BetaNews Staff

Is a lack of supply chain visibility undermining board-level confidence in cyber security programs?

As we head further into 2025, organizations must focus on bolstering operational resilience and addressing third-party risks, driven not only by commercial imperatives but also by new regulatory mandates. With the enactment of regulations such as NIS2 in late 2024 and DORA early this year, supply chain risk management is now a strategic necessity.

This means that third-party cyber risk management must become a strategic priority. However, according to BlueVoyant’s fifth annual Supply Chain Defence report, which examines fast-evolving supply ecosystems, many organizations don’t appear to be prioritizing supply chain cyber risk management, or are unaware of cyber security gaps in their supply chains.

Continue reading

A new age of fraud: building resilience against adversary-in-the-middle attacks 

Fraud stop

From phishing scams to business email compromise, fraud is continually evolving and cybercriminals are using increasingly refined tactics to exploit vulnerabilities. Adversary-in-the-middle (AiTM) attacks are also rapidly emerging as an advanced technique that poses pervasive physical and digital risk across industries. In fact, recent research shows a 46 percent increase in AiTM attacks compared to 2023. 

Staying ahead of these tactics is increasingly important as fraud becomes more complex. Before we delve into how to actively prevent fraud, we need to firstly explore the nature of AiTM attacks and then look at what’s fueling this increase in fraudulent activity. 

Continue reading

Why it's time to guarantee resilience in our critical software

Cyber resilience

Software has become central to our daily lives, with nearly every major company relying on it to operate. We are all increasingly dependent on fault free software for almost everything we do -- whether it’s ensuring trains run on time, accessing websites or using online banking.

Software has evolved into a form of digital public infrastructure, just as vital as physical infrastructure like roads and utilities. Yet, despite its critical role, software largely goes unmonitored and unregulated.

Continue reading

What startups can learn from special forces strategy

On the battlefield and in the trenches of entrepreneurship, victory comes to those who dare to think unconventionally and act with precision. As a former Green Beret, I've seen firsthand how the principles of unconventional warfare can translate into the business arena. Both demand team building, strategic thinking, and adaptability in dynamic environments.

Let's break down the seven-phase model of unconventional warfare and see how it can guide a startup from its inception to market dominance.

Continue reading

How technical sprints can drive innovation and resolve tech debt through developer empowerment

Whilst Agile has revolutionized the way we work in software development, the pace of development is fast and delivery can feel relentless. It’s typical for developer teams to struggle to find dedicated time for R&D and to catch up with the persistent technical debt -- especially when under constant pressure to deliver the next feature or product iteration. 

For developers on longer term contracts, they deliver code, release and tomorrow they’re picking up the next iteration. There’s often no time to pause to celebrate success and take a break. In fact, the risks of team burnout and technical debt accumulating to worrying levels are very real.

Continue reading

The future is AI, zero trust, satellite, and network slicing  

looking ahead

Industry 4.0 is revolutionizing how enterprises need to operate. Integrating cloud technology, robotics, mobile devices and IoT devices is essential to staying ahead in an increasingly competitive global market. To maximize the benefits of Industry 4.0, however, these technologies must always stay connected to a network.

This has become even more true as IT environments grow to massive scales and unprecedented digital dependencies drive business outcomes. In 2025, network downtime could carry a price tag with consequences we’ve never seen before. Therefore, as businesses look to cellular and/or hybrid approaches to enhance their wireless wide area networks (WWAN), they must depend on four things to create resilient connectivity -- artificial intelligence (AI), satellite, network slicing, and a renewed respect for zero-trust principles.  

Continue reading

AI in finance changes everything

Artificial intelligence’s rise in business, while exciting for some, is unsettling for financial professionals. They worry AI will replace them, but understanding its true power in finance turns fear into opportunity. AI isn’t here to take over -- it’s here to level up the game. The real power lies in collaboration, not competition. Finance pros who embrace AI don’t get replaced; they get supercharged.

Traditional tedious and time-consuming tasks that keep accountants bogged down -- data entry, invoice processing, reconciliation, reporting, and more -- can now be managed by AI-powered automations. Companies gain two key benefits when they embrace the shift. First, human finance professionals are delivered from the day-to-day routine and freed up to focus on fine-tuning financial strategies in a way that can drive better business outcomes. The demands of manual accounting typically keep finance professionals from having any time to zoom out and deal with big-picture planning.

Continue reading

Unpatched software: The silent gateway to cyber attacks and how AI-driven solutions can close the gap

Patch download

Modern enterprises are under fire from all angles. Attackers have become increasingly sophisticated and persistent in how they target enterprise data and systems. But as the threat landscape has evolved and become more complex, one tried and true method for malicious attackers stands out as a weak point for nearly every enterprise attack surface: outdated software. As much as patch management has advanced in recent years, the fact remains that most organizations struggle to deploy patches consistently and effectively, and that leaves systems exposed to cyber attacks.  

Cybercriminals have become quite adept at exploiting unpatched software, using it as an easy entry point into enterprise networks. Malicious actors have developed an incredibly sophisticated understanding of where enterprise weak points are. In fact, most criminal operators have a deeper understanding of enterprise attack surfaces than the security teams tasked with defending them. Enterprise networks often consist of hundreds of thousands of IT assets, and every single unpatched instance represents an opportunity for attackers to compromise data and operations.

Continue reading

Crossing the divide: How IT and OT can work together to secure the future

In cybersecurity, the divide between IT (Information Technology) and OT (Operational Technology) remains a problem that practitioners, vendors, and consultants must navigate daily. The differences between these two mindsets -- one rooted in the world of delivering data and maintaining software, the other firmly planted in the realm of continuous uptime of industrial systems -- can lead to conflicting priorities and misunderstandings. Even as the industry strives to align these domains, this divergence is still evident, as I was reminded just this week.

During my usual morning LinkedIn browsing, I stumbled upon a post featuring the “Top 50 People in ICS/OT Cyber Security You Need to Follow”. At first glance, I panicked. My immediate assumption was that the list featured individuals responsible for securing operational environments -- the unsung heroes safeguarding critical infrastructure around the globe.

Continue reading

IT industry today faces same issues that aggravated 1990s manufacturing: How can we take a cue from history?

Until the late 1990s, manufacturing reigned as the lifeblood of the global economy -- leading in productivity, employment, growth, and investments across all points of the world. However, once we neared the close of the 20th century, manufacturing found its Achilles heel in the compounded complexity accrued from outdated processes, an over-reliance on human labor that simply couldn’t meet its extreme needs, supply chain disruptions, and rising costs.

I fear that today, the information technology industry finds itself at all-too-familiar cross-roads. Why is this?

Continue reading

Celebrating Data Privacy Day: Ensuring ethical agentic AI in our daily interactions

Data Privacy Day

Both AI agents and agentic AI are becoming increasingly powerful and prevalent. With AI agents, we can automate simple tasks and save time in our everyday lives. With agentic AI, businesses can automate complex enterprise processes. Widespread AI use is an inevitability, and the question going forward is not if we’ll use the technology but how well.

In a world where AI takes on more responsibility, we need to know how to measure its effectiveness. Metrics like the number of human hours saved or the costs reduced are, of course, important. But we also need to consider things like how ethically and securely our AI solutions operate. This is true when adopting third-party solutions and when training AI in house. 

Continue reading

Trump is back -- here’s what it means for IoT

Donald Trump

On January 20, Donald Trump was inaugurated to the highest office in the United States of America. If his last four-year term contains hints about his next four-year term, the tech sector can expect more protectionist policies reflected in tariffs, trade wars, and production.

For connected devices in the Internet of Things, this means flow-on effects in manufacturing supply chains and potentially stricter cybersecurity oversight. Let’s explore.

Continue reading

Hyper-personalization is here -- but are organizations ready?

The rising demand for relevant, convenient and personalized customer experiences across all sectors has put modern organizations under pressure to adapt. McKinsey reports that almost three quarters of buyers now expect personalized interactions. The choice is clear: either embrace personalization, with individual offers or tailored updates based on previous habits, or risk falling behind competitors with a standardized approach. 

Many organizations already do this well. From personalized Netflix movie recommendations to tailored Google adverts built on previous searches, organizations are able to delight customers with tailored services.

Continue reading

Data privacy in 2025: The resurgence of biometric security, a fleeting forecast for federal data privacy regulations, and the return of the wild west of AI

Biometrics

The transition from 2024 to 2025 brings a lot of uncertainty, speculation, and hopefully some optimism for the world of data privacy.

As technology continued to innovate, securing data grew more complex and consumers grew more concerned over how their information was being used. Regulatory changes are coming soon, with several states providing their own data privacy standards in anticipation of a shifting focus within the U.S. federal government, creating an important inflection point to set the tone for the future of data privacy and security.

Continue reading

The UK's cybersecurity landscape: Key trends and challenges for 2025

Almost every single organization, large or small, is acutely aware of the need to implement robust security measures. However, this is easier said than done. As the threat landscape continues to evolve, only heightened by tools such as AI, it can be difficult to stay ahead and ensure appropriate security measures are in place. There are a lot of security tools out there, and many organizations have tried to implement security measures and are now overwhelmed with an influx of information trying to figure out how best to manage it.

However, though it may not be the easiest task, it’s certainly one worth doing right. So, as we move into 2025, what are the main trends that organizations need to be aware of and how can they use this knowledge to stay protected?

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.