Ian Barker

Enterprises become less confident in their network investments

A new report shows that 87 percent of enterprise decision-makers are a little or a lot less confident in the network investment decisions that they make.

The study from Arelion reveals that confidence levels have been significantly impacted for 40 percent of US decision-makers. 44 percent of enterprise network decision-makers cite technological change as the most disruptive force on networking decisions, followed closely by rising costs (41 percent) and climate change (37 percent).

Continue reading

CISOs lack insight into AI training data

The rapid rise of AI across industries has created a critical data blind spot, a lack of insight into the data powering these systems. Training data for AI models can harbor hidden risks, including leaking sensitive information, personal data, and intellectual property.

A new survey of 168 members of the CISO Society carried out by BigID and Lorem Advisory Group looks at the challenges CISOs face in governing, securing, and safeguarding data in today's AI-driven landscape.

Continue reading

Apple rolls out new resources for developers

Female developers

Alongside yesterday's raft of operating system announcements, Apple also unveiled a suite of new tools and features for developers to help them create more powerful and efficient apps.

With Xcode 16, developers can save time in their development process and get more done thanks to features like Swift Assist and predictive code completion. New and expanded APIs also give developers the tools to advance their apps and introduce new features.

Continue reading

Fears rising cloud costs could mean job losses

Cloud dollars

A new survey of 1,000 finance and engineering professionals in the US reveals that 58 percent of respondents say their cloud costs are too high.

The study from CloudZero also shows that 75 percent of employees say they fear losing their jobs if cloud costs abruptly surge by 50 percent or more. This unease is particularly heightened among employees at larger companies, with 100 percent of those at organizations with over 9,000 personnel believing their positions are vulnerable.

Continue reading

The risks and rewards of Active Directory modernization [Q&A]

Active Directory (AD) was introduced in the late 90's when corporate networking barely had virtualization and remote work, not to mention cloud services.

AD controls authentication and authorization to most of an organization's on-premises applications and data, and through synchronization and federation with Entra ID, Okta or other cloud identity provider (IDP) provides these same controls to cloud applications and resources.

Continue reading

88 percent of free Android VPNs leak data

Touching VPN logo

New research from Top10VPN has captured and analyzed the network traffic of the 100 most popular free VPNs on Google's Play Store and reviewed their source code.

The findings are rather worrying, showing that 88 percent suffer some kind of data leak (IP, DNS, WebRTC) with 17 percent affected by multiple leaks.

Continue reading

How the rise of large graphical models can give enterprises a crystal ball [Q&A]

Data analytics

A new AI technology is emerging alongside LLMs -- Large graphical models (LGMs). An LGM is a probabilistic model that uses a graph to represent the conditional dependence structure between a set of random variables.

Organizations can use LGMs to model the likelihood of different outcomes based on many internal and external variables.

Continue reading

Ransomware victims unable to recover over 40 percent of affected data

Ransomware Malware Cyber Attack

Ransomware remains an ongoing threat for organizations and is the largest single cause of IT outages and downtime as 41 percent of data is compromised during a cyberattack, according to the latest Veeam 2024 Ransomware Trends Report.

The report, based on 1,200 responses from organizations that have faced a security incident, reveals that only 57 percent of the compromised data is usually recovered, leaving organizations vulnerable to substantial data loss and negative business impacts as a result.

Continue reading

1Password's Extended Access Management aims to secure modern workforces

The work landscape has changed enormously in recent years with hybrid and remote working now becoming the norm. This makes it harder for businesses to secure their systems as there's no longer a clearly defined network perimeter.

1Password now has an Extended Access Management feature that helps organizations to secure every sign-in to every application from every device.

Continue reading

UK tech execs want more government oversight of AI

Research from IT consultancy Zartis shows 72 percent of UK tech executives want more AI regulation, and almost a third (29 percent) want 'a lot more'.

The study, carried out by Censuswide, surveyed 100 senior technology executives in the UK and finds around 80 percent claim global government coordination of AI regulation is important to their company and 41 percent say it’s very important.

Continue reading

Automation is critical to effective security for smaller businesses

Automation is a critical capability for a proactive security strategy says a new report from automated endpoint and vulnerability management company Syxsense and Omdia, a global analyst.

The research surveyed over 400 respondents including decision makers from North America and Europe, Middle East, and Africa (EMEA), at small and midsize business (SMB)+ sized companies across a variety of industries.

Continue reading

80 percent of organizations not ready for CISA rules on security practices

The US Cybersecurity and Infrastructure Agency's (CISA) Secure Software Development Attestation Form rules come into force on June 11, 2024.

This requires software producers who work with the US government to adhere to and confirm the deployment of key security practices. But new research from Lineaje reveals that 80 percent of companies are not ready.

Continue reading

More testing needed to ensure security of web applications

A new report from CyCognito looks at the challenges faced by cybersecurity professionals in protecting web applications, which have become prime targets for cyberattacks.

Organizations maintain dozens, often hundreds, of custom web apps, developed in-house and by third-party partners. What's more over 60 percent update web applications weekly or more often.

Continue reading

The critical role of load balancing [Q&A]

When the internet first emerged, the need for load balancers was mainly to optimize the growing use of PC servers and to support the surge in Web traffic. Their basic functionality was designed to pool server resources to meet this demand.

Load balancers have come a long way since, becoming broadly accepted as essential for evolving IT infrastructure and the exponential growth of apps.

Continue reading

Executives keen to adopt AI coding tools -- developers less so

A new report reveals a disconnect between those in the C-suite and their eagerness to adopt AI coding tools compared to those actually using them who are cautious of AI.

The research from Snyk shows CTOs and CISOs are five times more likely than developers to believe AI coding tools pose no risk and twice as likely than developers to believe they are 'extremely ready' to adopt AI coding tools.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.