Ian Barker

CI and CD -- what they are and why they're not the same [Q&A]

You'll often hear CI (continuous integration) and CD (continuous deployment) mentioned in the same breath, often as CI/CD, and indeed both are part of improving the quality, speed and efficiency of software development.

However, Stephen Atwell, principal product manager at Armory, argues that they shouldn't be considered as related functions. We spoke to him to find out why.

Continue reading

Businesses worry more about reputational damage than financial loss following a breach

Following a cloud breach, the top three worries of businesses are reputational damage and loss of public trust (39 percent); loss of sensitive data (36 percent); and a loss of revenue generating services (35 percent).

A new report from Illumio, based on a survey of 1,600 IT and security decision makers by Vanson Bourne, finds that in the last year, nearly half of all data breaches (47 percent) originated in the cloud, and more than six in 10 respondents believe cloud security is lacking and poses a severe risk to their business operations.

Continue reading

96 percent of organizations vulnerable due to mismanaged secrets

Data secret

A new study from Akeyless Security finds that modern DevOps and multi-cloud environments are susceptible to secrets-related breaches and that over 70 percent of organizations have had credentials, certificates and keys breached in the last two years.

Based on responses from over 200 professionals with security responsibility in organizations with over 1,000 employees, the report finds one in three security professionals have ranked secrets management among their top five priorities.

Continue reading

Only 14 percent of enterprises are ready for AI

Artificial intelligence

New research from Cisco reveals that just 14 percent of organizations globally are fully prepared to deploy and leverage AI-powered technologies.

The company’s first AI Readiness Index surveyed over 8,000 global companies, and was developed in response to the accelerating adoption of AI, a generational shift that is impacting almost every area of business and daily life.

Continue reading

New non-profit seeks to get justice for cybercrime victims

Internet and cyber crimes cause financial loss and have emotional impact for people around the world. Now though a new non-profit organization has been formed to pursue justice for victims of these crimes.

Intelligence for Good aims to make the internet a safer place for everyone, and to ensure that cybercriminals are not only brought to justice but fear the consequences of scamming innocent people.

Continue reading

Organizations flock to generative AI despite security concerns

intelligence

A new survey of over 900 global IT decision makers shows that although 89 percent of organizations consider GenAI tools like ChatGPT to be a potential security risk, 95 percent are already using them in some form within their businesses.

The research for Zscaler, carried out by Sapio Research, also reveals 23 percent of those using GenAI aren't monitoring the usage at all, and 33 percent have yet to implement any additional GenAI-related security measures -- though many have it on their roadmap.

Continue reading

The blurring lines between data protection and security [Q&A]

The threat landscape has evolved a lot over the past few years as cybercriminals become more and more sophisticated. This has forced change within the industry and blurred the lines between the previous separate data protection and security strategies.

We spoke to Jason Gerrard, senior director of international systems engineering at Commvault, to find out more about why this is happening and what it means for the future of the data protection and cybersecurity industries.

Continue reading

Malwarebytes for Business rebrands as 'ThreatDown'

In a bid to distinguish between its consumer and business offerings, Malwarebytes is relaunching its endpoint security platform for business as ThreatDown.

ThreatDown comes with a new Security Advisor dashboard and is available as a number of bundles that combine protection, threat intelligence, and expertise for IT-constrained organizations, reducing complexity and offering user-friendly security solutions.

Continue reading

How contextual analysis can offer insight into the human element behind cyber threats [Q&A]

Cyber threats can come in many forms, over email, messaging platforms or social media. But what they all have in common is that they seek to exploit human weaknesses.

We spoke to Chris Lehman, CEO of SafeGuard Cyber, to discover how contextual analysis of business conversations can help determine if a conversation is benign or if something suspicious is taking place, allowing action to be taken.

Continue reading

Governance and security are top priorities for data teams

With ever more organizations rushing to adopt AI solutions, a new report suggests that implementing stronger data governance and security controls will be a higher priority for data teams as we head into 2024.

The report from data security company Immuta finds that only half of respondents say their organization's data security strategy is keeping up with AI's rate of evolution.

Continue reading

Organizations plan to use more AI in the next few years

Artificial intelligence

A new survey from Snow Software reveals that 72 percent of IT leaders believe their organization will be using more AI in the next two to three years.

The poll of 800 IT leaders from the United States, United Kingdom, Germany and Australia set out to assess how IT decision makers' priorities have shifted over the past 12 months and outline their top areas of focus as they head into the new year.

Continue reading

Enterprises struggle with a changing security and compliance landscape

business security

A new report from Vanta shows 67 percent of businesses say they need to improve security and compliance measures with 24 percent rating their organization's security and compliance strategy as reactive.

The expansion of attack surfaces in a post-pandemic hybrid world, combined with shrinking teams and budgets and the rapid rise of generative AI, are fueling an urgent need for companies to improve, and prove, their security posture.

Continue reading

Who's responsible for securing the software supply chain?

Couple with laptops

A new poll of over 500 security decision makers and developers shows a disconnect and even some distrust between CISOs and developers relating to how security-conscious each department is within the organization and what their roles are.

The Harris Poll conducted for Chainguard finds a majority of both developers and CISOs view software supply chain security as a top priority in their roles (70 percent and 52 percent respectively).

Continue reading

How the .ai domain is benefiting cybercriminals (and a small Caribbean island)

Artificial intelligence

Given all the interest in AI at the moment it's no surprise that cybercriminals are keen to cash in with a rise in AI themed attacks.

One way of doing this is with a .ai domain name. An unexpected beneficiary of this is the British Overseas Territory of Anguilla which has .ai as its country code.

Continue reading

The rise of mobile app overlay attacks and how to defend against them [Q&A]

A major new threat has made its presence felt in the last few months. Cybercriminals have expanded the use of screen spoofing or overlay attacks from web applications to trusted mobile apps.

What’s more, the availability of as-a-service technology has lowered the threshold for attacks. We spoke to Dr. Klaus Schenk, SVP security and threat research at Verimatrix, to learn more about how these attacks work and what can be done to guard against them.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.