BetaNews Staff

Inside a cyberattack: How hackers steal data

AI-Fraud-hacker

The truth about cybersecurity is that it’s almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry becomes increasingly sophisticated and their technology more advanced.

Once a hacker has broken through an organization’s defenses, it is relatively easy to move within the network and access information without being detected for days, and even months. This is a significant concern for Banking and Financial Services organizations, which house valuable sensitive and Personally Identifiable Information (PII). The goal of cybersecurity is to minimize the risk and the impact of a breach. Understanding the adversary’s mindset and activity is central to this.

Continue reading

Why API-first engineering is the way forward for software development

British software developer and international public speaker on software development, Martin Fowler once famously said: “Any fool can write code that a computer can understand. Good programmers write code that humans can understand.” His book on Refactoring has been a best seller for decades and is a guide on how to transform code safely and rapidly, helping developers build better code. Exactly these same principles should apply when looking to develop an API-first approach to software engineering.

But first, what do we mean when we talk about an API-first approach? This is a software development method that prioritizes the design of APIs before writing any other code, instead of treating them as an afterthought. This is different from the traditional approach, where the application code is written first, and the API is added later.

Continue reading

Five ways data platforms are underpinning the second cloud revolution

According to Gartner, over the next few years hybrid cloud will become the de facto approach for unlocking value from data. The projections are stark. Nine-in-ten organizations will adopt a hybrid cloud model by 2027, and end user spending globally on public cloud will grow by 21.4 percent this year alone, reaching more than $723 billion. Application services, system infrastructure services and Platform-as-a-Service (PaaS) will all see a boost in spending as well. By anyone’s money, these are huge numbers.

This second cloud revolution is being driven by data. When combined with analytics, data is a uniquely valuable asset for any business. If harnessed correctly, it can grow revenue, reduce costs, and entirely transform a business by opening up fresh market opportunities through the use of new technologies like GenAI.

Continue reading

From fixing issues to fueling innovation: The growing business case for observability

This year, embracing a leading observability practice will not only be a key priority for organizations but an essential competitive differentiator. Recent data shows that leading organizations with mature observability practices spend 38 percent more of their time on innovation, in contrast with organizations early on in their observability journey. This greater amount of time to focus on product innovation can equate to significant benefits for an organization, such as increased developer productivity, improved operational efficiency and more importantly winning market share.

2024 has shown us that the impact and business value of observability is expanding. It is evolving from a reactive practice to a proactive one where organizations not only use observability for troubleshooting issues but now also to inform their customer experience strategy and to fuel faster innovation.

Continue reading

How cloud security teams should think about AI

According to estimates from Goldman Sachs, generative AI (GenAI) will constitute 10-15 percent of cloud spending by 2030, or a forecasted $200-300 billion (USD). The public cloud serves as the perfect vessel for delivering AI-enabled applications quickly, cost-effectively, and at scale. For organizations looking to profit from AI’s potential, the path effectively travels through the cloud.

For cloud security teams on the ground, however, the impact of AI can seem complicated. Understanding the challenges it presents, and the key capabilities it enables, can help them work smarter and more effectively. This article explores the three ways cloud security teams should think about AI to enhance protections, improve efficiency, and address resource constraints.

Continue reading

The encryption backdoor debate: Why are we still here?

Backdoor button

Earlier this month, reports emerged that the UK government had pressured Apple, under the Investigatory Powers Act 2016, to create a backdoor into encrypted iCloud data. Unlike targeted access requests tied to specific cases, this demand sought a blanket ability to access users’ end-to-end encrypted files.

Apple was forced to reconsider its Advanced Data Protection service in the UK, and this latest development raises a fundamental question: Why does the debate over encryption backdoors persist despite decades of technological progress and repeated warnings from cybersecurity experts?

Continue reading

Punycode: The invisible cyber threat hiding in plain sight

The internet was conceived to connect the world, and internationalized domain names (IDNs) have certainly helped make that vision a reality. By allowing non-ASCII characters in web addresses, they’ve been pivotal in improving both accessibility and inclusivity.

As with any technological breakthrough, cybercriminals have found a way to turn innovation into exploitation. By using Punycode, a system for encoding IDNs, attackers have been able to create their own deceptive domains to mimic trusted brands and evade traditional security defenses to fool even the most wary users.

Continue reading

Strengthening cyber resilience -- cautious collaboration between organizations and third-party vendors needed

Cybersecurity

Ransomware is continuously on the rise. Despite multiple major law enforcement actions against ransomware groups over the past year, there has been a significant increase in ransomware attacks between 2023 and 2024. Interestingly enough, there was also a tracked 35 percent drop in ransomware payments in 2024, but it is clear that this is not stopping ransomware attacks from continuing as threat actors are finding other ways to monetize the data they’re stealing.

To combat this rise, cyber security measures within organizations need to be improved at every level, especially as the threat landscape grows even more complex. This past year has shown us that the importance of careful third-party vendor collaboration particularly must not be overlooked. With that said, there are a few considerations that need to take priority as 2025 progresses.

Continue reading

Right now, there is no right or wrong SASE answer 

SASE, Secure Access Service Edge

Adoption of SASE, or secure access service edge, is accelerating -- especially, according to IDC, at organizations of over 1,000 employees, while it’s estimated the global SASE market will grow from last year’s $1.83 billion to over $17 billion by 2033

The business case for such rapid take-up is simple: SASE is the perfect way of blending the best of your network, the cloud, and cybersecurity. According to Gartner, because SASE is primarily delivered as software as a service it’s a great way to enable full zero trust access based on the identity of the device or entity, and it’s easily combined with real-time context and security and compliance policies. 

Continue reading

Is a lack of supply chain visibility undermining board-level confidence in cyber security programs?

As we head further into 2025, organizations must focus on bolstering operational resilience and addressing third-party risks, driven not only by commercial imperatives but also by new regulatory mandates. With the enactment of regulations such as NIS2 in late 2024 and DORA early this year, supply chain risk management is now a strategic necessity.

This means that third-party cyber risk management must become a strategic priority. However, according to BlueVoyant’s fifth annual Supply Chain Defence report, which examines fast-evolving supply ecosystems, many organizations don’t appear to be prioritizing supply chain cyber risk management, or are unaware of cyber security gaps in their supply chains.

Continue reading

A new age of fraud: building resilience against adversary-in-the-middle attacks 

Fraud stop

From phishing scams to business email compromise, fraud is continually evolving and cybercriminals are using increasingly refined tactics to exploit vulnerabilities. Adversary-in-the-middle (AiTM) attacks are also rapidly emerging as an advanced technique that poses pervasive physical and digital risk across industries. In fact, recent research shows a 46 percent increase in AiTM attacks compared to 2023. 

Staying ahead of these tactics is increasingly important as fraud becomes more complex. Before we delve into how to actively prevent fraud, we need to firstly explore the nature of AiTM attacks and then look at what’s fueling this increase in fraudulent activity. 

Continue reading

Why it's time to guarantee resilience in our critical software

Cyber resilience

Software has become central to our daily lives, with nearly every major company relying on it to operate. We are all increasingly dependent on fault free software for almost everything we do -- whether it’s ensuring trains run on time, accessing websites or using online banking.

Software has evolved into a form of digital public infrastructure, just as vital as physical infrastructure like roads and utilities. Yet, despite its critical role, software largely goes unmonitored and unregulated.

Continue reading

What startups can learn from special forces strategy

On the battlefield and in the trenches of entrepreneurship, victory comes to those who dare to think unconventionally and act with precision. As a former Green Beret, I've seen firsthand how the principles of unconventional warfare can translate into the business arena. Both demand team building, strategic thinking, and adaptability in dynamic environments.

Let's break down the seven-phase model of unconventional warfare and see how it can guide a startup from its inception to market dominance.

Continue reading

How technical sprints can drive innovation and resolve tech debt through developer empowerment

Whilst Agile has revolutionized the way we work in software development, the pace of development is fast and delivery can feel relentless. It’s typical for developer teams to struggle to find dedicated time for R&D and to catch up with the persistent technical debt -- especially when under constant pressure to deliver the next feature or product iteration. 

For developers on longer term contracts, they deliver code, release and tomorrow they’re picking up the next iteration. There’s often no time to pause to celebrate success and take a break. In fact, the risks of team burnout and technical debt accumulating to worrying levels are very real.

Continue reading

The future is AI, zero trust, satellite, and network slicing  

looking ahead

Industry 4.0 is revolutionizing how enterprises need to operate. Integrating cloud technology, robotics, mobile devices and IoT devices is essential to staying ahead in an increasingly competitive global market. To maximize the benefits of Industry 4.0, however, these technologies must always stay connected to a network.

This has become even more true as IT environments grow to massive scales and unprecedented digital dependencies drive business outcomes. In 2025, network downtime could carry a price tag with consequences we’ve never seen before. Therefore, as businesses look to cellular and/or hybrid approaches to enhance their wireless wide area networks (WWAN), they must depend on four things to create resilient connectivity -- artificial intelligence (AI), satellite, network slicing, and a renewed respect for zero-trust principles.  

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.