CMS challenges prevent organizations unlocking their data


New research finds that 84 percent of organizations believe their existing content management system (CMS) is preventing them from unlocking full value from their data and content.
The study, from headless CMS company Hygraph, surveyed 400 professionals in product and engineering roles across the US, UK, and Germany, and finds 92 percent of organizations say their content and data sources are currently siloed, with 38 percent describing it as 'very siloed'. This means the work required to integrate all these sources is both time-consuming and expensive.
What enterprises need to know about cybersecurity compliance [Q&A]


Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.
Cam Roberson, VP at Beachhead Solutions, a provider of cloud-managed PC and mobile device encryption, security, and data access control, sat down with us to discuss what enterprises need to know about the current state of cybersecurity compliance.
Enterprises need to adapt security measures to cope with changing threats


With cyber threats becoming increasingly sophisticated, organizations face new challenges in safeguarding their digital assets. A new report from Info-Tech Research Group looks at the issues IT and security leaders must prioritize over the coming year.
It highlights the need to take account of the cybersecurity talent shortage, the rise of AI-driven threats, the integration of security risks with business risks, the adoption of zero-trust frameworks, and the increasing significance of automating security operations.
'Hunter-killer' malware able to neutralize advanced defenses


A new report from Picus Security looks at real-world malware samples and identifies the most common techniques leveraged by attackers.
It identifies a surge in 'hunter-killer' demonstrating a shift in adversaries' ability to identify and neutralize advanced enterprise defenses such as next-gen firewalls, antivirus, and EDR. According to the report, there has been a 333 percent increase in malware that can actively target defensive systems in an attempt to disable them.
91 percent of organizations experience software supply chain incidents


The overwhelming majority of organizations (91 percent) have experienced a software supply chain incident in the past 12 months, according to a new report.
The study from Data Theorem and the Enterprise Strategy Group surveyed over 350 respondents from private- and public-sector organizations in the US and Canada across cybersecurity professionals, application developers and IT professionals.
Why cyber risk assessment is critical to staying ahead of threats [Q&A]


The cybersecurity landscape is changing all the time and security teams are constantly searching for anything that can give them an edge in defending their systems.
We spoke to Rajeev Gupta, co-founder and chief product officer at insurance specialist Cowbell Cyber, about cyber risk assessment and how it can help businesses understand their level of risk and improve it to stay ahead of bad actors and threats like phishing attempts.
Google Bard becomes Gemini and adds a mobile app


Google's chat-based AI tool Bard, launched last year, has been rebranded as Gemini. Google says that this is the most capable of its AI tools to date. So what does the change from poet to star sign deliver?
The Gemini Pro 1.0 model is available in over 40 languages and more than 230 countries and territories. Thee are also two new additions -- Gemini Advanced and a mobile app-- to make it easier to collaborate with Google AI.
Improving data analysis with AI [Q&A]


Generative AI is making its presence felt in more and more areas, but there are well-founded concerns about the accuracy of information that it provides.
Is it possible to provide the convenience of a large language model AI system, with the logic and accuracy of advanced analytics? Arina Curtis, CEO and co-founder of DataGPT, thinks so. We spoke to her to find out more.
Cybercrime tactics evolve to embrace AI and online ads


A new report from BlueVoyant looks at the new risks organisations face from outside the traditional IT perimeters.
In particular, cybercriminals are using AI to create more effective phishing campaigns, and employing online adverts to lure victims to malicious websites.
The cyber threats to 2024's elections


With many countries around the world holding elections this year, Tidal Cyber has released a new report looking at the threats to global elections and offering insights on prioritizing defenses against top adversaries and election interference tactics, techniques, and behaviors.
The report identifies the top ten countries facing the highest election cyber interference threats this year as: the US, the UK, South Korea, India, Belgium, Pakistan, Belarus, Mexico, Georgia, and Indonesia.
Blancco partners with Lenovo to offer secure data erasure for enterprises


Enterprises are dealing with ever greater volumes of data and that brings with it added risk as well as compliance issues and management costs.
In particular, it's important for security and compliance to be able to securely dispose of data that's no longer required. This is why data erasure specialist Blancco Technology Group is announcing a global collaboration with Lenovo to provide secure data erasure as part of the Lenovo ThinkShield security solution.
Web app attacks target security misconfigurations


New research from Barracuda finds that 30 percent of all attacks against web applications target security misconfigurations -- such as coding and implementation errors.
Analysis of incidents detected and mitigated by Barracuda Application Security during December shows 21 percent involved code injection. Though these were more than just SQL injections, generally designed to steal, destroy, or manipulate data.
Improving visibility into end-user computing [Q&A]


In the wake of the coronavirus pandemic we've seen greater focus on workplace flexibility with many employees being in the office for fewer days each week.
But to make this work, enterprises must be able to track the state of their end-user computing to understand their access, performance and user satisfaction.
Tech businesses turn to AI to improve revenues and compliance


Process efficiency and cost-saving are top priorities for life sciences and high-tech executives, with greater emphasis placed on advanced analytics and artificial intelligence (AI) to achieve these priorities according to a new report.
The study from Model N shows three-quarters of executives say their current approach to revenue optimization needs improvement, and survey responses show plans to bolster revenue operations by incorporating advanced analytics (68 percent), AI (59 percent), and robotic process automation (46 percent).
As-a-Service tools dominate the cyber threat landscape


Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools now make up the majority of malicious tools in use by attackers, according to a new study.
The report from Darktrace shows malware loaders (77 percent of investigated threats) are the most common tool, followed by cryptominers (52 percent), and botnets (39 percent).
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.