Ian Barker

Apple's approach to MDM and what we can learn from it [Q&A]

The rise of hybrid and remote working has put added emphasis on the need for mobile device management (MDM).

We spoke to Weldon Dodd, SVP of global solutions at cloud-based automation and device management specialist Kandji, to find out more about Apple's approach to MDM and the broader lessons businesses can apply from this in order to solve complex IT challenges.

Continue reading

Manufacturing faces a wave of advanced email attacks

New data from Abnormal Security shows that between September 2023 and September 2024, phishing, business email compromise, and vendor email compromise attacks on manufacturers increased significantly.

The number of monthly attacks phishing attacks has grown nearly 83 percent between September 2023 and September 2024. Business email compromise attacks are up 56 percent too.

Continue reading

Supply chain attacks up over 400 percent since 2021

A new report from cyber insurance provider Cowbell shows that supply chain attacks have increased by an astounding 431 percent since 2021.

It also shows that large enterprises (those with greater than $50 million revenue) are 2.5 times more likely to encounter cyber incidents. Manufacturing is the most vulnerable sector, driven by its reliance on automation and exposure to intellectual property threats.

Continue reading

Google calls the AI fuzz to find vulnerabilities

Not familiar with 'fuzzing'? It's a software testing technique that involves feeding invalid, unexpected, or random data into a program to detect coding errors and security vulnerabilities.

Back in August 2023, Google introduced AI-Powered Fuzzing, using large language models (LLM) to improve fuzzing coverage to find more vulnerabilities automatically -- before malicious attackers could exploit them.

Continue reading

HP offers enhanced protection for enterprise endpoints

The rise of remote and hybrid work has increased the risk of PCs being compromised by attackers with brief physical access, underscoring the need for protection and visibility into the integrity of devices throughout their lifetimes.

To combat this, HP is launching a new HP Enterprise Security Edition, a unique suite of capabilities designed to enhance the physical security of PC endpoints.

Continue reading

Why you might soon find yourself talking to adverts

We've probably all shouted at an advert on TV or muttered darkly at one that pops up when surfing the web, but how would you feel about ads you can actually converse with?

Communications company GMS has developed Generative Response Ads, a technology that enables consumers to engage in real-time conversations directly within ad spaces using AI.

Continue reading

More than half of organizations think their cloud security is inadequate

A new survey, from infrastructure management provider Pulumi, reveals that 58 percent of organizations feel their cloud security is inadequate, underscoring the critical need for enhanced security measures in cloud environments.

This echoes research from other sources which show a 75 percent increase in cloud intrusions from 2022 to 2023, and 44 percent of organizations having faced a cloud data breach -- 14 percent reporting one in the past year.

Continue reading

Attackers target holidays and weekends to catch enterprises off guard

shop closed sign

Cyberattackers are targeting holidays and weekends to cause maximum disruption, yet many businesses remain underprepared outside of standard working hours.

A new report from Semperis, based on a survey of almost 1,000 cybersecurity professionals, shows that 86 percent of surveyed organizations in the US, UK, France and Germany that were attacked were targeted during a holiday or weekend.

Continue reading

How RISC-V standards are changing the world [Q&A]

You may have heard of RISC-V -- usually pronounced 'risk-five' -- it's an instruction set architecture originally designed to support computer architecture research and education but which has evolved to become a standard open architecture for industry.

We spoke to Calista Redmond, CEO of standards body RISC-V International to find out more about the latest developments.

Continue reading

Malicious emails bypass SEGs every 45 seconds

New data from Cofense shows one malicious email bypassing customers' Secure Email Gateways (SEGs) every 45 seconds -- up from every 57 seconds in 2023.

The report also highlights the rapid rise in Remote Access Trojans (RATs) and the evolution of credential phishing techniques that exploit trusted platforms. Remcos RAT emerged as the predominant malware, using methods to bypass SEGs with ease.

Continue reading

Microsoft and Atom Computing set to launch commercial quantum computer next year

Quantum computing has up to now been one of those things that's always seemed to be on the horizon but just tantalizingly out of reach.

Now though, Microsoft in partnership with Atom Computing have used the Ignite conference to announce a breakthrough in quantum computing that they say will allow them to deliver quantum computers based on this technology to commercial customers next year. Those machines will feature over 1,000 physical qubits.

Continue reading

With AI agents, Microsoft aims to change the way you work

We're constantly told that AI will make our lives easier by taking on the tedious everyday tasks that we don't really like doing. Who wouldn't want to have an AI agent do some of your office donkey work?

That's what Microsoft is offering with new out-of-the-box, purpose-built agents in Microsoft 365 Copilot that will take on unique roles, working alongside or on behalf of a team or organization to handle simple, mundane tasks as well as complex, multi-step business processes.

Continue reading

Use of GenAI in development raises security concerns

Most developers (85 percent) and security teams (75 percent) have security concerns over relying on GenAI to develop software.

A report from Legit Security, based on a survey of over 400 security professionals and software developers across North America, finds 96 percent of security and software development professionals report that their companies use GenAI-based solutions for building or delivering applications.

Continue reading

Businesses taking longer to recover from cyber incidents

In 2024, businesses have reported taking an average of 7.3 months to recover from cybersecurity breaches -- 25 percent longer than expected and over a month past the anticipated timeline of 5.9 months.

This is among the findings of the latest Global Security Research Report from Fastly which also shows that recovery times are even worse for companies that planned on cutting back cybersecurity spending. They faced an average of 68 incidents each -- 70 percent above the average -- and their recovery times stretched to 10.9 months.

Continue reading

The future of facilities management software [Q&A]

The facilities management sector is in the midst of a digital evolution, driven by trends such as sustainability and smart buildings, and there are also increased regulatory demands in the mix.

We spoke to Phil Meyers, CEO of mpro5, to discuss what this means for facilities management software providers.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.