Ian Barker

How to unlock the power of real-time analytics [Q&A]

Data analytics

The increased need for real-time analytics is driven by the rise of the on-demand economy, where consumer expectations for immediate access to products, services, and information are transforming how businesses operate and compete.

We spoke to Kishore Gopalakrishna, co-founder and CEO of StarTree, to discuss the need for real-time data capabilities, the strategic utilization of real-time data to enhance operational efficiency and competitiveness, and the essential technology and operational considerations for building a robust analytics infrastructure.

Continue reading

Security pros worried about widening attack surface

Hacker

A new report from Red Canary finds 87 percent of respondents have been impacted by a security incident they were unable to detect and neutralize in the past year, resulting in data compromise, outages, fines, audit failures and reputational damage.

Based on a study of 700 cybersecurity leaders it finds 73 percent say their attack surface has widened in the past two years, by an average of 77 percent, with 64 percent admitting to having knowledge deficits around securing new technologies.

Continue reading

94 percent of security professionals are worried about deepfakes

DeepFake Artificial intelligence abstract human 3d face

New research from email security company IRONSCALES finds near-ubiquitous concern surrounding the security implications of deepfakes while only 42 percent of respondents feel very confident about their organization’s ability to defend against deepfake-enabled attacks.

Based on a survey of over 200 IT processionals the report finds 94 percent have some level of concern surrounding deepfakes, and 74 percent say they are 'very concerned.'

Continue reading

New tools help ensure quality of AI-generated code

AI Code Fix@2x

Using AI can increase the speed of code development, but it comes with an increased risk of bad code seeping into codebases.

Clean code solutions company Sonar is releasing two new features, Sonar AI Code Assurance and Sonar AI CodeFix. These deepen Sonar's commitment to improving the developer experience and increasing developer productivity to support the delivery of better code.

Continue reading

Too many alerts lead security pros to worry they'll miss an attack

Banner with yellow scam alert sticker pattern. Attention sign. Cyber security icon. Caution warning sign sticker. Flat warning symbol.

A new report reveals that 71 percent of security operations center practitioners worry they will miss a real attack buried in a flood of alerts, while 51 percent believe they can't keep pace with the increasing number of security threats.

The report from Vectra AI shows 47 percent of SOC practitioners don't trust their tools to work the way they need them to work, while 54 percent say the tools they work with actually increase the SOC workload instead of reducing it.

Continue reading

Critical vulnerabilities affect 80 percent of manufacturing companies

The factory automated conveyor shop on production of strawberry jam.

A new report finds that 80 percent of manufacturing companies have critical vulnerabilities putting them at high risk for exploitation.

The study of 5,000 manufacturing companies by Black Kite finds 69 percent of companies analyzed have exposed credentials in the last 90 days.

Continue reading

Do you know where your sensitive data is?

Confused lost data

Around a quarter of businesses don't know where their sensitive data is according to a new report from Normalyze and the Enterprise Strategy Group (ESG).

As enterprises move more operations to the cloud, the volume and exposure of sensitive data stored in public cloud services is also rapidly increasing. Despite efforts by security teams to manage data risks, many organizations lack clarity on where data is located, how sensitive it is, and who has access to it.

Continue reading

Hacktivist activity drives a rise in DDoS attacks

Hacktivism hacktivist

The first half of this year has seen a 43 percent increase in the number of application-layer attacks and a 30 percent increase in volumetric attacks, especially in Europe and the Middle East, according to the latest threat report from NETSCOUT.

The attacks involve a range of threat actors, including hacktivists, targeting critical infrastructure in the banking and financial services, government and utilities sectors.

Continue reading

Poor password habits still an issue worldwide

Password on a sticky note

To mark the start of this year's Cybersecurity Awareness Month, Dashlane has published its latest report into global password health which shows that although the share of reused passwords has dropped it remains worryingly high.

The share of password reuse remains between 40 and 50 percent across regions worldwide, putting individuals and companies at greater risk of account takeover.

Continue reading

How businesses need to address the security risks of LLMs [Q&A]

LLM

Businesses are increasingly adopting AI and large language models in search of greater efficiency and savings. But these tools also present risks when it comes to cybersecurity.

We spoke to Aqsa Taylor, director of product management at Gutsy, to learn more about these risks and what organizations can do to address them.

Continue reading

Almost 90 percent of organizations suffered security incidents in the last three years

Data breach hacking

A new report shows 89 percent of organizations suffered at least one security incident in the past three years. 52 percent experienced at least four, and 24 percent were victims of an extraordinary 11 incidents.

The 2024 Secure Infrastructure Access from Teleport surveyed 250 senior US and UK decision-makers, assessing enterprise performance in infrastructure access security, dividing respondents into three groups based on a number of factors.

Continue reading

New LLM assistant helps pinpoint security issues

Security

Malicious actors have been quick to exploit AI, but often security teams are under-equipped with AI solutions to ensure adequate defense.

Red Sift is launching an upskilled LLM assistant that identifies and diagnoses misconfigurations and exposures across email, domains, and internet-facing assets, supporting security teams to prevent incidents before they happen.

Continue reading

The top enterprise cloud threats of 2024

Enterprise cloud

A new report from IBM X-Force looks at the biggest risks enterprises are facing and highlights how attackers know that credentials are the keys to cloud environments, making them highly sought-after on dark web marketplaces.

Attackers are using phishing, keylogging, watering hole and brute force attacks to harvest credentials. Also dark web research highlights the popularity of infostealers, used to steal cloud platform and service-specific credentials.

Continue reading

Free calendar app offers quantum-safe encryption

Tuta calendar

Quantum computing presents a substantial problem for securing systems because of its potential to crack existing encryption protocols.

However, the industry is beginning to gear up to face the threat. Tuta, the email provider with the world's first quantum-safe encryption for email, is now launching its new stand-alone encrypted calendar app.

Continue reading

Non-human identities present a major security risk

Non-human identity fingerprint

Compromised non-human identities have led to successful cyberattacks at that 66 percent of enterprises.

A new report from AppViewX, based on a survey of almost 370 IT, cybersecurity, and DevOps professionals by Enterprise Strategy Group (ESG), also shows 57 percent of the episodes where organizations suffered a successful attack tied to NHI compromises got the board of directors attention.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.