Ian Barker

Majority of companies not prepared for insider threats

insider threat

An overwhelming majority of global organizations admit they are ill-prepared to handle the steady increase in insider threat activity, according to new research conducted by Cybersecurity Insiders and announced today by Securonix.

While 76 percent of organizations have detected increased insider threat activity over the past five years, less than 30 percent believe they are equipped with the right tools to handle them.

Continue reading

Bugcrowd sees 30 percent increase in web vulnerability submissions

Computer bug

Crowdsourced security platform Bugcrowd’s latest Vulnerability Trends Report finds that the hacker community recorded a 30 percent increase in web vulnerability submissions on the platform compared to 2022.

In addition it has recorded an 18 percent increase in API submissions, a 21 percent increase in Android submissions, and a 17 percent increase in iOS submissions.

Continue reading

New unified SASE gateway boosts performance for enterprises

SASE, Secure Access Service Edge

Secure Access Service Edge (SASE) technology has become increasingly popular as it combines the delivery of wide area networks and security controls in a single platform.

As enterprises look to support new digital requirements including accelerated cloud adoption, edge computing, increased use of collaboration tools, and a hybrid workforce SASE is likely to become still more popular. Versa Networks is launching a new line of Unified SASE gateways delivering 100+ Gbps throughput to meet the growing demand for increased convergence of networking and security.

Continue reading

Organizations face devastating financial consequences from cyberattacks

Bankrupt loss crash

A new report from Barracuda Networks and the Ponemon Institute looks at 'cybernomics' -- the financial forces that are driving cyberattacks.

Based on a survey of over 1,900 IT security practitioners it finds the average annual cost to respond to compromises is a startling $5.34 million.

Continue reading

Verified randomness -- what is it and why does it matter? [Q&A]

random_numbers

Much of the online world relies on things being random. Gamers trust that their players re-spawn at completely random locations, similarly, gamblers trust that online slot machines are giving them random outcomes.

Ensuring things are properly random is also important for things like decentralized finance and blockchain transactions. But how can you be sure that something is properly random?

Continue reading

New resource helps enterprises prepare for post-quantum security

Post Quantum Cryptography and Quantum Resistant Cryptography - P

Cybersecurity company Thales is launching a first-of-its-kind Post Quantum Cryptography (PQC) Starter Kit in collaboration with Quantinuum, aimed at supporting enterprises in their transition to a post-quantum era and helping them understand the implications that quantum computing will have on the security of their infrastructure.

While 73 percent of organizations recognize quantum computing poses a threat to traditional cryptography, 61 percent have yet to define a strategy for a post-quantum world.

Continue reading

Enterprise digital infrastructure expected to shift to subscription models

Future-network

By 2026, 80 percent of new enterprise digital infrastructure investment is forecast to be operated through a subscription-based model.

The Global Interconnection Index (GXI) 2024, released today from Equinix, predicts that in order to meet the ever-growing demands of data-dense technologies such as AI, 5G and edge computing, IT decision-makers are increasingly shifting away from long-term purchases of physical equipment, such as servers, routers and storage arrays, in favor of flexible subscription-based models.

Continue reading

How your voice could be used by phone scammers

Voice print

We've all become used to scam phone calls of various kinds, but it seems AI is allowing them to become more sophisticated.

According to NordVPN, scammers are now able to create realistic voice clones from samples collected online and use them to extort money and data from victims' friends, relatives, or colleagues.

Continue reading

Businesses call on EU to defend encryption and privacy

Data privacy

In March this year, EU countries' interior ministers are due to vote on the introduction of mandatory client-side scanning for all providers in order to identify child abuse material.

But an open letter, published today, from a group of privacy-focused companies warns of the risk of opening up a backdoor and calls on ministers to defend citizen's right to privacy and strengthen the position of EU companies.

Continue reading

How to reduce generative AI's risks to data [Q&A]

AI

Generative AI models like ChatGPT are creating a lot of enthusiasm for what they can do for businesses, but they are generating just as much fear over what can go wrong with the data they handle. There is a lack of trust between large companies that have the data and the AI startups that want to use them.

What can we expect to see in the near future? We spoke with Katy Salamati, senior manager of the advanced analytics lifecycle at SAS, to find out.

Continue reading

Winter is coming and so are the hackers

laptop_coat_winter

A survey from Defcon 17 back in 2009 revealed that 81 percent of hackers are more likely to be active in winter.

It's easy to understand why this might be, with the holiday period bringing a spike in online trading as well as businesses closing down or operating on skeleton staffs.

Continue reading

81 percent of security pros say phishing is the top threat

Malware phishing data

A new study finds that that most organizations anticipate phishing (81 percent), malware and ransomware (76 percent), and accidental data loss (63 percent) will be the top security risks over the next six months, followed by social engineering (55 percent) and third-party risks (52 percent).

The report from Fortra looks at the challenges security professionals have faced over the past year, as well as what they plan to focus on next as they continue to embrace digital transformation, new hybrid infrastructures and a challenging security landscape.

Continue reading

How 5G is set to transform the way businesses connect [Q&A]

5G circuit board

The rollout of 5G will speed up mobile communications and also enable more computing tasks to be carried out at the edge.

For businesses it presents the opportunity for a greater understanding of customer patterns and infrastructure needs. We spoke to Chris Gehlen, CEO and co-founder of SaaS/NaaS cloud platform Neutroon, to learn more.

Continue reading

Three-quarters of CISOs considering a job change

Searching job vacancies

A new report from IANS Research and recruitment firm Artico Search shows that although 64 percent of CISOs say they are satisfied in their job, 75 percent are open to a change.

More than 660 chief information security officers (CISOs) provided data for the report. Additionally, research team members held conversations with over 100 CISOs to better understand the challenges they face today and the future opportunities.

Continue reading

Over 90 percent of organizations set to increase data protection spending

data protection jigsaw

The latest Data Protection Trends report from Veeam Software shows 92 percent of organizations will increase their 2024 data protection spend, to achieve cyber resilience amid continued threats of ransomware and cyber-attacks.

However, while companies say they will spend more trying to fend off cyberattacks, the report finds IT leaders are feeling even less protected and more concerned about their ability to recover and restore mission-critical data.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.