BetaNews Staff

Elevating enterprise resilience with real-time ransomware detection

ransomware laptop

2023 looks set to be yet another record-breaking year for ransomware attacks. According to Statista, over 72 percent of businesses worldwide have already been affected by ransomware attacks this year, with LockBit3.0 and CI0p Ransomware claiming the bulk of victims last quarter.

The scourge of modern digital businesses everywhere, the proliferation of ransomware shows no sign of slowing down thanks to the rise of ransomware-as-a-service (RaaS) platforms -- so much so that it has become the most prevalent issue confronting organizations today.

Continue reading

Beyond phishing: The top employee security risks you're probably not measuring

While we all know email is a big target for attackers, it’s important to remember that email is not the only risk vector. As companies use more tools and features, the risks grow too. Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviors to get a holistic view of your risks. By doing so, you can focus resources more efficiently.

Human Risk Management (HRM) is a vital part of cyber security. Even if you have technological safeguards in place, HRM plays a substantial role in your overall security stance. Here I highlight some of the employee cyber risks that often get overlooked and how we can better keep an eye on them in real time.

Continue reading

One IdP to rule (or breach) them all: How identity access management tools can secure -- or destroy -- your kingdom

unknown identity

When we want to secure something highly valuable, say, a bag of ancient Spanish coins worth millions, we think of locking it behind as many layers as possible. For example, you might put it in a safe deposit box in a bank vault, nestled safely inside the institution that is itself blanketed with redundant physical security controls.

As organizations have become increasingly complex, so too have their associated layers of security around application access. Enterprises have tremendous amounts of applications and data, as well as users and devices with differing levels of permissions trying to access that data. To provide a consistent, IT-vetted method of creating, managing, storing, and authenticating the complexity of application access, we have arrived at Identity Provider (IdP) tools. IdPs are (typically) cloud-hosted services that store unique information used to identify users, organizations, and devices ("digital identities"), authenticate access requests, add/remove users, and provide security around these functions. Popular examples of solutions often used for IdP functionality include Okta, Microsoft Azure AD, and Duo.

Continue reading

2024 vision: Trends shaping the IT landscape

2024 Cloud

The IT and cloud computing landscape has grown and evolved in 2023, and it’s poised to continue developing in 2024. Companies worldwide are actively adapting to the dynamics of a post-pandemic world. In this pursuit of resilience and innovation, we anticipate the emergence of four key trends that will shape the new year. These trends encompass technological advancements and shifting IT paradigms regarding spending, loyalty and governance.

Here are four trends we will likely see in the new year.

Continue reading

Fighting the next generation of fraud

Fraud stop

In today’s digital age, the landscape of fraud is evolving at an alarming pace. Victim profiles, which used to skew heavily toward the elderly and infirm, now include younger, fully functioning adults. In 2022, 20-59-year-olds reported 63 percent of all fraud in the United States. Industries being targeted by fraudsters are evolving as well, and now include those in crypto and gaming.

In the past, most adults were able to see through scams and avoid them. However, the introduction of generative AI has been a game changer, transforming ordinary schemes into highly sophisticated efforts. Generative AI, a subset of artificial intelligence (AI), is making waves in the world of cybercrime. It is a technology that can generate content that is virtually indistinguishable from human-created content. Whether it's producing convincing text, images, or audio, generative AI leverages deep learning and neural networks to create highly realistic and persuasive output at scale. Shady third-world country call centers have been replaced by autonomous AI tools. This capability has become a powerful tool in the hands of fraudsters.

Continue reading

Putting individuals back in charge of their own identities

fake identities

From letting hotels keep copies of our passports to handing over IDs for car hire or air travel, we seldom think twice about the implications of physically sharing our identity documents. By now, we’ve gotten accustomed to exchanging personal information in return for a product or service we value -- but we need to be more vigilant at a time when identity fraud is jumping as much as 37 percent.

Proof of a person’s identity is the key to accessing goods, services, financial accounts, and opportunities -- which makes identity a valuable target, motivating fraudsters to try to gain our trust to trick us into disclosing our personal information so they can impersonate us. They also hack into identity databases that store personal information of millions of consumers. As a result, the frequency of data breaches has increased exponentially. In fact in 2022 alone, identity theft reached a staggering $42 billion in the US.

Continue reading

Harmonizing human insight with AI: The future of tax and finance in the digital era

In common with many industries, the digital transformation era has ushered in a paradigm shift in the tax and accountancy sectors. This has placed automation and artificial intelligence (AI) at the center of operational innovation, efficiency and competitive advantage. In doing so, these and other technologies are redefining the way industry professionals approach their work, with profound implications for the future.

Among the key questions this creates are: what does this all mean for human skillsets and expertise, and how can businesses balance these changes with uniquely human capabilities, ensuring that one complements the other? In looking for answers, there are several key areas to consider:

Continue reading

The bridge to the future

Unless there is easy and seamless connectivity between different blockchain-based asset types on different platforms, the full benefits of tokenization will not be realized. However, achieving this interoperability has proven a significant obstacle. The blockchain bridge has emerged as a promising solution, albeit one that has historically carried cost and risk. But recent advancements have made these bridges accessible, secure, and cost-effective.

Blockchain technology, which captured the imagination of the public some 15 years ago, promised to revolutionize the financial world. With each passing year, new and use cases have emerged, slowly but surely attracting a growing user base. Although the exact timeline for mass adoption remains a topic of debate, many in the industry agree it is an eventuality.

Continue reading

We tried Brave's AI chatbot Leo: It talks a lot about privacy, but is it truly private?

Ask Brave's AI Chatbot Leo

In early November, Brave, best known for its privacy-focused browser, launched its own AI chatbot called Leo. The chatbot is built into the desktop version of the browser (Brave says it will be coming to mobile soon), and was made available to all users for free. We at AdGuard, always eager to explore new AI-powered tools, and aftertesting Bing AI and playing with others, we couldn't resist the chance to check out Leo and assess its smartness and privacy features.

By default, Leo is found in the sidebar. To summon the genie AI-powered assistant, one simply needs to type 'ask Leo' in the address bar and it will materialize on the right side of the screen.

Continue reading

Undertaking a data diet this Black Friday

Data

Like every year, Black Friday marks the start of the end-of-year shopping season, and with it a significant increase in online sales. Although it's very much an American event, Black Friday in the UK has grown in popularity in recent years. In 2022, UK consumers spent a record £9.42 billion over the Black Friday weekend. Of this, 61 percent was spent online.

For e-retailers in the UK, the cyber weekend represents a significant increase in activity and traffic, leading to an accumulation of data generated and collected by e-commerce sites, requiring large storage capacities with a high environmental impact.

Continue reading

Will Quantum Computing change the way we use encryption?

Today, encryption is a cornerstone of our cybersecurity practices. It protects everything from cell phones and SMS messages to financial transactions and intellectual property.

However, a new challenge in the complex landscape of encryption has recently emerged, thanks to the advancement of quantum computing. What challenges lay ahead? Here is the breakdown:

Continue reading

Mitigating fraud risks when expanding internationally

Fraud stop

Global expansion is the way forward for businesses looking to upscale in 2023 and beyond. The past few years have laid the foundation for international expansion, and now more and more merchants are embracing the opportunities.

But as they’re venturing into new markets, certain challenges appear along the way. One of them is cross-border payment. While businesses might be familiar with the fraud situation in their home market, new territories present new fraud obstacles. Here is why fraud familiarization is key to success and what are the fraud profiles of some of the major markets.

Continue reading

The CISO view: Navigating the promise and pitfalls of cybersecurity automation

security meter

Cybersecurity automation has steadily gained traction as organizations seek to improve efficiency, address talent gaps, and keep up with escalating threats. However, our latest State of Cybersecurity Automation research shows that while more businesses are utilizing automation, they continue to grapple with obstacles that prevent them from fully capitalizing on its benefits.

In our recent study surveying over 700 cybersecurity professionals, we uncovered several persistent pain points in implementing automation. The research found that a lack of trust in automated outcomes, insufficient expertise among users, and poor communication between teams have hampered automation success. As a result, organizations are struggling to build confidence in automation and maximize its effectiveness.

Continue reading

Why good cyber hygiene is a strategic imperative for UK SMEs

Cyber Hygiene

No company is immune from a cyber-attack, with large and small being targeted. As technologies advance and cybercriminals hone their skills, evolve their tactics, and find new vulnerabilities to exploit, companies can no longer ask the question of if a cyber attack will occur but when and how it will happen.

While the number of data breaches is cause for concern, the cost associated with them is equally alarming. According to Cybersecurity Ventures, the global average cost of a cyberattack has ballooned to $4.45 million, increasing by 15 percent over the past three years. Even more sobering is that it shows no signs of easing, as global cybercrime costs are projected to reach $10.5 trillion annually by 2025.

Continue reading

The next evolution of AI: From conversations to interactions

Artificial Intelligence Bias

Chatbots such as ChatGPT and voice assistants like Siri and Alexa have become ubiquitous parts of our daily lives. Millions of people regularly converse with these AI-powered tools to get information, set reminders, control smart devices, and more. However, while chatbots and virtual assistants represent an important early milestone in the development of artificial intelligence, they remain limited in significant ways.

These conversational agents can only engage in simple, narrow tasks operating in an isolated, disembodied way, devoid of richer context and unable to leverage external data sources.Moreover, most common AI tools only utilize rigid text or voice-only interfaces, restricting more natural interaction. The true promise of AI lies in building assistants that can seamlessly interact with us and other applications in an integrated way to accomplish complex, multi-step goals. 

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.