BetaNews Staff

2024 vision: Trends shaping the IT landscape

2024 Cloud

The IT and cloud computing landscape has grown and evolved in 2023, and it’s poised to continue developing in 2024. Companies worldwide are actively adapting to the dynamics of a post-pandemic world. In this pursuit of resilience and innovation, we anticipate the emergence of four key trends that will shape the new year. These trends encompass technological advancements and shifting IT paradigms regarding spending, loyalty and governance.

Here are four trends we will likely see in the new year.

Continue reading

Fighting the next generation of fraud

Fraud stop

In today’s digital age, the landscape of fraud is evolving at an alarming pace. Victim profiles, which used to skew heavily toward the elderly and infirm, now include younger, fully functioning adults. In 2022, 20-59-year-olds reported 63 percent of all fraud in the United States. Industries being targeted by fraudsters are evolving as well, and now include those in crypto and gaming.

In the past, most adults were able to see through scams and avoid them. However, the introduction of generative AI has been a game changer, transforming ordinary schemes into highly sophisticated efforts. Generative AI, a subset of artificial intelligence (AI), is making waves in the world of cybercrime. It is a technology that can generate content that is virtually indistinguishable from human-created content. Whether it's producing convincing text, images, or audio, generative AI leverages deep learning and neural networks to create highly realistic and persuasive output at scale. Shady third-world country call centers have been replaced by autonomous AI tools. This capability has become a powerful tool in the hands of fraudsters.

Continue reading

Putting individuals back in charge of their own identities

fake identities

From letting hotels keep copies of our passports to handing over IDs for car hire or air travel, we seldom think twice about the implications of physically sharing our identity documents. By now, we’ve gotten accustomed to exchanging personal information in return for a product or service we value -- but we need to be more vigilant at a time when identity fraud is jumping as much as 37 percent.

Proof of a person’s identity is the key to accessing goods, services, financial accounts, and opportunities -- which makes identity a valuable target, motivating fraudsters to try to gain our trust to trick us into disclosing our personal information so they can impersonate us. They also hack into identity databases that store personal information of millions of consumers. As a result, the frequency of data breaches has increased exponentially. In fact in 2022 alone, identity theft reached a staggering $42 billion in the US.

Continue reading

Harmonizing human insight with AI: The future of tax and finance in the digital era

In common with many industries, the digital transformation era has ushered in a paradigm shift in the tax and accountancy sectors. This has placed automation and artificial intelligence (AI) at the center of operational innovation, efficiency and competitive advantage. In doing so, these and other technologies are redefining the way industry professionals approach their work, with profound implications for the future.

Among the key questions this creates are: what does this all mean for human skillsets and expertise, and how can businesses balance these changes with uniquely human capabilities, ensuring that one complements the other? In looking for answers, there are several key areas to consider:

Continue reading

The bridge to the future

Unless there is easy and seamless connectivity between different blockchain-based asset types on different platforms, the full benefits of tokenization will not be realized. However, achieving this interoperability has proven a significant obstacle. The blockchain bridge has emerged as a promising solution, albeit one that has historically carried cost and risk. But recent advancements have made these bridges accessible, secure, and cost-effective.

Blockchain technology, which captured the imagination of the public some 15 years ago, promised to revolutionize the financial world. With each passing year, new and use cases have emerged, slowly but surely attracting a growing user base. Although the exact timeline for mass adoption remains a topic of debate, many in the industry agree it is an eventuality.

Continue reading

We tried Brave's AI chatbot Leo: It talks a lot about privacy, but is it truly private?

Ask Brave's AI Chatbot Leo

In early November, Brave, best known for its privacy-focused browser, launched its own AI chatbot called Leo. The chatbot is built into the desktop version of the browser (Brave says it will be coming to mobile soon), and was made available to all users for free. We at AdGuard, always eager to explore new AI-powered tools, and aftertesting Bing AI and playing with others, we couldn't resist the chance to check out Leo and assess its smartness and privacy features.

By default, Leo is found in the sidebar. To summon the genie AI-powered assistant, one simply needs to type 'ask Leo' in the address bar and it will materialize on the right side of the screen.

Continue reading

Undertaking a data diet this Black Friday

Data

Like every year, Black Friday marks the start of the end-of-year shopping season, and with it a significant increase in online sales. Although it's very much an American event, Black Friday in the UK has grown in popularity in recent years. In 2022, UK consumers spent a record £9.42 billion over the Black Friday weekend. Of this, 61 percent was spent online.

For e-retailers in the UK, the cyber weekend represents a significant increase in activity and traffic, leading to an accumulation of data generated and collected by e-commerce sites, requiring large storage capacities with a high environmental impact.

Continue reading

Will Quantum Computing change the way we use encryption?

Today, encryption is a cornerstone of our cybersecurity practices. It protects everything from cell phones and SMS messages to financial transactions and intellectual property.

However, a new challenge in the complex landscape of encryption has recently emerged, thanks to the advancement of quantum computing. What challenges lay ahead? Here is the breakdown:

Continue reading

Mitigating fraud risks when expanding internationally

Fraud stop

Global expansion is the way forward for businesses looking to upscale in 2023 and beyond. The past few years have laid the foundation for international expansion, and now more and more merchants are embracing the opportunities.

But as they’re venturing into new markets, certain challenges appear along the way. One of them is cross-border payment. While businesses might be familiar with the fraud situation in their home market, new territories present new fraud obstacles. Here is why fraud familiarization is key to success and what are the fraud profiles of some of the major markets.

Continue reading

The CISO view: Navigating the promise and pitfalls of cybersecurity automation

security meter

Cybersecurity automation has steadily gained traction as organizations seek to improve efficiency, address talent gaps, and keep up with escalating threats. However, our latest State of Cybersecurity Automation research shows that while more businesses are utilizing automation, they continue to grapple with obstacles that prevent them from fully capitalizing on its benefits.

In our recent study surveying over 700 cybersecurity professionals, we uncovered several persistent pain points in implementing automation. The research found that a lack of trust in automated outcomes, insufficient expertise among users, and poor communication between teams have hampered automation success. As a result, organizations are struggling to build confidence in automation and maximize its effectiveness.

Continue reading

Why good cyber hygiene is a strategic imperative for UK SMEs

Cyber Hygiene

No company is immune from a cyber-attack, with large and small being targeted. As technologies advance and cybercriminals hone their skills, evolve their tactics, and find new vulnerabilities to exploit, companies can no longer ask the question of if a cyber attack will occur but when and how it will happen.

While the number of data breaches is cause for concern, the cost associated with them is equally alarming. According to Cybersecurity Ventures, the global average cost of a cyberattack has ballooned to $4.45 million, increasing by 15 percent over the past three years. Even more sobering is that it shows no signs of easing, as global cybercrime costs are projected to reach $10.5 trillion annually by 2025.

Continue reading

The next evolution of AI: From conversations to interactions

Artificial Intelligence Bias

Chatbots such as ChatGPT and voice assistants like Siri and Alexa have become ubiquitous parts of our daily lives. Millions of people regularly converse with these AI-powered tools to get information, set reminders, control smart devices, and more. However, while chatbots and virtual assistants represent an important early milestone in the development of artificial intelligence, they remain limited in significant ways.

These conversational agents can only engage in simple, narrow tasks operating in an isolated, disembodied way, devoid of richer context and unable to leverage external data sources.Moreover, most common AI tools only utilize rigid text or voice-only interfaces, restricting more natural interaction. The true promise of AI lies in building assistants that can seamlessly interact with us and other applications in an integrated way to accomplish complex, multi-step goals. 

Continue reading

The human element -- cybersecurity's greatest challenge

web threats

The stark reality of cybersecurity today isn't merely a question of advanced software or strategic counterattacks. It's about people.

The financial impact is undeniable with cybercrime costs projected to reach an astonishing $10.5 trillion annually by 2025. Yet, beneath these figures lies a more pressing issue: the exploitation of human psychology.

Continue reading

People, process, technology: How to shift security testing left successfully

The benefits of shift-left security are clear. It puts security testing in the hands of the engineers who write the code, enabling vulnerability fixes to occur before software hit production. This provides fixers with faster feedback loops on vulnerabilities found, as well as ensuring more efficient time to feature delivery and cohesive teamwork between security and development teams. With all the benefits that come with shifting API and web application security left, it’s no wonder that 57 percent of security team members have either already shifted their security strategy left or are planning to do so this year, according to a GitLab survey.

So, how do organizations implement a shift-left security strategy successfully? The answer lies in the popular three-legged stool analogy: assessing the process, people, and technology behind this major organizational change, and how they all can work together interdependently.

Continue reading

4 best practices in cloud security to strengthen national defense in the automation age

In the era of digital transformation, national security faces complex and multifaceted challenges. To address these challenges, the Department of Defense (DOD) is taking a vigilant approach to fortify the security of cloud infrastructure.

This approach seamlessly aligns with overarching national cybersecurity initiatives, which are focused on countering a multitude of emerging threats in the age of automation. Collaboratively, the DOD and other government agencies are dedicated to strengthening the ever-evolving cloud ecosystem, while navigating an increasingly intricate threat landscape.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.