The impact of generative AI cybersecurity [Q&A]

AI security attack

Since ChatGPT's launch in 2022, there's been an explosion of speculative use cases for generative AI in the workforce -- and concern from the cybersecurity community over an unproven, unvetted, and potentially powerful new tool.

How have those concerns played out in the real world? We sat down with Nick Hyatt, director of threat intelligence at Blackpoint Cyber, to hear about the reality of generative AI's risk to the modern workplace.

Continue reading

Life sciences sector turns to AI to bridge cybersecurity skills gap

3D robotics hand

A new survey reveals that 73 percent of life sciences companies are turning to artificial intelligence to address the cybersecurity skills gap.

The report from Code42 shows the life sciences sector is at the forefront of artificial intelligence use, with AI tools presenting new opportunities for cybersecurity teams to enable automated detection and response, as well as freeing up the resources to concentrate on strategic tasks.

Continue reading

Druva adds new threat hunting capability

Threat concept

Data security company Druva is adding to its platform with a new threat hunting capability that empowers IT and security teams to search their global data footprint for indicators of compromise (IOCs).

The company is also announcing the expanded global availability of Managed Data Detection and Response (Managed DDR), a service that uses a combination of technology and human expertise to proactively monitor customer backups for faster detection of and response to threats.

Continue reading

URL protection services used to mask phishing attacks

Hacker mask data center

Cybercriminals are abusing legitimate URL protection services to hide malicious URLs in phishing emails, according to a new Threat Spotlight from Barracuda Networks.

Researchers have observed phishing attacks taking advantage of three different URL protection services to mask their phishing URLs. The services are provided by trusted, legitimate brands. To date, these attacks have targeted hundreds of companies.

Continue reading

Olympics face serious risk of malicious cyber activity

Paris Olympics 2024

The Olympic Games begin next week in Paris and cybersecurity company WithSecure is warning that they face a greater risk of cyberattack than ever due to the current state of geopolitical uncertainty.

As the world's biggest sporting event, the Olympics draws potential attacks from both criminal and nation-state threat actors, with various objectives and capabilities.

Continue reading

Why mobile connectivity is essential for the enterprise [Q&A]

Mobile security

While enterprise computing was once tied to the desktop, theses days mobile connectivity is essential to the smooth running of any business.

This is partly as a result of changed working patterns -- accelerated by the COVID pandemic -- and partly down to rapidly evolving technology. We spoke to Allwyn Sequeira, CEO of mobile cloud service Highway 9 Networks, to learn more about the enterprise mobile space.

Continue reading

Proton Pass launches secure password sharing feature

login and password cyber security concept Data protection and secure internet access cyber security. secure access to users personal information security and encryption

Sharing of passwords is a problem. It's reckoned that 43 percent of US internet users share their passwords with others, probably using insecure methods such as messaging, writing them down, or shared documents.

The issue is even worse for businesses, with approximately 69 percent of employees admitting to sharing passwords with colleagues. Good news then is that open-source password manager Proton Pass is launching Secure Links, a new feature enabling users to share items easily and securely with anyone, including non-Proton Pass users.

Continue reading

Forensics or fauxrensics? What to look for in cloud forensics and incident response [Q&A]

Digital forensics - Inscription on Blue Keyboard Key.

The rapid deployment of cloud resources has led to misconfigurations and security risks, leaving security teams scrambling to adapt and secure their businesses following migrations away from traditional on-premises environments.

Despite successfully enhancing prevention and detection in the cloud, organizations now face a significant challenge in assessing the true scope and impact of issues that do arise.

Continue reading

Cybersecurity pros don't like being ignored

Frustrated ignored

A new survey reveals that 29 percent of security professionals say their biggest frustration is that their advice is being ignored.

The study, conducted by security awareness specialist KnowBe4 at Infosecurity Europe 2024 in London, finds other issues include a stated a lack of skilled workers to employ (15 percent), while a further 13 percent highlight working in an inadequate security culture or environment is their biggest complaint, with the same percentage claiming they have too many tools to manage at their organizations.

Continue reading

Offices not prepared for hybrid working

stressed worker

New research, from AV solutions company Kinly, reveals that despite calling workers back into the office 65 percent of enterprises admit that their office spaces are not optimized for hybrid working.

The complexities of flexible and remote communication may be a factor in the call to return to office, with 28 percent of enterprises naming it as a top challenge. Over half of respondents also say that poor hybrid workflows (57 percent) and outdated AV technologies (58 percent) are damaging the productivity of hybrid teams.

Continue reading

Breaches increase despite confidence in security measures

data breach

Despite there being a record-breaking number of data breaches in the last year, 63 percent of organizations report that they believe their security measures are effective.

A new report from Dasera looks at how data risk perceptions and actual preparedness against breaches fluctuates across different industries and finds the top threats concerning organizations are data breaches, ransomware, insider threats, and misconfigurations.

Continue reading

Accuracy worries delay Gen AI initiatives

Calendar delay

Less than 60 percent of manufacturers plan to increase AI spending in 2024 compared to 93 percent in 2023, according to a new survey.

The study from Lucidworks gathered input from over 2,500 leaders involved in AI technology decision-making worldwide and finds in 2023 more than 40 percent of manufacturing leaders had a positive view of AI, with 93 percent planning to increase investments.

Continue reading

UK tech execs not convinced about return on investment from AI

UK artificial intelligence

A new study from IT consultancy Zartis shows that UK tech executives are confident about the level of AI skills within their organizations, but aren't convinced about the return on investment from AI.

The report shows 85 percent rate their existing workforce's combined AI knowledge and expertise as 'skilled' while 51 percent rate it as 'highly skilled'. Despite this confidence, many of these executives have concerns about barriers that might prevent further AI adoption.

Continue reading

Strong SLAs critical for vulnerability management

Service level agreement SLA

A new report from crowdsourced security company Intigriti highlights the need for strong cybersecurity practices and service-level agreements (SLAs) for vulnerability management.

Globally, 75 percent of businesses fail to respond to critical vulnerabilities within 24 hours, consequences of which could include customer dissatisfaction, loss of business, and reputational damage.

Continue reading

Why organizations must address the AI skills gap [Q&A]

Skills gap

As AI sees wider adoption, the demand for skills surrounding the technology inevitably increases too. By failing to act to address this AI skills and leadership vacuum organizations could be taking a significant risk.

We spoke to Arun 'Rak' Ramchandran, president and global head -- GenAI consulting and practice, hi-tech and professional services at Hexaware, to find out more about the problem and how it can be tackled.

Continue reading

Load More Articles