Ian Barker

Which comes first? The pentest or the bug bounty program? [Q&A]

Software testing

Bug bounty and penetration testing programs are often grouped as interchangeable, but they perform distinct functions.

To determine whether both deserve a place within a cybersecurity strategy, it is important to understand their specific qualities and how they have matured over recent years. We spoke to Chris Campbell, lead solutions engineer at HackerOne, to learn more.

Continue reading

Microsoft means business with new Surface devices

Whilst Microsoft's Surface devices have been around for a few years and have many features that make them attractive for business users, there's never been a version aimed specifically at businesses… Until now.

With the launch of Surface Pro 10 for Business and Surface Laptop 6 for Business the company is targeting the business market with features including improved performance and battery life, more ports, better security and custom, durable anti-reflective displays.

Continue reading

Communications service providers see Gen AI as critical but are slow to implement it

A new study shows 90 percent of communications service providers (CSP) see the profound impact Gen AI will have on business goals. However, deployment of GenAI is still in its preliminary stages, with just 22 percent of CSPs having already implemented solutions.

Research by Analysys Mason for Amdocs shows Gen AI is expected to have a high impact across a variety of areas, such as software development (84 percent), data management (82 percent), monetization (82 percent) and network operations (81 percent).

Continue reading

Third-party breaches create network weak spots

Network security

A new report from Black Kite shows how third-party data breaches create critical weak spots in extended networks, potentially leaving businesses open to cyber attacks, which can have a negative ripple effect across the organization and its stakeholders.

The report is based on analysis of 81 vendor breaches impacting 251 companies in 2023. Unauthorized network access was the leading cause of breaches, accounting for over half (53 percent) of third-party breach incidents. This represents a 26 percent increase from 2022, with ransomware being the most common method of compromise.

Continue reading

SMBs are easy targets for cyberattacks

Ransomware Malware Cyber Attack

Despite cybersecurity threats being on the rise, many small and medium businesses (SMBs) still lack basic security measures, according to AI security company Cyber Upgrade.

It's no secret that hackers target smaller businesses due to inadequate cybersecurity safeguards, as most underestimate the associated risks as well as lacking the resources of larger enterprises.

Continue reading

Enterprises lose millions each year due to poor AI models

Burning money

Underperforming AI models, which are built using inaccurate or low-quality data, are resulting in misinformed business decisions.

A study for Fivetran, conducted by Vanson Bourne, polled 550 from organizations with 500 or more employees and finds that on average they lose six percent of their global annual revenues, or $406 million, to poor AI models.

Continue reading

Compliance failings leave enterprises vulnerable to data breaches

A new report from Thales reveals that 43 percent of enterprises failed a compliance audit last year, with those companies 10 times more likely to suffer a data breach.

Based on a survey of almost 3,000 IT and security professionals it also finds that 93 percent of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47 percent last year.

Continue reading

Cyber fusion -- what is it and why is it important for security? [Q&A]

Security concept

Today's IT security teams face several key challenges. Tasked with combating the rising volume and frequency of sophisticated cyber threats, they are bombarded with a tsunami of alerts generated by countless security tools that deliver little context or value-add insight.

Effectively processing and analyzing all this data to identify actionable threat intelligence requires considerable time and effort.

Continue reading

Only 10 percent of companies have full observability into cloud environments

A new study shows that in 2024, the biggest challenge to gaining observability into cloud-native environments -- cited by 48 percent of respondents -- is lack of knowledge among the team. This is up from 30 percent in 2023.

The report from Logz.io shows only 10 percent of organizations are utilizing full observability, that is, observing the real-time status of every component of the entire technology stack.

Continue reading

Enterprises bank on AI to improve supply chain resilience

supply chain

New research for supply chain solutions company Cleo, based on a study carried out by Dimensional Research, shows 30 percent of companies plan to use trending technologies like artificial intelligence and automation to better meet supply-chain related business commitments.

It finds 97 percent of companies surveyed invested in supply chain technologies in 2023, with 81 percent stating their supply chain investment delivered business improvement in less than 24 months and 35 percent getting benefits in the same year.

Continue reading

Careless users cause data loss incidents

A new study from Proofpoint shows that 85 percent of organizations polled experienced at least one data loss incident in the past year. Even the country with the lowest percentage -- the UK -- still had 73 percent of respondents reporting at least one incident in the past 12 months.

What's particularly interesting though is that careless users, accounting for 70.6 percent, are much more likely to cause these incidents than compromised (48.1 percent) or misconfigured systems (45.3 percent).

Continue reading

'Blame game' with service providers puts organizations at risk

Organizations are putting their critical operations at risk by enabling the widespread continuation of a 'blame game' culture between their IT teams and third-party service providers, according to a new report.

The survey from Dynatrace finds that 91 percent of organisations are still playing the blame game with IT service providers when problems occur. This increases the reliance on war-room-style meetings to identify and resolve the cause of problems, which extends the duration of incidents and creates tense workplace environments that heighten the risk of losing skilled talent.

Continue reading

70 percent think misinformation could impact elections

As the US Congress talks about potentially banning TikTok, a new survey from Media.com shows that 70 percent of social media users are moderately to extremely concerned that misinformation will impact the 2024 US Presidential election.

Respondents are also inclined to hold social media companies accountable for misinformation and hate speech, with a slim majority (51 percent) favoring increased regulation and 62 percent calling for legal action for social platforms that allow misinformation to spread.

Continue reading

What can we expect from the third decade of cloud computing? [Q&A]

Cloud has been a cornerstone of the computing industry for many years. As it enters its third decade in 2024, economic pressures, anti-monopoly moves and more mean things will look different for hyperscale providers.

We spoke to Amol Dalvi, VP of Product of Nerdio, to discuss what we can expect to see over the next 10 years.

Continue reading

Dark web election posts up almost 400 percent

The number of new posts on dark web forums about elections surged by 394 percent in 2023 compared to 2022, research released this week by cybersecurity firm NordVPN reveals. And in the first two months of 2024 alone, users have already published almost half as many posts.

With more than 60 countries holding national elections in 2024, representing over half of the world's population, this is a significant year in history for global democracy so it's unsurprising that there's an increase in interest.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.