Accusoft uses IBM AI to automate document tagging


Document processing specialist Accusoft is releasing new Auto Tagging and Classification modules within its PrizmDoc secure document viewer.
The modules use the IBM watsonx data and AI platform with the IBM Granite foundation model to automate manual tagging and classification providing consistency and ensures documents are meticulously organized, easily searchable, and compliant with regulations.
Over half of enterprises suffer data breaches in non-production environments


A new study shows 91 percent of organizations are concerned about the expanded exposure footprint across non-production environments (including software development, testing, and data analytics).
Once a production dataset is copied many times over into non-production environments, more workers have access to it and the data is no longer subject to the same strict security controls.
72 percent of executives targeted by cyberattacks


Senior executives are prime targets for cybercriminals, with 72 percent of surveyed cybersecurity professionals in the US reporting that this group has been targeted by attacks in the past 18 months.
The study from GetApp also highlights the rising use of AI-generated deepfakes, which have been involved in 27 percent of the attacks.
Raspberry Pi 5 now offers less memory and a lower price


The Raspberry Pi 5 was first released almost a year ago, today the Raspberry Pi Foundation is unveiling a new 2GB version of the popular one-board computer.
The lowest-cost Raspberry Pi 5 has so far been the 4GB variant, priced at $60. The new 2GB Pi comes in at only $50 and is built on a cost-optimised D0 stepping of the BCM2712 application processor.
Combating information overload with different data sources [Q&A]


The majority of teams today are contending with too much data which means they struggle to generate meaningful insights from their information, and can become overwhelmed by the sheer volume.
We spoke to CallMiner CMO Eric Williamson who believes sourcing customer feedback from different sources might help solve the problem.
Enterprises need to update application security practices


Organizations urgently need to modernize their application security practices so that they can support growth and mitigate risks according to a new report.
Thew study from Legit Security and TechTarget's Enterprise Strategy Group (ESG) finds nearly all organizations reporting difficulties in fixing vulnerabilities after applications are deployed, reinforcing the significance of incorporating security processes and tools in the build process.
The challenges of securing Active Directory [Q&A]


Microsoft Active Directory is used by a majority of the world’s organizations. But Cyberattacks and misconfigurations targeting AD have surged in recent years, leading to critical outages and data loss.
We spoke to Bob Bobel, CEO of Cayosoft, about how to address critical weaknesses in enterprise infrastructure associated with Microsoft Directory services.
DDoS attack activity soars in first half of 2024


In the first half of 2024, web DDoS attacks surged globally 265 percent compared to the second half of 2023, according to the latest threat analysis report from Radware.
Organizations in EMEA were the primary target of web DDoS attacks between January and June of 2024, being subject to more than 90 percent of the attacks.
Why automation isn't the answer to zero-day attacks [Q&A]


Last year saw almost 100 zero-day attacks, putting a strain on security teams and becoming known as the 'Hot Zero-Day Summer.'
In response to these attacks, the first instinct of many organizations has been to turn to automation. But Marc Rubbinaccio, manager, compliance at Secureframe, doesn't believe that this is the right approach. We spoke to him to find out more.
BSOD hits one in 200 devices daily


New analysis of system crashes shows that, without preventative IT in place, one in every 200 devices falls victim to the dreaded blue screen of death (BSOD) per day, even under 'good' operating conditions.
The research from Nexthink shows the recent CrowdStrike outage pushed the number as high as one in 10.
Enterprises make significant investments in AI


Almost one in 10 decision-makers in both the UK (eight percent) and US (seven percent) are planning to spend over $25 million on AI this year.
A survey from Searce, of 300 C-Suite and senior technology executives at organizations with more than $500 million, finds that for US decision-makers, data privacy and security are ranked as the number one hurdle to adopting AI (20 percent), whereas UK decision-makers rank lack of qualified talent as their number one challenge (19 percent).
How are CISOs coping with developer gatekeeping? [Q&A]


CISOs are under the microscope to prove they can reduce vulnerabilities in the software development life cycle -- particularly, that they can do so from the start of code creation. As such, CISOs are searching for the most effective way to ensure the security awareness of their developers before they take on the responsibility of writing and introducing code.
Secure Code Warrior's co-founder and CTO, Matias Madou, believes that a 'gatekeeping' standard -- where developers are incrementally given access to more sensitive projects -- is the key to building a strong foundation for secure coding processes.
Enterprises face major challenges with cloud costs and more


A new study reveals that 93 percent of enterprise platform teams face persistent challenges with cloud costs, Kubernetes complexity and developer productivity.
The research from Rafay Systems shows that despite the widespread adoption of platform teams within IT organizations, survey respondents across the board confirm that these teams often are stretched to their limits managing complex multi-cluster Kubernetes and cloud environments.
VPN demand surges in the face of government social media restrictions


Governments, particularly those with a more authoritarian bent, really aren't keen on social media as it threatens their ability to control the narrative.
They especially don't like X since Elon Musk's takeover and stated commitment to free speech. In Venezuela the government recently banned the platform for 10 days. Even in the UK fingers have been pointed at the influence of social media following recent riots.
Why a 'Swiss cheese' approach is needed to combat deepfakes [Q&A]


Deepfakes are becoming more and more sophisticated, earlier this year a finance worker in Hong Kong was tricked out of millions following a deepfake call.
With the deepfake fast becoming a weapon of choice for cybercriminals, we spoke to Bridget Pruzin, senior manager -- compliance and risk investigations and analysis at Convera, to learn why she believes a 'Swiss cheese' approach, layering controls like unique on-call verification steps and involving in-person verification, is crucial to effectively defend against these scams.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.