Ian Barker

Top three vulnerabilities of 2023 not covered by CVEs

server vulnerability unlock

As we approach the end of the year, a new report from Detectify shows that none of the top three vulnerabilities found across all industries in 2023 were covered by a CVE.

What's more, 75 percent of the total vulnerabilities regularly scanned by Detectify, primarily crowdsourced from its community of ethical hackers, don't have a CVE assigned. This suggests that over-reliance on frameworks like the CVE program can weaken an organization's security posture and give it an unrealistic sense of security.

Continue reading

Why open source is key to modernizing the enterprise -- without ditching the mainframe [Q&A]

Enterprise technology

Many large enterprises still rely heavily on mainframes to offer a reliable and secure basis for their systems.

But as digital transformation efforts gain pace, developers are eyeing frameworks that can boost their modernization efforts. We spoke to Phil Buckellew, president of infrastructure modernization at Rocket Software, to find out how open source software can bridge the divide between modern applications and mission-critical mainframe infrastructure.

Continue reading

Almost 90 percent say they're prepared for password-based attacks -- but half still fall for them

laptop password login

A new report from Axiad shows that 88 percent of IT professionals feel their company is prepared to defend against a password-based cyberattack, yet 52 percent say their business has fallen victim to one within the last year.

Based on over 200 responses from US IT pros, the study shows 39 percent think phishing is the most feared cyberattack, while 49 percent say it's the attack most likely to happen.

Continue reading

IT leaders struggle to find AI talent but aren't investing in professional development

Training course

One-in-three IT leaders say they are struggling with finding qualified AI and ML talent, and while these are the biggest areas of focus, 43 percent rate their teams' AI and ML skill sets as low.

A new study from Skillsoft of more that 5,700 IT professionals finds skill development is a critical piece of the puzzle for building a competitive organization, though more work is needed to optimise training among technology teams.

Continue reading

'Composite AI' could be key to successful artificial intelligence in the enterprise

Futuristic AI thinking of droid robot artificial intelligence concept

New research shows that businesses are increasing their investments in AI across many areas, but there are challenges and risks that they need to manage.

The study of 1,300 tech leaders from Dynatrace shows 98 percent are concerned that generative AI could be susceptible to unintentional bias, error, and misinformation. In addition 95 percent are concerned that using generative AI to create code could result in leakage and improper or illegal use of intellectual property.

Continue reading

How organizations can get a handle on cloud security [Q&A]

Cloud data protection

As cloud-based enterprises continue to grow, the security threats in the cloud grow with them. Organizations operate in complex, multilayered environments that leave security teams scrambling to protect all of their organization's assets and resources. In fact, they may not even be aware of all of them.

What are the biggest risks they face today? And how can organizations mitigate their vulnerabilities?

Continue reading

How AI can help app developers keep up with changing regulations [Q&A]

Compliance rule law and regulation graphic interface for business quality policy

A changing regulatory landscape can prove difficult for app developers as they need to make sure they remain compliant and keep up with evolving rule sets.

We spoke to Pedro Rodriguez, head of engineering at AI-powered compliance intelligence platform Checks, to find out how AI can help mobile app developers to handle data responsibly and keep up with ever-changing global regulations,

Continue reading

Sensitive data on Google Drives puts companies at risk

Google Cloud

New research from Metomic finds that 40 percent of Google Drives hold sensitive data that could put an organization at risk of a data breach or cybersecurity attack.

The research scanned around 6.5 million Google Drive files and also shows that 34.2 percent of all the files scanned were shared with external contacts (email addresses outside of the company's domain) and more than 350,000 files (0.5 percent) had been shared publicly, giving access to anyone who had the document link.

Continue reading

Ransomware attacks lead to companies raising prices

Arrow and money staircase increase rise cash

Ransomware attacks are influencing price inflation, according to a new UK survey by Censuswide, commissioned by Veeam Software.

The findings show that large organizations are having to increase costs to customers by an average of 17 percent following an attack. Nearly a quarter of companies (22 percent) say they increased prices by 21-30 percent, while six percent increased prices by 31-40 percent.

Continue reading

84 percent of organizations combine IT and security operations in one analytics tool

multiple threats

A new survey of 500 full-time security decision-makers and practitioners finds that 84 percent indicate their organization combines security and data operations into a single analytics tool.

However, the study from Observe shows more than half of the security relevant data that goes into observability systems needs to be transformed before it can be used.

Continue reading

Only 19 percent of manufacturing leaders are confident of their cyber defenses

The factory automated conveyor shop on production of strawberry jam.

New research into the manufacturing threat landscape from Trustwave finds that just 19 percent of manufacturing industry leaders are confident in their cyber defense mechanisms.

The research documents the attack flow utilized by threat groups, exposing their tactics, techniques, and procedures. From email-borne malware to the exploitation of SMB and DCOM protocols for lateral movement, these persistent threats pose significant risks to the manufacturing sector.

Continue reading

2023 Call for Code winners announced

Farmer agriculture

The sixth annual Call for Code Challenge launched back in February with a focus on developing AI-powered technology projects that address sustainability to help fight climate change.

Today sees IBM, United Nations Human Rights, and the Linux Foundation announce the winners in the challenge's three categories -- Developer, University, and Independent Software Vendor/Startup.

Continue reading

Cisco launches AI security assistant for enterprises

Cisco logo

As cyberattacks continue to evolve so defenses need to change to keep up. In many cases that means adopting AI.

Enterprise networking and security company Cisco is the latest to embrace this with launch of Cisco AI Assistant for Security.

Continue reading

Network security is ripe for automation -- except when it isn't [Q&A]

Technology center with fiber optic equipment

According to one analyst estimate, the market for network automation tools will grow nearly 23 percent annually from 2022-2030.

While many IT professionals are familiar with automation of business processes, they are likely less familiar with its applications in network operations (NetOps) and security. As automation technology is maturing, organizations are using network automation solutions to transform their core workflows, including troubleshooting, change management and network security, for more efficient and effective network operations.

Continue reading

AI and automation are top enterprise priorities

Automation-endpoints

According to a new report from Digitate 90 percent of IT decision-makers plan to deploy more automation, including AI, in the next 12 months.

Based on a survey of 601 US-based IT decision-makers in organizations with more than 1,000 employees and conducted with Sapio Research, the study finds 26 percent of respondents plan to implement machine-operated tasks that require limited human input or fully transition to autonomous systems in the next five years.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.