Why data lineage is a business strategy, not a technical feature [Q&A]

Data analytics graphs

Modern enterprises are more than ever reliant on data. But that makes understanding how that data is generated, transmitted, changed and used over time -- its lineage, vitally important.

We spoke to Saurabh Gupta, chief of strategy, revenue and growth at The Modern Data Company, to discuss how proactive, context-rich systems of record enable organizations to accelerate, maintain trust, and strategically utilize data.

Continue reading

Spotify now lets you listen to a track without it influencing the algorithm

Spotify track exclusion

The Spotify recommendation algorithm is problematic, and easily sent askew by random tracks you listen to. The company has just announced that it is rolling out the option for users around the world to exclude individual tracks

This may sound like something we’ve heard before, but previous exclusion options have related to playlists. Now you can stop that one song your kid keeps listening to from causing your recommendations to be in a similar vein.

Continue reading

Adobe Photoshop Elements 2026 and Premiere Elements 2026 offer AI-powered editing and creative tools

Adobe Photoshop Elements 2026 and Premiere Elements 2026

Adobe has released new versions of its consumer-focused photo and video editing software with Photoshop Elements 2026 and Premiere Elements 2026.

The two programs gain additional artificial intelligence tools, creative effects, and improved organization features designed to help users edit faster and experiment with new techniques. As before, there are Quick, Guided, and Advanced modes in both programs.

Continue reading

Red Hat confirms hackers have breached GitLab instances and stolen data

Red hat isolated white background

A group of hackers calling itself the Crimson Collective says that it has compromised GitLab instances belonging to Red Hat and stolen hundreds of gigabytes of data.

Red Hat has confirmed that it has suffered a data breach, but is yet to provide much in the way of details. The hacking group says that it managed to access 28,000 internal development repositories, and has stolen almost 570GB of compressed data.

Continue reading

One in four free mobile VPN apps fail privacy checks

VPN app

Virtual Private Networks (VPNs) are trusted by millions to protect privacy, secure communications, and enable remote access on their mobile device. But what if the apps designed to safeguard your data are not secure?

Analysis by Zimperium zLabs of 800 free VPN apps for both Android and iOS reveals that the threat is real and widespread.

Continue reading

Security risks leave 84 percent of IT pros feeling stressed at work

worry stress

A new study of 500 US IT and cybersecurity staff reveals that 84 percent report feeling uncomfortable levels of stress at work due to IT security risks, while 78 percent fear they will be personally blamed for security incidents.

The report from Object First exposes a gap in how organizations support their IT staff, highlighting the opportunity to provide mental health resources and less complex security technology to help reduce stress as cyber threats continue to rise.

Continue reading

90 percent of organizations face attacks involving lateral movement

Network attack lateral movement

A new report from Illumio, based on a survey of over 1,100 IT and cybersecurity decision makers, finds that almost 90 percent of leaders have detected a security incident involving lateral movement within the past 12 months.

Each incident involving lateral movement resulted in a global average of over seven hours of downtime. Alert fatigue, along with limited and fragmented visibility, especially across hybrid environments, are two of the top challenges to detecting lateral movement.

Continue reading

MiniTool Video Converter 4.5 gains AI-powered subtitle and transcription tools

MiniTool Video Converter 4.5

MiniTool Software has rolled out version 4.5 of its Windows video conversion tool.

MiniTool Video Converter can convert video files between formats, record on-screen activity, and compress clips. It supports a wide range of video and audio formats, with adjustable settings for resolution, bit rate, and frame rate.

Continue reading

41 percent of schools suffer AI-related cyber incidents

Female Teacher Helping Pupil Using Computer In Classroom

A new survey of more than 1,400 education leaders across primary, secondary and higher education in the UK and US finds that while AI is already integrated into classrooms and faculty work, development of policies and protections needed to manage new risks in schools is lagging.

The study from Keeper Security shows 41 percent of schools have experienced AI-related cyber incidents, including phishing campaigns and misinformation, while nearly 30 percent reported instances of harmful AI content, such as deepfakes created by students.

Continue reading

The rise of the ‘bionic hacker’ -- AI’s impact on attack and defense

AI-Fraud-hacker

The rapid adoption of artificial intelligence (AI) is transforming both attack and defense according to a report released today by crowdsourced security platform HackerOne.

It finds that organizations have expanded their AI program adoption by 270 percent this year, while HackerOne’s platform reported a 540 percent surge in prompt injection vulnerabilities to make them the fastest-growing threat in AI security.

Continue reading

AI use increases alongside plummeting consumer trust

AI worry trust

A new report from Ping Identity finds that 68 percent of consumers are now using AI, up from 41 percent a year ago. But at the same time fewer than one in five (17 percent) say they have ‘full trust’ in the organizations that manage their identity data.

The findings of the study, carried out by Talker Research which interviewed 10,500 consumers across 11 countries, show that 75 percent say they are more concerned about personal data security than five years ago. In addition 39 percent cite AI-driven phishing as the modern scam that concerns them most.

Continue reading

NordVPN adds hijacked session alerts to warn users of stolen cookies on dark web

NordVPN Cookie session hijacking

NordVPN has introduced a hijacked session alert, a new feature designed to protect users from stolen authentication cookies being sold on the dark web.

The new feature forms part of the company’s Threat Protection Pro service and sends immediate notifications when active session data is compromised, giving users the chance to act before criminals are able to exploit their accounts.

Continue reading

Snapchat plans to start charging for storing old posts

Snapchat paper logo lies with envelope full of dollar bills and smartphone

Snapchat is introducing paid storage plans for Memories, a feature the company introduced back in 2016 as a way for users to save snaps beyond the usual 24-hour limit.

The move will affect users with more than 5GB of saved content. The company says most users fall below this threshold, but those storing thousands of photos and videos will now need to upgrade if they want to keep them available long term.

Continue reading

Opera begins rolling out Opera Neon, its AI-powered browser

Opera Neon

Opera has begun rolling out Opera Neon, a subscription-based browser designed around agentic AI. The first wave of invitations is being sent to users in the Neon Founders program, with broader access set to follow.

Unlike the normal Opera browser, Opera Neon is intended for people who use AI as part of their everyday work. It combines standard browsing tools with a system of workspaces, cards, and agentic actions.

Continue reading

Imgur no longer available in the UK

Imgur logo

Image-hosting service Imgur is currently blocking UK users  from accessing its content. The move comes after regulators threatened to impose fines on the company.

The Information Commissioner’s Office (ICO) is unhappy with how Imgur – and its parent company MediaLab – handles children’s data. The ICO had conducted investigations into various technology firms as it checked their compliance with online safety laws.

Continue reading

Load More Articles