Chatbots account for over 58 percent of all AI tool traffic

Artificial intelligence business

Over the year from August 2024 to July 2025 the top 10 AI chatbots collectively pulled in 55.88 billion visits, accounting for 58.8 percent of all AI tool traffic.

Within this group, ChatGPT is the undisputed leader, drawing 46.6 billion visits (up 106 percent year-on-year) and holding 48.36 percent of the entire AI tools market share.

Continue reading

Boards should bear ultimate responsibility for cybersecurity

C-suite board meeting

A new State of the Security Profession survey from The Chartered Institute of Information Security (CIISec) shows that 91 percent of the profession believe ultimate responsibility for cybersecurity lies with the board and not security managers or CISOs (just 31 percent).

The survey focused on regulation in the light of a wave of major regulations either recently passed or coming into force -- including the EU AI Act, DORA, NIS2 and the UK’s Data (Use and Access) Bill.

Continue reading

The challenge of moving AI from prototype to production [Q&A]

Enterprise artificial intelligence AI

More organizations are turning to AI to assist in their digital transformation efforts, but many projects get stuck in the pilot phase.

That’s not necessarily a sign of failure though. Rather, it reflects that AI is still in its formative stage, with its most transformative impact still ahead. We spoke to Nadav Eiron, SVP of cloud engineering at Crusoe to learn more about how AI can transition from experimentation to integration, and from potential to permanence.

Continue reading

Insider threats become more effective thanks to AI

Insider Threat

Artificial intelligence is making insider threats more effective according to a new report which also shows that 53 percent of respondents have seen a measurable increase in insider incidents in the past year.

The survey, of over 1,000 cybersecurity professionals, from Exabeam finds 64 percent of respondents now view insiders, whether malicious or compromised, as a greater risk than external actors. Generative AI is a major driver of this, making attacks faster, stealthier, and more difficult to detect.

Continue reading

87 percent of organizations are turning to AI-powered SOC tools

AI protection security

A new survey from Gurucul in collaboration with Cybersecurity Insiders finds that 87 percent of respondents are deploying, piloting or evaluating AI-powered SOC tools, but only 31 percent are using them across core detection and response workflows.

The study, based on responses from over 700 cybersecurity leaders around the world, finds human and identity risks are still a major concern. 78 percent of security leaders identify social engineering and phishing as their top threat, followed closely by identity-based attacks (73 percent). However, 67 percent say they still lack visibility into access behavior and lateral movement.

Continue reading

Employee distraction is a bigger risk than attack sophistication

Distracted businessman at work

Cybersecurity professionals are sounding the alarm, not about increasingly sophisticated cyber threats, but about something far more human --  distraction.

New research from KnowBe4 shows distraction (43 percent) and lack of security awareness training (41 percent) are identified as the primary reasons employees fall victim to cyberattacks, rather than sophistication of the attacks themselves.

Continue reading

Automated red-teaming helps protect enterprise AI

IT security team

Artificial intelligence is being used to streamline many business tasks, but at the same time it opens up new attack vectors and risks.

Secure AI specialist WitnessAI is announcing two new products aimed at securing enterprise LLMs and AI applications through automated red-teaming and behavioral runtime protection.

Continue reading

Enterprises spend 11 hours on resolving each security alert

Thinking-about-security

On average, enterprises spend 11 hours of employee time investigating and remediating a single critical identity-related security alert.

A new study from Enterprise Strategy Group, of 370 IT and cybersecurity decision makers, shows this affects the capacity of security teams to manage alert volume, and this is only made worse in the age of AI.

Continue reading

New techniques help malicious QR codes evade detection

Scanning QR code

Threat researchers at Barracuda have uncovered two new techniques being used by cyber attackers to help malicious QR codes evade detection in ‘quishing’ attacks.

Quishing is a form of phishing that involves the use of QR codes embedded with malicious links that, when scanned, redirect victims to fake websites designed to steal their credentials or other sensitive information.

Continue reading

How AI is transforming customer service interactions [Q&A]

Humanoid Robot Call Center

If you’ve contacted a company recently it’s more than likely that you have encountered some form of AI either online or over the phone.

We spoke to Priya Vijayarajendran, CEO of ASAAP to find out how AI is transforming real-time customer service interactions in the contact center, and what it means for the evolving relationship between humans and machines.

Continue reading

Why using a VPN is becoming more important than ever

VPN user

There’s been some controversy around the use of VPNs recently, mostly centering on the UK’s Online Safety Act. But despite this August 19th is International VPN Day and NordVPN has issued a timely reminder of the importance of using one.

A VPN isn’t just for tech experts, it’s a first line of defense against surveillance, data theft, and invasive tracking. However, not all VPNs are created equal and free ones may offer weaker protection and end up with your data being sold rather than protected.

Continue reading

Druva launches new AI agents to help boost cyber resilience

Cyber resilience

New AI agents launched today by Druva, the company says, will fundamentally change the way customers secure, recover, and manage their data.

A major expansion to DruAI, the company’s suite of AI capabilities for customers, features intelligent agents that can interpret user intent, analyze data, and take meaningful action. This shift aims to move enterprises beyond traditional, query-based AI to agentic systems designed for action -- helping teams strengthen cyber resilience with greater speed, simplicity, and confidence.

Continue reading

96 percent of organizations worry about the impact of shorter certificate life

Transport Layer Security. Secure Socket Layer. TLS SSL. Cryptographic protocols provide secured communications.

The radical shortening of SSL/TLS certificate lifespans from 398 days to 47 days by 2029 is shaking up the cybersecurity world. New research shows 96 percent of organizations are concerned about the impact of shorter SSL/TLS certificate lifespans on their business.

The study from Sectigo, developed in collaboration with global research firm Omdia, surveyed over 270 IT decision makers and finds fewer than one in five organizations feel very prepared to support the coming shift to 47-day certificate renewal cycles.

Continue reading

Insecure code is behind a wave of data breaches

Source-code

New research reveals that insecure code is behind a shocking number of cyber breaches in the UK, with two-thirds of tech leaders admitting their organization suffered an incident in the past year.

The study from SecureFlag, of 100 UK C-suite and tech leaders, shows that despite the risks, many companies are still failing to train developers properly, leaving a gap that attackers are exploiting.

Continue reading

How the SOC is evolving to meet new threats [Q&A]

DevSecOps

As cybersecurity threats grow more sophisticated and relentless, the role of the Security Operations Center (SOC) has never been more critical.

In response organizations are re-imagining their SOCs to address the dual challenges of an evolving threat landscape and a shifting workforce dynamic. We spoke to Scott Scheppers, chief experience officer at LevelBlue to find out more about this shift and how SOC teams are pivotal in safeguarding operations, fostering innovation, and mentoring the next generation of cybersecurity talent.

Continue reading

Load More Articles