats that would essentially have no impact on their business.
Only 37 percent of organizations are prepared for AI


A new survey finds that while 94 percent of business leaders say AI is a top C-suite priority and 91 percent agree it provides a competitive advantage, only 37 percent are fully prepared to implement AI projects now.
The study from Riverbed of 1,200 decision makers globally finds that currently 54 percent of leaders say the primary reason for using AI is to drive operational efficiencies over growth (46 percent), however, by 2027 58 percent of organizations expect AI will primarily be a growth driver.
Remote access tools leave OT systems at risk of attack


Remote access tools are creating cybersecurity risks and operational burdens for operational technology (OT) systems, according to a new report.
The study, from the Claroty Team82 threat research team, using data from more than 50,000 remote-access-enabled devices shows that the volume of remote access tools deployed is excessive, with 55 percent of organizations having four or more and 33 percent having six or more.
Free tool for service providers helps identify security and compliance gaps


Compliance automation software company Secureframe has launched its free Gap Assessment Tool to help service partners including MSPs, MSSPs, vCISOs, and IT security consultants identify gaps in security posture or compliance status.
It's designed to address a common challenge faced by IT service providers -- uncovering areas of non-compliance and potential risk while demonstrating value to clients.
Platform engineering hampered by development needs


Many organizations rely on platform engineering to introduce automation, self-service capabilities, and streamlined workflows into software development.
But a new report from Forrester for digital experience specialist the Qt Group finds that 63 percent of embedded software from organizations with a platform engineering strategy is still created using custom, ad hoc solutions.
Enterprise mobile devices see increased attacks


A new report on the mobile threat landscape from Lookout reveals a 40.4 percent jump in mobile phishing attempts and malicious web attacks targeting enterprise organizations.
More than 80,000 malicious apps were detected on enterprise mobile devices. These threats can vary widely, from invasive permissions and riskware that pose significant compliance risks to sophisticated spyware capable of tracking devices, stealing data, eavesdropping on conversations and accessing the user' camera and microphone.
Attacks on manufacturing companies up 105 percent


The manufacturing and industrial sectors have seen a dramatic rise in cyberattacks, accounting for 41 percent of cyber incidents in the first half of 2024, an increase of 105 percent.
A new threat intelligence report from Ontinue also highlights a rise in state-sponsored campaigns from China increasingly focused on information control and leveraging zero-day exploits, further complicating attribution and escalating the global threat landscape.
The role of AI in securing identity [Q&A]


Identities are probably the biggest attack surface for organizations in today's world as employees rely more on systems and apps to do their jobs.
Mapping identity and access data from the large, disparate, and often disconnected, mix of on-premise and cloud systems that enterprises use is a major challenge.
Stealth mode browser helps spot sneaky phishing attempts


A new zero-trust stealth mode browser is being launched by SlashNext, designed to see through obfuscation techniques commonly used by threat actors, and deliver enhanced protection against phishing and malware.
In recent years, well-intentioned companies offering free services such as CAPTCHA solutions and content delivery networks have inadvertently aided threat actors. For example, Cloudflare's Turnstile Services and similar CAPTCHA solutions are commonly exploited as obfuscation techniques. CAPTCHAs are used to block the crawlers employed by security services from accessing and analyzing phishing sites.
What's needed for SBOM success? [Q&A]


Enterprises are increasingly looking to software bills of materials (SBOM) to understand the components inside the tech products they use in order to secure their software supply chain.
But do SBOMs really provide value? And how can they be used more effectively? We talked to Varun Badhwar, CEO and co-founder of Endor Labs, to find out the keys to using SBOMs successfully.
Starting them young -- KnowBe4 releases free children's cybersecurity kit


In an increasingly digital world, youngsters are just as a risk as the rest of us -- perhaps more so -- which means cybersecurity education for children is crucial.
Security awareness training company KnowBe4 has released its Children's Interactive Cybersecurity Activity Kit, featuring an AI safety video, a password video game, a cybersecurity activity book, and middle school lesson plans.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.