Ian Barker

Verified randomness -- what is it and why does it matter? [Q&A]

Much of the online world relies on things being random. Gamers trust that their players re-spawn at completely random locations, similarly, gamblers trust that online slot machines are giving them random outcomes.

Ensuring things are properly random is also important for things like decentralized finance and blockchain transactions. But how can you be sure that something is properly random?

Continue reading

New resource helps enterprises prepare for post-quantum security

Cybersecurity company Thales is launching a first-of-its-kind Post Quantum Cryptography (PQC) Starter Kit in collaboration with Quantinuum, aimed at supporting enterprises in their transition to a post-quantum era and helping them understand the implications that quantum computing will have on the security of their infrastructure.

While 73 percent of organizations recognize quantum computing poses a threat to traditional cryptography, 61 percent have yet to define a strategy for a post-quantum world.

Continue reading

Enterprise digital infrastructure expected to shift to subscription models

Future-network

By 2026, 80 percent of new enterprise digital infrastructure investment is forecast to be operated through a subscription-based model.

The Global Interconnection Index (GXI) 2024, released today from Equinix, predicts that in order to meet the ever-growing demands of data-dense technologies such as AI, 5G and edge computing, IT decision-makers are increasingly shifting away from long-term purchases of physical equipment, such as servers, routers and storage arrays, in favor of flexible subscription-based models.

Continue reading

How your voice could be used by phone scammers

We've all become used to scam phone calls of various kinds, but it seems AI is allowing them to become more sophisticated.

According to NordVPN, scammers are now able to create realistic voice clones from samples collected online and use them to extort money and data from victims' friends, relatives, or colleagues.

Continue reading

Businesses call on EU to defend encryption and privacy

Data privacy

In March this year, EU countries' interior ministers are due to vote on the introduction of mandatory client-side scanning for all providers in order to identify child abuse material.

But an open letter, published today, from a group of privacy-focused companies warns of the risk of opening up a backdoor and calls on ministers to defend citizen's right to privacy and strengthen the position of EU companies.

Continue reading

How to reduce generative AI's risks to data [Q&A]

AI

Generative AI models like ChatGPT are creating a lot of enthusiasm for what they can do for businesses, but they are generating just as much fear over what can go wrong with the data they handle. There is a lack of trust between large companies that have the data and the AI startups that want to use them.

What can we expect to see in the near future? We spoke with Katy Salamati, senior manager of the advanced analytics lifecycle at SAS, to find out.

Continue reading

Winter is coming and so are the hackers

A survey from Defcon 17 back in 2009 revealed that 81 percent of hackers are more likely to be active in winter.

It's easy to understand why this might be, with the holiday period bringing a spike in online trading as well as businesses closing down or operating on skeleton staffs.

Continue reading

81 percent of security pros say phishing is the top threat

A new study finds that that most organizations anticipate phishing (81 percent), malware and ransomware (76 percent), and accidental data loss (63 percent) will be the top security risks over the next six months, followed by social engineering (55 percent) and third-party risks (52 percent).

The report from Fortra looks at the challenges security professionals have faced over the past year, as well as what they plan to focus on next as they continue to embrace digital transformation, new hybrid infrastructures and a challenging security landscape.

Continue reading

How 5G is set to transform the way businesses connect [Q&A]

5G circuit board

The rollout of 5G will speed up mobile communications and also enable more computing tasks to be carried out at the edge.

For businesses it presents the opportunity for a greater understanding of customer patterns and infrastructure needs. We spoke to Chris Gehlen, CEO and co-founder of SaaS/NaaS cloud platform Neutroon, to learn more.

Continue reading

Three-quarters of CISOs considering a job change

A new report from IANS Research and recruitment firm Artico Search shows that although 64 percent of CISOs say they are satisfied in their job, 75 percent are open to a change.

More than 660 chief information security officers (CISOs) provided data for the report. Additionally, research team members held conversations with over 100 CISOs to better understand the challenges they face today and the future opportunities.

Continue reading

Over 90 percent of organizations set to increase data protection spending

data protection jigsaw

The latest Data Protection Trends report from Veeam Software shows 92 percent of organizations will increase their 2024 data protection spend, to achieve cyber resilience amid continued threats of ransomware and cyber-attacks.

However, while companies say they will spend more trying to fend off cyberattacks, the report finds IT leaders are feeling even less protected and more concerned about their ability to recover and restore mission-critical data.

Continue reading

Universities not delivering the right skills for cybersecurity

Over three quarters of cybersecurity professionals in the UK and US don't believe university courses are preparing graduates adequately for the working world, according to new research.

The study of 3,000 IT and cybersecurity professionals in the UK and the US, from cybersecurity upskilling, certification, and talent assessment platform Hack The Box, shows 78 percent of cybersecurity and IT professionals believe a traditional university education in cybersecurity is not doing enough to prepare graduates for the modern workforce.

Continue reading

Financial services businesses see spike in vendor email compromise

A new report from Abnormal Security shows that vendor email compromise (VEC) attacks against financial services organizations increased by 137 percent in 2023.

This is an industry that handles a wide array of sensitive personal and financial information of the type hackers love to get their hands on. This makes organizations within the financial services sector particularly susceptible to cyberattacks, including socially-engineered email attacks.

Continue reading

What is a vCISO and why would you want to hire one? [Q&A]

CISO

As the profile of cybersecurity has increased within enterprises, so has the challenge of finding people to fill senior roles and then hanging on to them.

Recent research suggests that CISOs don't stay in the job for more than three years on average. One answer is to use a virtual CISO (vCISO) to advise on current issues and relieve the strain on the in-house team.

Continue reading

New collaboration helps organizations defend against AI and quantum risks

One of the key recent concerns for security teams has been developing the ability to adapt to advancements in technology and innovations such as AI and quantum computing.

A new partnership between Accenture and SandboxAQ aims to give organizations the ability to scan all of their files, applications and network traffic to ensure that all of their data -- whether on-premise or hosted via major cloud providers -- is secure even if attackers break through firewalls and network endpoints.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.