Ian Barker

Santa Claus may be coming to town but bots are getting all the best Christmas presents

New research from Imperva shows that 71 percent of UK consumers believe bad bots are ruining Christmas by snapping up all the most wanted presents.

It finds that 40 percent of consumers surveyed say they have been thwarted when trying to buy a gift in the past, only to find that it was completely sold out.

Continue reading

97 percent of banks hit by third-party data breaches

New analysis released by SecurityScorecard reveals that 97 percent of the top 100 US banks have experienced a third-party data breach in the past year.

As banks increasingly rely on third-party vendors for core functions, their exposure to supply chain vulnerabilities increases. Using the largest proprietary risk and threat intelligence dataset, SecurityScorecard's experts analyzed how third-party breaches impact the banking sector.

Continue reading

'Circuit compression' technology brings commercial quantum a step closer

Quantum computing is something that we've been covering for a while but commercial implementations always seem to be tantalizingly out of reach.

It could be getting nearer though thanks to work by Classiq Technologies, with Deloitte Tohmatsu Group, and Mitsubishi Chemical Corporation to demonstrate improved circuit compression.

Continue reading

The five email attacks to watch for in 2025

Despite the rise of other means of communication email remains the most commonly used. This makes it attractive to cybercriminals as it offers an entry point to businesses and the gateway that employees rely on to do their jobs.

A new report from Abnormal Security highlights the attacks that we’re likely to see in the next year and shows the need for improved defenses, including the use of AI.

Continue reading

How business function mapping can help align IT and cybersecurity with business priorities [Q&A]

In the modern business world, organizations face the ongoing challenge of aligning their IT and cybersecurity efforts with their business priorities.

The difficulty lies in understanding how your infrastructure supports your business's core functions. Without this understanding, prioritizing cybersecurity initiatives, managing vulnerabilities, and ensuring business continuity remains an uphill battle.

Continue reading

A quarter of organizations suffer AI-enhanced attacks against APIs or LLMs

A new study finds 25 percent of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75 percent of respondents expressing serious concern about AI-enhanced attacks in the future.

The research from API specialist Kong shows that although 85 percent say they're confident in their organization's security capabilities, 55 percent of respondents have experienced an API security incident in the past year, highlighting a notable disconnect.

Continue reading

AI impacts on data storage infrastructure

As we've already seen today organizations are struggling with the increasing demands of data infrastructure. Another new report from MinIO highlights how organizations are leveraging object storage for AI, machine learning (ML), and data-intensive workloads.

The survey of over 650 IT leaders 70 percent of enterprise data is in object storage today and this is expected to grow to 75 percent over the next two years.

Continue reading

Enterprises struggle to meet data infrastructure demands

Internal IT teams are being pushed to the brink, balancing the demands of modern data management with limited resources according to a new report.

The study from DataStrike gathered insights from nearly 200 IT leaders and decision-makers, it finds that 55 percent of organizations rely solely on internal IT teams to manage their data infrastructure, with only a small fraction (19 percent) outsourcing these critical functions.

Continue reading

Containers are a weak link in supply chain security

The use of container images is growing fast thanks to their flexibility and convenience, but they can also represent a weak cybersecurity link in software supply chains.

A new report from NetRise looks at the scope and scale of the components and risks found across 70 of the most commonly downloaded Docker Hub container images.

Continue reading

IBM brings optics into the data center to save energy and boost speed

When we think of optical technology it tends to be in terms of transmitting data over long distances. Today IBM is unveiling a breakthrough in optics technology that for the first time puts the speed and power of fiber optics inside servers and onto circuit boards.

Using a new process that replaces electrical wires with optical waveguides,this effectively enables chip connectivity at the speed of light.

Continue reading

The race against AI web scrapers: effective strategies to protect your data [Q&A]

A surge in artificial intelligence (AI), generative AI (GenAI), and machine learning (ML) technologies is creating a massive online appetite for data. These tools are hungry for training data, this has boosted AI web scraping, which sits in a legal gray zone. Sometimes it's legal, sometimes it's not, but what's clear is that it's having ripple effects across online businesses.

We talked to Nick Rieniets, field CTO of Kasada, to learn more about the impact of web scraping and what companies can do to protect their content.

Continue reading

Pro-Russian hacktivists target Europe

A new report shows that 96 percent of attacks conducted by a leading pro-Russian hacktivist group targeted Europe this year, with attackers focusing on influencing public perception and trust over direct technical disruptions.

Based on research and data from more than 135,000 security events in 160 countries, the Security Navigator report from Orange Cyberdefense also reveals that hacktivists were responsible for 23 percent of cyberattacks that directly targeted OT and 46 percent of these attacks resulted in a 'manipulation of control.'

Continue reading

Why it's time for a reset of security metrics [Q&A]

Historically, security metrics have focused on measuring how many attacks are successful and how long it takes for a successful attack to be detected. This is perhaps unsurprising since the bulk of the industry has focused on building tools to detect adversaries.

We spoke to Nicko van Someren, chief technology officer at Absolute Security, to learn why companies focusing purely on defense can create more risk for their organizations, and why instead of focusing on 'time to detection,' it's time to reset security metrics to focus on 'time to recovery.'

Continue reading

The top five most-phished industries

New research reveals the top five industries most frequently targeted by specifically tailored phishing attacks using either the recipient's name, email address, phone number, or company name.

The study from Cofense using data drawn from the Cofense Intelligence product between Q3 2023 to Q3 2024 shows, unsurprisingly, that finance tops the list, accounting for 15.5 percent of all credential phishing emails where the product redacted information from the subject in order to safeguard the recipient.

Continue reading

Over 30 percent of organizations need daily specialist support on virtual desktop issues

A new survey of 1,000 front line IT workers from Nexthink finds that 31 percent of organizations have daily virtual desktop infrastructure (VDI) problems requiring specialist intervention.

A further 40 percent are having issues on a weekly basis, as level one and two support staff are often unable to manage the complexity of VDI.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.