BetaNews Staff

Agentic AI might take years to transform security, but cyber defenders must prepare now

Agentic AI

For the past two years, the world has been swept up in a rising tide of GenAI hype. The technology has evolved from a data science curiosity to a pervasive part of our everyday lives. ChatGPT alone has over 300 million weekly users worldwide -- and people use Large Language Models (LLMs) every day to generate text, images, music and more.

Despite GenAI’s widespread success, difficulty in developing robust applications that make use of trustworthy AI systems has proven difficult. This is most clear when noting the delta between consumer-facing GenAI applications relative to B2B integration of GenAI. But, with agentic AI this is about to change.

Continue reading

Exploring the security risks underneath generative AI services

AI-risk

Artificial intelligence has claimed a huge share of the conversation over the past few years -- in the media, around boardroom tables, and even around dinner tables. While AI and its subset of machine learning (ML) have existed for decades, this recent surge in interest can be attributed to exciting advancements in generative AI, the class of AI that can create new text, images, and even videos. In the workplace, employees are turning to this technology to help them brainstorm ideas, research complex topics, kickstart writing projects, and more.

However, this increased adoption also comes with a slew of security challenges. For instance, what happens if an employee uses a generative AI service that hasn’t been vetted or authorized by their IT department? Or uploads sensitive content, like a product roadmap, into a service like ChatGPT or Microsoft Copilot? These are some of the many questions keeping security leaders up at night and prompting a need for more visibility and control over enterprise AI usage.

Continue reading

The hidden cost of legacy systems: How they hinder ROI and digital transformation

At this point in time, it is essential for one’s company to transform digitally in order to stay competitive and work efficiently. Most organizations will pour money into new modern technologies to heavily improve ROI and operational performance while ensuring they stay relevant in the new digital world. However, there is a barrier that stands in the way of achieving the maximum benefits: legacy systems.

Outdated and old software, hardware, and technologies continue to slow down any organization's positive transformation. To make matters worse, legacy systems tend to derail digital transformation initiatives, leading to additional expenses, hidden costs, and delays.

Continue reading

Beyond traditional metrics: How to redefine AI success

In the past year, AI made great strides in moving past hype, so much so, that it’s hard to recall the early days of AI when the initial value of the technology was questioned. Today, as AI initiatives start to deliver widespread returns, enterprise CIOs are faced with competing forces of driving down core IT costs, while investing heavily in AI to drive business transformation.

A recent study of 2,400 IT decision makers, commissioned by IBM and developed with Lopez Research, underscores this optimism. The findings reveal that the vast majority of companies are making headway on their AI strategies, with nearly half already reporting positive financial returns from their deployments. The cost benefits have been especially pronounced for organizations using open-source AI tools -- 51 percent of surveyed companies harnessing open-source solutions reported seeing positive ROI, compared to just 41 percent of those that are not.

Continue reading

Would AI super agents mean goodbye to apps as we know them? 

In the Western world, we now have an app for everything. Shopping, banking, gaming, and even controlling the temperature in your home - you name it, there’s an app for it. The iOS app store began in 2008 with 500 apps, yet, now there are over four million apps available across iOS and Android platforms. Each of these apps serve individual needs and consumers have learnt to ignore the digital clutter in favor of app loyalty.

Asia went the opposite way. Instead of narrow-purpose-built apps, they built the 'everything app' long before Elon started dreaming about it with platforms like Paytm, Grab and WeChat. But what would it take for the West to catch up? AI super agents might be the answer to that one.

Continue reading

 IT teams, don't fall behind the AI curve

In the new age of AI, companies are looking for ways to integrate the groundbreaking technology cross-functionally to enhance efficiency, innovation and inform decision-making. Like any business department, IT teams are eager to learn how AI and automation can help alleviate more of the menial and burdensome tasks that consume large portions of their workday.

IT professionals are overworked, burnt out and feeling increasing pressure to do more with less. According to a recent survey of IT professionals, 78 percent reported that work stressors are preventing them from upskilling, and 44 percent said their workload is outweighing their ability to be productive. AI and automation can significantly help alleviate these burdens, but they must be implemented strategically and securely.  

Continue reading

5 reasons customers are choosing a cybersecurity platform over point products 

Cyber-attacks are becoming increasingly sophisticated and targeted, with the average number of weekly attacks per organization soaring to 1,673 in 2024 -- a 44 percent increase from 2023. In response, researchers and defenders are harnessing AI-powered analytics, anomaly detection and correlation engines to bolster security efforts. It’s an ongoing cat-and-mouse game that makes cyber compromise a question of when rather than if.

Effective defense hinges on resilience and minimizing the attack surface. However, many businesses are finding that traditional point-based solutions are leaving them with gaps in their security posture due to limited tools, skills or resources. There are five key factors that are leading organizations to look for a more sustainable and comprehensive platform-based approach.  

Continue reading

Everything an IT pro needs to know about penetration testing

Penetration-testing-pentest

The vast majority of IT professionals will agree that in cybersecurity, waiting for an attack to happen in order to expose weaknesses is a losing strategy.

As such, many will be well-clued up on the benefits of penetration testing; from demonstrating a commitment to protecting sensitive data and ensuring ongoing compliance with industry regulations, to gaining a clearer understanding of security gaps, and strengthening incident response readiness.

Continue reading

Seamless migration: Moving on-prem mailboxes to the cloud

Since 2020, most businesses have shifted their Microsoft Exchange mailboxes to the cloud. As of 2023, just 16 percent of Microsoft Exchange mailboxes operated on-premises -- a clear indication that organizations are seeking the improved scalability, reliability, and cost efficiency of cloud-based solutions.

However, migrations from on-prem mailboxes can be challenging. They can disrupt business operations, present security risks, and create compliance challenges. Without proper migration planning, businesses face significant vulnerabilities and risks. On top of this, support continues to diminish for various platforms. Just recently, Microsoft announced its sunsetting support for Exchange 2016 and 2019 later this year.

Continue reading

Rethinking risk -- are you taking the right path around security?

Business-risk

In the film Sliding Doors, a split second choice leads to two branching stories -- yet while the two stories are very different, they both lead to hospital trips and potential tragedy. The world of cyber security is similar. Whatever decisions we make, we are still under pressure and we will -- eventually, whatever we do -- end up facing significant risk.

Yet how do we show that we are doing a good job? If everything is working, there is nothing to see. Or have we collectively just been lucky to that point? Unless you have an active attack taking place, you can argue that your efforts are enough. But when you only look at a single point in time, it is a challenge to show that you are making a difference and reducing risk.

Continue reading

Top 10 data security best practices for 2025

Data Security

2024 ushered in one of the biggest shifts in data security, as cyber threats continued to increase in sophistication by leveraging advancements in AI to outpace traditional defenses. High-profile breaches across all industries continued, uncovering vulnerabilities in even the most robust systems. Meanwhile, the ongoing hybrid work models and migration to cloud-based technologies expanded the attack surface, creating new challenges for protecting sensitive data.

As 2025 rolls on, organizations need to follow best practices that represent a proactive, forward-thinking framework to stay ahead of emerging threats, protect critical data, and maintain the trust of their stakeholders. Here are ten best practices that organizations should consider.

Continue reading

How startups are redefining conflict

Modern-warfare

Conflict, like everything else these days, is now shaped by technology. The old model -- industrial-scale production, multi-decade procurement cycles, and the primacy of sheer manpower -- is fading. In its place something faster, leaner and more precise is emerging. Small teams with energy, ambition and good ideas now do in months what legacy contractors once did in years. In Ukraine, for example, drones built by startups and programmed by engineers barely out of university, are destroying tanks worth millions of dollars. The battlefield is changing. And with it, so is the balance of power.

A modern conflict, then, is not won by the biggest army. It’s won by those who can see first, move first, and strike first. This is the reality that some countries in some regions have been slow to grasp. I am a German citizen with friends in the force who have witnessed this first-hand. Their systems are bureaucratic, their procurement cycles sluggish. In a world where technology evolves in real time, they cannot keep pace. And after decades of peace, they haven’t felt motivated to do so.

Continue reading

The biggest security flaw of every cloud service that no one talks about -- until it's too late

Do you trust your SaaS vendor with the keys to your kingdom? The agent running on your systems is only as secure as your cloud vendor’s security posture. It’s a security risk that should keep every organization’s IT and security teams up at night.

Many vendors will cite pen testing, bug bounty programs, and certifications like SOC 2 and ISO 27001 as a testament to their security. But the reality is that breaches still happen.

Continue reading

The cost conundrum of cloud computing

Cloud question mark

For most businesses, change is driven by the need to reduce risk and innovate, while optimizing cost and return on investment. In the case of cloud adoption, the powerful functionality offered by these platforms enable businesses to streamline, optimise, and make their workflows more efficient which, in turn, helps reduce costs. Organizations are always looking for the best solutions for optimizing efficiency and reducing costs, particularly in uncertain economic times.

Yet, in reality, migrating to the cloud does not always bring the cost optimization and savings that an organization is looking to benefit from. Depending on which cloud solution is being evaluated, along with how the solution is designed, built, and deployed, the result may not deliver on the project’s original goals.

Continue reading

Seamless cloud migration: Building an AI-optimized future

AI Cloud

Implementing cloud services with AI technologies, such as Microsoft Copilot, is fundamental for IT providers seeking to offer advanced solutions. However, with greater dependence on AI-generated tools to foster innovation and productivity in organizations, the necessity of enabling cloud environments to host these sophisticated capabilities has become paramount.

Their successful integration, however, comes at the expense of having additional investments in computing power, data analytics, and intelligent security solutions that shield sensitive information from unauthorized access. Many companies first need to accomplish a cloud migration to improve the security posture of the infrastructure before implementing AI.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.