Ian Barker

Smartphone phishing

Credential phishing attacks up over 700 percent

Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.

The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.

By Ian Barker -
hands working with AI

More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025

Artificial intelligence has been one of the fastest growing areas in the tech sector over the past few years.

As AI becomes more commonly adopted what changes can we expect to see happening in 2025? Here are some expert views.

By Ian Barker -
Enterprise data breach

Data breach trends -- progress, challenges, and what's next [Q&A]

Despite organizations putting in place better security controls the pace of data breaches shows no signs of slowing down.

We spoke to Jon Fielding, managing director, EMEA at Apricorn, to discuss the latest data breach trends, the progress that's been made and where more work is needed to address security threats.

By Ian Barker -
Non-human identity digital

More complexity, more non-human IDs and shifting strategies -- identity predictions for 2025

Identity is at the root of most cyberattacks, but although we're seeing greater adoption of things like biometrics we still rely heavily on passwords.

There's added complication in the form of soaring numbers of machine identities too. Here's what some industry leaders think the identity landscape has in store for 2025.

By Ian Barker -
Artificial-intelligence

Enterprises struggle to deliver AI agents but new tool could help

Businesses are often under pressure to deliver AI agents, but development teams are struggling with siloed tools, fragmented governance and limited functionality that makes promising prototypes unfeasible in production.

According to a survey of over 1,000 enterprise technology leaders released today by Tray.ai, 42 percent of respondents need access to eight or more data sources to deploy AI agents successfully -- which is impossible when SaaS app agents are restricted in scope by the integrations to which their host applications have access.

By Ian Barker -
API

Newly launched APIs found by attackers in under 30 seconds

Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and less secure. New research from Wallarm shows the average time for a new API to be found by attackers is just 29 seconds.

The research used a honeypot to look at API activity and in its first 20 days in November the lngest time taken for a new API to be discovered was 34 seconds.

By Ian Barker -
Financial technology

Easier payments, robot assistants and improved accessibility -- fintech predictions for 2025

The banking and finance sector has already seen some major changes in technology use in recent years. These show no signs of slowing down but newer developments like AI are starting to have an impact too.

Here are some expert views on what may be in store for the fintech sector in the year to come.

By Ian Barker -
Enterprise cyberattack

Access tokens and service accounts next target for cyberattacks

New research shows 88 percent of security leaders believe machine identities, specifically access tokens and their connected service accounts, are the next big target for attackers.

The survey from Venafi of 800 security and IT decision-makers from large organizations across the US, UK, France and Germany, finds 56 percent have experienced a security incident related to machine identities using service accounts in the last year.

By Ian Barker -
Deepfake plan

Social media deepfake scams push fraudulent investment schemes

Social media has seen a 335 percent boom in new scams using deepfake videos and company-branded posts to lure victims into fraudulent investment schemes.

The latest threat report from ESET tracks these as HTML/Nomani, the countries with the most detections being Japan, Slovakia, Canada, Spain, and Czechia.

By Ian Barker -
Data analytics graphs

Building trust in telemetry data [Q&A]

With the increasing importance of observability in digital operations, businesses need to ensure the reliability and relevance of their telemetry data in order to maintain system and application performance, debug, troubleshoot, respond to incidents and keep their systems secure.

We spoke to Tucker Callaway, CEO of Mezmo, to discuss the strategic considerations and concerns enterprises face in managing and optimizing their telemetry data.

By Ian Barker -
Quantum Qubits

Threats to encryption, security fears and a race to gain a competitive edge -- quantum predictions for 2025

As we approach the end of the year it's time to start wondering what the next one will have in store. As always we'll be running a series of pieces looking at what industry experts think will be key tech industry trends for 2025.

We start with a look at quantum, which is getting ever closer to widespread commercial deployment and could open up great opportunities but is also leading to increasing fears about security.

By Ian Barker -
2025 futuristic AI concept with chatbot and cityscape background at night.

Consumers resolve to learn AI in 2025

At the dawn of a new year most people plan to make lifestyle changes like losing weight or giving up smoking. But new research commissioned by Tech Show London reveals that over 12 million UK consumers plan to make learning AI a New Year's resolution for 2025.

This growing interest in mastering AI signals a shift towards greater understanding and engagement with the technology that is increasingly shaping our lives. 46 percent of those surveyed agree that AI will fundamentally transform our relationship with technology.

By Ian Barker -
file transfer concept with folder and files transfering move with security and padlock and team people with modern flat style - vector

The future of managed file transfer (MFT) in the era of digital transformation [Q&A]

In a time when there's a greater need than ever for remote and online collaboration, the secure transfer of information and digitized records is a non-negotiable essential.

As more enterprise employees create and share increasing amounts of sensitive content, organizations need to be able to manage all of their sensitive data transfers between partners, customers, users and systems, have complete visibility and control over where data goes and ensure the highest levels of security.

By Ian Barker -
Worry scared stress fret

70 percent of cybersecurity leaders worry about personal liability

Stories of CISOs being held personally liable for cybersecurity incidents has negatively affected their opinion of the role for 70 percent of respondents to a new survey.

At the same time 34 percent in the study for BlackFog, of 400 IT decision makers across the US and UK, believe that the trend of individuals being prosecuted following a cyberattack was a 'no-win' situation for security leaders: facing internal consequences if they report failings and prosecuted if they don't.

By Ian Barker -
explode robot AI

Demand for AI could exceed computing capacity

AI, and generative AI in particular, is expected to greatly enhance productivity within work processes. Some studies estimate that generative AI could contribute between $2.6 trillion and $4.4 trillion annually to the economy.

However, AI infrastructure is costly because the underlying algorithmic problems are extremely computationally intensive and this means there's a potential gap between demand and the capacity needed to meet it.

By Ian Barker -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

© 1998-2025 BetaNews, Inc. All Rights Reserved.