Ian Barker

Economic uncertainty drives digital transformation efforts

Digital transformation

Enterprises plan to invest $33 million in digital transformation projects in the next 12 months, according to a survey of 600 senior IT decision makers.

But the research, from database platform Couchbase, also finds a shift in priorities. 78 percent of IT decision makers confirm their main priorities for transformation have changed in the last three years, and 54 percent say their digital transformation focus has become more reactive to market changes and customer preferences, in order to help the wider organization stay agile.

Continue reading

Only two percent of organizations feel confident in their cybersecurity strategies

While 75 percent of organizations have made significant strides to upgrade their infrastructure in the past year and 78 percent have increased their security budgets, only two percent of industry experts are confident in their security strategies, according to a new report.

The study, from critical infrastructure protection specialist OPSWAT, also finds most organizations have embraced public cloud hosting for their web applications, with an overwhelming 97 percent already employing or planning to implement containerization.

Continue reading

AI will outperform the average hacker in five years -- say hackers

Robot hacker

The latest 'In the Mind of a Hacker' report from Bugcrowd, which includes responses from 1,000 white hat hackers across 85 countries, finds 55 percent saying that generative AI can already outperform hackers or will be able to do so within the next five years.

But despite this, hackers aren't especially worried about being replaced, with 72 percent saying that generative AI will not be able to replicate the creativity of human hackers.

Continue reading

Organizations lack visibility into malware attacks

While IT security leaders are concerned about attacks that use malware-exfiltrated authentication data, many still lack the necessary tools to investigate the security and organizational impact of these infections and effectively prevent follow-on attacks.

Research from cybercrime analytics company SpyCloud shows 98 percent of over 300 mid-market and enterprise IT security professionals from the US and UK surveyed say better visibility into at-risk applications would significantly improve their security posture.

Continue reading

Are collaboration tools opening up a backdoor into enterprises? [Q&A]

The pandemic changed the way we work, with more people working from home and fewer in the office. That meant we became much more reliant on tools like Slack and Teams in order to keep in touch with colleagues.

Even though some people are now going back to the office, reliance on these collaboration tools remains high. The dark side of this trend is that cybercriminals have noticed and are increasingly using them as vectors for phishing attacks.

Continue reading

IBM launches generative AI platform for enterprises

There's been a lot of buzz around the use of generative AI recently, but businesses have sometimes struggled to find appropriate use cases for the technology.

Today IBM is rolling out its enterprise-ready AI and data platform, watsonx, which the company first previewed back in May of this year.

Continue reading

Dealing with the data authorization blindspot [Q&A]

Restricted Access sign

User authorization for access to data is complicated. Knowing who has access to what information is often difficult because of complex role hierarchies, different authorization models used for different technologies, and the variety of data that may be accessible across technologies and clouds.

Ben Herzberg, chief scientist at data security platform Satori, believes there's often a blindspot around authorization, but that the issue doesn't have to be as complex as it can seem. We talked to him to learn more.

Continue reading

Why you might not want to sign up for Threads

reluctance dislike

Mark Zuckerberg claims that some 30 million people have signed up for Meta's Threads app since its launch on Thursday.

You might be tempted to think, “He would say that,” but in the rush to join the new Twitter alternative are people overlooking the security and privacy implications of the app? Quite a few experts think so.

Continue reading

Disrupting the phishing killchain with new defenses [Q&A]

Recent reports have shown that email is still the channel where enterprises are most vulnerable to attacks, in particular phishing.

But adding new browser-based layers of security protection can disrupt such killchains, for example by preventing phishing victims from accessing or engaging with spoofed sites. We spoke to Red Access co-founder and CTO Tal Dery to find out more.

Continue reading

Value of cybercrime equivalent to the third largest global economy

Ransomware Criminal

Whoever said 'crime doesn't pay' clearly did so before the advent of the internet. A new report shows that if cybercrime was a country it would be the third largest global economy, valued at $10.5 trillion by 2025. Some 33 billion records are estimated to be stolen in 2023 -- a huge increase of 175 percent from 2018.

The latest Cybercrime Statistics Report from Independent Advisor, shows that last year the cost to US businesses of an average cyberattack amounted to a huge $4.35 million. In addition, 83 percent of organisations got attacked more than once.

Continue reading

Japanese companies are a prime target for nation-state attacks

A new report from cloud risk and detection specialist Rapid7 reveals that Japanese businesses have become a significant target for state-sponsored cyberattacks.

This increased vulnerability has been driven by a fragile global economy and increased political and diplomatic tensions. The Japanese automotive industry and financial services sectors are of particular interest to these actors due to their global reach.

Continue reading

Majority of Brits are concerned about their digital identity and take steps to protect it

A new study of over 1,200 members of the UK public shows that 72 percent of respondents say they are concerned about the privacy of their digital identity, while 75 percent are concerned that the mobile apps they have are utilizing data to track their online and, sometimes, offline activity.

Perhaps more significant though is that 81 percent of people have bothered to read the small print and then decided to actively deny the permissions that an app is hoping to be given.

Continue reading

Real-time web data -- a new source of competitive intelligence [Q&A]

Gathering real-time public web data for business intelligence is a new competitive asset for some companies, but little information is available about the use cases for such data.

We spoke to Aleksandras Šulženko, product owner at Oxylabs.io, to learn more about how web data can be a valuable resource for enterprises.

Continue reading

Consumers want personalized experience but worry about sharing the data that drives it

European consumers want the personal touch in marketing communications, but are reluctant about sharing the data that enables it.

A new report, from customer engagement platform Twilo, shows 51 percent of European consumers say they will become repeat buyers after a good personalized experience, while 49 percent will tell a friend or family member, and 33 percent will become a member of the brand's loyalty program for deals and rewards.

Continue reading

Memory-based attacks increase as attackers dodge cloud defenses

A new report shows a 1,400 percent increase in fileless or memory-based attacks, which exploit existing software, applications, and protocols to perform malicious activities against cloud-based systems.

The research from Aqua Security's Nautilus research team collected honeypot data over a six-month period and shows that more than 50 percent of the attacks focused on defense evasion.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.