Ian Barker

Brits warned of scams ahead of emergency alert test

Mobile phone alert

This Sunday, September 7th, the UK will test its emergency alert system, sending a message that will cause 4G and 5G mobile phones and tablets to emit a loud siren sound and vibrate for about 10 seconds.

But Marc Porcar, CEO of QR Code Generator, is warning that fraudsters are likely to exploit the upcoming government test, particularly targeting elderly and vulnerable people who may be confused by the alerts.

Continue reading

Rethinking AppSec for the AI era [Q&A]

AI robot security

The application security landscape has always been a complex one and can lead to teams spending too much time hunting down vulnerabilities. With AI becoming more popular there are even greater risks to consider.

We spoke to Yossi Pik, co-founder and CTO at Backslash Security, to discuss how AppSec needs to adapt to the greater use of AI.

Continue reading

New enterprise browser aimed at securing BYOD and third-party devices

Man working on computer laptop with triangle caution warning sig

Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.

The new feature, available to Check Point Harmony SASE customers from today, delivers full visibility, granular policy enforcement, and compliance-ready data protection without persistent agents or endpoint ownership.

Continue reading

Insider breaches hit 61 percent of enterprises

Data-Breach-Hand

A new study sponsored by OPSWAT, a specialist in critical infrastructure protection, reveals that organizations face escalating risks from insider activity, legacy tools, and the growing complexity of artificial intelligence (AI).

Based on research carried out by the Ponemon Institute, the report finds that in the past two years, 61 percent of organizations have suffered file-related breaches caused by negligent or malicious insiders, at an average cost of $2.7 million per incident.

Continue reading

How AI agents are reshaping the threat landscape

Risk threat readiness

The agentic AI ecosystem, powered by large language models (LLMs), is creating a new class of cybersecurity risks according to a new report.

The study from Radware finds AI agents can act autonomously, access tools and private resources, and interoperate between one another. As enterprises turn to AI agents, there is a need to govern and secure this new emerging layer of digital infrastructure.

Continue reading

Proactive agents bring AI to data analysis teams

Future artificial intelligence robot and cyborg.

Data insights platform WisdomAI is launching a new Proactive Agents feature that aims to supplement data analysis teams with the ability to proactively learn, monitor metrics, detect anomalies, prepare analysis, and execute decisions, allowing humans to focus on strategy and judgment.

“Data analysts have long been the gatekeepers to insights -- but they’re hard to scale, and no company can hire unlimited analysts,” says Soham Mazumdar, CEO and co-founder of WisdomAI. “Proactive Agents change that. They act as AI teammates that scale your data team’s capacity, increase productivity across the organization, and democratize access to analyst-grade work. Every employee can now benefit from the kind of monitoring and analysis that used to require dedicated headcount.”

Continue reading

Enterprises left dangerously exposed by identity protection ‘maturity myth’

Glowing security padlock

New research from Osterman and Silverfort reveals that although nearly 70 percent of organizations believe their identity defenses are ‘mature’ there is a worrying gap between perception and reality.

This comes against a rising tide of identity threats, 72.1 percent of identity leaders report that the threat level of identity-related attacks has increased or remained unchanged in the past year. The most significant jumps include AI-powered attacks, ransomware-based attacks, and social engineering of desk staff to reset credentials or MFA factors (up 14.3 percent).

Continue reading

Windows 10 support costs could top $7 billion

Hand holding Windows 10 logo

With support for Windows 10 due to end on October 14th, it’s estimated that there will still be over 120 million PCs running the OS still in use by the deadline.

New analysis from Nexthink warns that with the first year of extended support costing $61 per device, organizations could collectively be facing a multi-billion dollar bill.

Continue reading

Tycoon phishing kit uses sneaky new techniques to hide malicious links

Woman touching a phishing concept

Phishing emails often feature malicious links (URLs) that lead victims to fake websites
where they are infected with harmful software or tricked into giving away personal
information.

There’s a constant battle between security tools getting better at identifying bad links and attackers trying to hide them more effectively. Barracuda has uncovered some of the latest approaches its researchers are seeing in attacks involving the advanced phishing-as-a-service (PhaaS) kit, Tycoon.

Continue reading

Securing Kubernetes in the enterprise [Q&A]

Secure by design

As more organizations scale up containerized workloads they’re also facing increasing security and compliance challenges.

Kim McMahon part of the leadership team at Sidero Labs to discuss the vulnerabilities enterprises are encountering when scaling up Kubernetes on traditional operating systems and what they can do to counter them.

Continue reading

Over half of UK SMEs set to adopt AI in the next year

hands working with AI

A new report shows that 52 percent of UK SMEs are already using or plan to adopt AI tools within the next 12 months.

The study, from fintech company SumUp, is based on a survey of 750 business owners and decision makers within small UK businesses and finds that 27 percent see AI mostly as an opportunity, highlighting its potential to drive growth or increase efficiency.

Continue reading

New fully open and transparent large language model launches -- it’s Swiss, of course

Swiss flag

The Swiss have something of a reputation for being methodical -- particularly when it comes to things like banking -- so it’s no surprise that they take a similar approach to creating a large language model.

EPFL, ETH Zurich and the Swiss National Supercomputing Centre (CSCS) have today released Apertus, a large-scale, open, multilingual LLM. Apertus -- Latin for ‘open’ -- the name highlights its distinctive feature, that the entire development process, including its architecture, model weights, and training data and recipes, is openly accessible and fully documented.

Continue reading

Do Americans dream of AI?

Sleep phone

Artificial intelligence is making its way into more and more areas of our lives and it seems that includes our dreams.

New research from Amerisleep.com, shows that one in five Americans have dreamed about AI and 16 percent are doing so several times a month. While these dreams may reflect curiosity, some reveal anxieties about the role of technology.

Continue reading

Why one-time security assessments are no longer sufficient [Q&A]

Observability magnifier code

With cyber threats becoming more numerous and ever more sophisticated, it’s becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.

One-time security assessments are looking increasingly inadequate. We spoke to CyberProof CEO Tony Velleca to discuss how organizations can effectively implement a Continuous Threat Exposure Management (CTEM) strategy to improve their protection.

Continue reading

How much is your privacy at risk from wearable devices?

Wearable device

Wearable devices have brought us numerous benefits in recent years, allowing us to understand our health and fitness level better and encouraging a more active lifestyle. But are they also putting our privacy at risk?

A new report from vpnMentor takes a look into what information wearable devices are collecting. It also investigates how that data is being used, shared and, in some cases, monetized.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.