How contextual analysis can offer insight into the human element behind cyber threats [Q&A]


Cyber threats can come in many forms, over email, messaging platforms or social media. But what they all have in common is that they seek to exploit human weaknesses.
We spoke to Chris Lehman, CEO of SafeGuard Cyber, to discover how contextual analysis of business conversations can help determine if a conversation is benign or if something suspicious is taking place, allowing action to be taken.
Governance and security are top priorities for data teams


With ever more organizations rushing to adopt AI solutions, a new report suggests that implementing stronger data governance and security controls will be a higher priority for data teams as we head into 2024.
The report from data security company Immuta finds that only half of respondents say their organization's data security strategy is keeping up with AI's rate of evolution.
Organizations plan to use more AI in the next few years


A new survey from Snow Software reveals that 72 percent of IT leaders believe their organization will be using more AI in the next two to three years.
The poll of 800 IT leaders from the United States, United Kingdom, Germany and Australia set out to assess how IT decision makers' priorities have shifted over the past 12 months and outline their top areas of focus as they head into the new year.
Enterprises struggle with a changing security and compliance landscape


A new report from Vanta shows 67 percent of businesses say they need to improve security and compliance measures with 24 percent rating their organization's security and compliance strategy as reactive.
The expansion of attack surfaces in a post-pandemic hybrid world, combined with shrinking teams and budgets and the rapid rise of generative AI, are fueling an urgent need for companies to improve, and prove, their security posture.
Who's responsible for securing the software supply chain?


A new poll of over 500 security decision makers and developers shows a disconnect and even some distrust between CISOs and developers relating to how security-conscious each department is within the organization and what their roles are.
The Harris Poll conducted for Chainguard finds a majority of both developers and CISOs view software supply chain security as a top priority in their roles (70 percent and 52 percent respectively).
How the .ai domain is benefiting cybercriminals (and a small Caribbean island)

The rise of mobile app overlay attacks and how to defend against them [Q&A]


A major new threat has made its presence felt in the last few months. Cybercriminals have expanded the use of screen spoofing or overlay attacks from web applications to trusted mobile apps.
What’s more, the availability of as-a-service technology has lowered the threshold for attacks. We spoke to Dr. Klaus Schenk, SVP security and threat research at Verimatrix, to learn more about how these attacks work and what can be done to guard against them.
Organizations turn to GenAI to combat downtime


Downtime-producing incidents such as application outages and service degradation are putting organizations at risk of losing up to $499,999 per hour on average, so it's no surprise they're turning to AI to help their responses.
A new State of DevOps Automation and AI report from Transposit shows 84.5 percent of respondents either believe AI can significantly streamline their incident management processes and improve overall efficiency or are excited about the opportunities AI presents for automating certain aspects of incident management.
Unauthorized apps put businesses at risk


The risks from shadow and unauthorized apps have been known for years, but new research from Armis finds employees of 67 percent of UK organizations are introducing risk to the business by downloading applications and software onto assets without the knowledge or management of IT or security teams.
In addition the study, carried out by Vanson Bourne, finds 39 percent of enterprises admit to feeling challenged by increasingly complicated regulations and governance requirements.
Social media security issues pose threat to election campaigns


A new report from access management platform Cerby highlights the critical need for best practices for businesses and political leaders to secure their accounts as the November 2024 US elections quickly approach.
Researchers analyzed social media platforms Facebook, Twitter (X), Instagram, TikTok, and YouTube across six key security parameters. The report provides detailed insights into gaps in their support for enterprise-grade authentication and authorization.
Proton VPN rolls out new Linux app


Many people choose to browse the internet using a VPN because it offers a number of benefits including privacy and safety, and this is true whatever operating system you use.
With the launch of an all new app for Linux, Proton VPN is offering users of the open source OS greater functionality and a more intuitive interface. The Proton VPN Linux app natively supports Proton VPN's core security and privacy features.
IT pros worry about Kubernetes security


A new survey of 800 security and IT leaders from large organizations shows 76 percent of security and IT pros believe we are heading towards a cloud reckoning in terms of costs and security.
The study from Venafi finds that 84 percent believe Kubernetes will soon be the main platform used to develop all applications. But, three-quarters worry that the speed and complexity of Kubernetes and containers is creating new security blind spots.
Building an effective and insurable IoT security policy [Q&A]


As businesses look to manage their cybersecurity risk, many have turned to insurance to cover the financial implications of a successful breach.
However, insurers naturally want to limit their own exposure to risk and the small print of the policy may limit some claims. In particular this can apply to IoT devices which represent a major unprotected attack surface in corporate networks.
Passkeys 101: the future of passwordless authentication [Q&A]


Passkeys are often touted as being the way to achieve a passwordless future. But as yet passkeys are supported by only a small number of websites. Passkeys are a safer, more efficient way of authenticating users, but it will be a long time before they become the norm -- if indeed they ever become the norm.
We talked to Darren Guccione, CEO and co-founder of Keeper Security, to discuss the use cases for passkeys, the barriers to mass adoption and how users can adopt and secure passkeys in conjunction with their passwords.
OneSpan launches quantum-safe storage to secure digital agreements


Recent technology developments related to AI and the rise of quantum computing can put the integrity of digital agreements at risk, potentially leading to data loss, manipulation, identity or asset theft, and legal consequences for an organization.
For this reason OneSpan is launching a new Trust Vault feature for its e-signature solution that helps guarantee the integrity and long-term viability of documents using immutable storage based on blockchain technology.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.