Ian Barker

CI/CD and how data is the gatekeeper of productivity [Q&A]

Using CI/CD (continuous integration and continuous deployment) is supposed to streamline and speed up application development.

However, outdated cloud-based approaches negate many of the benefits. Buildkite's co-founder and CEO, Keith Pitt helped pioneer the hybrid CI/CD approach, which combines elements of both managed and self-hosted CI/CD. With hybrid, users control the build environment and can customize their needs. We spoke to Keith to learn more

Continue reading

New solution helps companies prepare for 90-day TLS standard

Magnified certificare

Google's proposal to cut TLS certificate lifespans to 90 days -- down from the current 398 -- was aired last year and has caused something of a stir in security circles.

According to a recent Venafi study, 83 percent of organizations have been hit by certificate-related outages in the past 12 months, and 57 percent of organizations have experienced security incidents involving compromised TLS certificates. Shortening certificate lifespans will therefore help businesses reduce the risk of compromise.

Continue reading

All you wanted to know about passkeys but were afraid to ask

Yesterday's coverage of World Password Day sparked some discussion among the BetaNews team about passkeys and how they work.

We figured that if we're confused about them then some of you probably are too, so here's a FAQ look at passkeys, how they work and why you should consider using them.

Continue reading

Identity and permissions present a major security challenge

The average organization has roughly 1,400 permissions for every employee, according to a new report from Veza.

The findings also show that identity teams face a daunting number of groups and roles to manage. With organizations averaging nearly 700 groups for every 1,000 users, it is difficult for admins to choose the least-privilege groups and roles that will meet the needs of any given employee, contractor, or service account.

Continue reading

The changing face of the cybersecurity market [Q&A]

The cybersecurity world is a fast changing one with a constant arms race between attackers and defenders.

New entrants are always coming to the market with innovative technologies to solve particular problems. We spoke to Justin Somaini, a partner at cybersecurity venture capital firm YL Ventures, to find out more about up and coming security trends and shaping the future of cybersecurity.

Continue reading

Internal communication gaps leave enterprises vulnerable to attack

A new report shows that CISOs find it difficult to communicate threats to the C-suite, which is leaving gaps in the organization’s understanding of cyberrisk.

The study from Dynatrace reveals that 87 percent of CISOs say application security is a blind spot at the CEO and board level.

Continue reading

Google underlines its commitment to passkeys with new updates

Google launched its passkeys initiative on 2022's World Password Day and this year it's marking the day with some new updates.

It’s expanding Cross-Account Protection, an initiative where Google will share security notifications about suspicious events on your Google Account with the non-Google apps and services you use. Doing this will allow the other apps and services connected to your Google Account to use the security information to better protect your other accounts.

Continue reading

Passwords cling on to celebrate another World Password Day

World Password Day

Last year we asked the question whether it was time to make World Password Day a thing of the past. But despite the rollout of passkey technology from giants like Google, passwords are still here a year on.

There's no doubt that the use of passwords is in decline, but they are proving more tenacious than many people predicted. Here are some expert views on the role of passwords in the wider digital security landscape.

Continue reading

Data privacy requests surge since 2021

Data privacy

A new report shows 246 percent boost in privacy requests since 2021 as consumers seek to clear personal data online.

The report from DataGrail shows Data Subject Requests (DSRs) -- formal requests made to a company by a person to access, delete or request not to sell/share the personal data that the company holds on them -- increased by 32 percent from 2022 to 2023.

Continue reading

New solution helps enterprises demonstrate security and compliance

As numbers and severity of third-party breaches grow, companies are scrutinizing not just how they handle data, but how their vendors do as well. Trust management platform Vanta is launching a new addition to its Trust Center to allow enterprises to automate security questionnaires

Questionnaire Automation in Trust Centers uses Vanta AI to save time by generating suggested responses for security teams to review and approve, rather than starting from scratch each time. This will make it easier for enterprises to proactively and reactively demonstrate their security and compliance.

Continue reading

New solution uses AI to target spam and phishing

Since the launch of ChatGPT there has been a surge in the number of phishing emails as AI makes it easier to create convincing lures.

Email security specialist SlashNext is fighting AI with AI thanks to the launch of a new generative AI large language model (LLM) to deliver accuracy and precision in spam detection, with claimed near-zero false positive rates.

Continue reading

VNC is the hacker's favorite remote desktop tool

Virtual Network Computing (VNC) is the remote desktop tool most targeted by attacks, accounting for 98 percent of the traffic across all remote desktop-specific ports.

This finding comes from Barracuda which has released a new Threat Spotlight report looking at the most common tools, associated ports, and the ways in which attackers can, and do, gain access.

Continue reading

The human challenges of dealing with security alert backlogs [Q&A]

Most security teams experience some level of alert overload, struggling to prioritize the issues demanding immediate attention from those that are less pressing. This can lead to a backlog of problems to be dealt with and consequent stress on team members.

We talked to Yoav Nathaniel, CEO and co-founder of Silk Security, about why alert backlog is a people problem rather than a technological problem and how IT and security teams can overcome this challenge.

Continue reading

Nearly 1 in 5 ransomware attacks results in a lawsuit

A new study from Comparitech finds that around a fifth of ransomware attacks in the US led to a lawsuit in 2023.

It shows that 355 lawsuits were filed following 3,002 ransomware attacks. Of these 228 have been completed and 134 were successful -- that is they led to a data breach settlement, resulted in the company being fined for failing to safeguard systems and/or data, or were settled out of court.

Continue reading

New platform allows fast creation of secure AI apps

Everyone is keen to embrace AI, but turning an idea into a workable application isn't that easy. B2B commerce platform AppDirect is launching a new marketplace and creation studio that boosts organizations’ ability to create, adopt, and benefit from AI apps.

AppDirect AI allows users to easily transform AI app ideas into reality without needing any coding skills, while also giving them the freedom to choose the most suitable large language model (LLM) provider for their business needs.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.