Ian Barker

Almost half Gen Z and Millennials have had their social media passwords hacked

New research from hardware authentication security key provider Yubico shows nearly half of Gen Z (47 percent) and Millennials (46 percent) have had their social media account passwords hacked.

It's no surprise then that these generations are keen to adopt hardware security keys, reflecting a growing mistrust of traditional passwords and a shift toward more secure, physical authentication methods.

Continue reading

Interest in learning AI skills soars

Newly released usage data from the O'Reilly online learning platform reveals that interest in AI-related skills has surged dramatically, with the most pronounced usage increases seen in topics like prompt engineering (456 percent increase), AI principles (386 percent increase), and generative AI (289 percent increase).

Use of content about GitHub Copilot has seen a dramatic increase too, by an impressive 471 percent, reflecting developers’ enthusiasm for tools that enhance productivity.

Continue reading

The importance of modernizing cyber defenses [Q&A]

The state of high-profile cyber incidents in recent years has highlighted the fact that defenses need to be kept up to date to provide adequate protection.

AI and machine learning have the potential to transform security operations to enhance protection against emerging threats. We spoke to Gurucul CEO Saryu Nayyar to get her view on how protection technologies are evolving and why this is so crucial.

Continue reading

How AI assistants can make sales teams more effective [Q&A]

Most business areas are starting to feel the impact of artificial intelligence, enabling data to be used more effectively to deliver intelligence and outcomes.

Sales, though, has always been about people and building relationships over time, so can AI offer value here too? Nikhil Cheerla, co-founder of sales AI assistant company Nooks, thinks it can, and we talked to him to find out how.

Continue reading

AI agents and what they mean for the enterprise [Q&A]

Artificial intelligence is creeping into more and more areas of business and consequently we’re seeing it used for ever more complex work.

We spoke to Trey Doig, CTO and co-founder at Echo AI, to find out more about AI agents and how they can help solve problems and carry out tasks.

Continue reading

Understanding and taking control of your data ecosystem [Q&A]

Data comes in many forms, it may be structured, it may be unstructured, it could be sensitive or purely statistical. Whatever it looks like you can only benefit from it if you know what you have, where it can be found and how to access it.

We spoke to Brett Hurt, CEO and co-founder of data.world to discuss how enterprises can understand their data and derive the maximum value from it.

Continue reading

The top barriers to AI success and how to overcome them [Q&A]

With the intense interest in AI and its rapid pace of embrace, organizations are under pressure to swiftly evaluate their data architecture. AI architects urgently need solutions that harness AI to boost revenue streams and streamline operational efficiencies, all while navigating the potential barriers to their success.

David Flynn, co-founder and CEO of Hammerspace, a specialist in the use and preservation of unstructured data, recently shed light on the growing complexity IT teams face in managing data pipelines. This complexity is further compounded as organizations integrate LLMs into AI applications, underscoring the significant obstacles to successful AI adoption.

Continue reading

Why you shouldn't respond to emails straight away [Q&A]

Electronic communication, whether by email or text, is by its very nature pretty instant. So when you receive a new message the temptation is always to respond to it straight away.

The trouble with that is the people you're communicating with come to always expect a quick reply. We spoke to stress management expert Julia Arndt at Peak Performance Method to discover why not responding immediately could well be better for your stress levels.

Continue reading

Operational tech under attack, deepfake phishing and learning to use passkeys -- cybersecurity predictions for 2025

With a constant power struggle between attackers and defenders cybersecurity is a fast-moving area. That makes it notoriously hard to predict what might happen, but that doesn't stop us trying. Here are what some industry experts think the cybersecurity world has in store for 2025.

Sasha Gohman, VP, research at Cymulate, thinks ransomware will become obsolete. "Ransomware may become obsolete due to the fact that decrypting your important files may become a feasible task with quantum computing. On the other hand, ransomware operators may then choose to encrypt your important files with quantum-resilient encryption."

Continue reading

Europe's move toward cybersecurity sovereignty [Q&A]

Governments around the world are increasingly legislating for cybersecurity and privacy. But regions often have differing views on how this should be achieved.

We spoke to Christian Have, CTO of Logpoint, to get insight into how US surveillance laws could serve as a catalyst for Europe to take greater control over its data, pushing forward the concept of digital sovereignty.

Continue reading

New investment, state legislation and more penalties -- privacy predictions for 2025

As both businesses and individuals become more reliant on connectivity and data so concerns around privacy are increasingly to the fore.

Here are the views of some industry experts on what the privacy landscape may look like in 2025.

Continue reading

Decentralized solutions, knowing your developer and AI apprentices -- development predictions for 2025

In the past year economic and business pressures, the rise of AI technologies talent shortages and more have put a strain on code pipelines and increased demands on developer teams. This in turn leads to fears around developer strain, product launch timescales and cybersecurity risks.

So what might 2025 have in store for developers? Here's what some industry experts think.

Continue reading

Threat actors spoof email security providers

A new report from phishing defense company Cofense highlights increasingly sophisticated phishing attacks that are exploiting trusted email security companies such as Proofpoint, Mimecast and Virtru to trick users into disclosing sensitive credentials.

The attacks make use of fake email attachments, phishing links and credential-harvesting tactics to compromise sensitive data. By mimicking well-known brands, threat actors boost the likelihood that the recipients will trust the emails and engage with harmful content, leading to them exposing critical information.

Continue reading

Credential phishing attacks up over 700 percent

Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.

The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.

Continue reading

More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025

Artificial intelligence has been one of the fastest growing areas in the tech sector over the past few years.

As AI becomes more commonly adopted what changes can we expect to see happening in 2025? Here are some expert views.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.