Articles about cybersecurity

Sumo Logic brings agentic AI to the enterprise security stack

AI cybersecurity

Enterprises face a growing volume and complexity of cyber threats which means security teams struggle with alert fatigue and managing a spread of tools.

Sumo Logic is launching a new agent-powered security operations tool to help automate routine tasks, streamline investigations, and give enterprise security teams the freedom and ability to focus on analyzing the biggest security issues facing their organization.

Continue reading

Why the cybersecurity industry needs to be more accessible [Q&A]

Cloud vulnerability lock

The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.

Organizations today are forced to juggle multiple tools, each with unique UI, costs, and maintenance headaches. They’re also often not able to buy the tools they need, because they are either too expensive or don't exist in the specific capacity they need.

Continue reading

Internal chaos after a cyberattack causes more damage than the attack itself

Office chaos abyss

A new survey from cybersecurity incident response management (CIRM) specialist Cytactic finds 70 percent of cybersecurity leaders say internal misalignment following a cyberattack caused them more chaos than the threat actor itself, leaving many organizations paralyzed by breakdowns in authority, coordination, and clarity.

The report also finds that while 73 percent of leaders describe their response plans as ‘technically comprehensive,’ many admit those plans collapse under real-world pressure. In addition, 86 percent say ‘translation time’ between legal, communications, and technical teams causes costly delays, underlining that breaches are often derailed more by internal breakdowns than by attackers.

Continue reading

More tools lead to greater risk of security issues and burnout

Businessman Scolding Stressed Female Employee

A new survey of over 1,000 IT and security teams suggests that the more tools organizations deploy to solve problems, the more problems they create.

The study from Kandji finds that too many overlapping tools is an issue for 49 percent, gaps or breakdowns between tools is cited by 46 percent, and security risks due to poor integration by 41 percent. Siloed ownership or communication is a problem for 38 percent while the same percentage say that compliance and audits take too much time.

Continue reading

Economic uncertainty adds to cyber-physical systems risk

Industrial control system

New research released today by Claroty looks at the impacts of economic and geopolitical uncertainty on organizations' ability to protect their cyber-physical systems (CPS) environments.

Cyber-physical systems are those that overlap the cyber world -- things like industrial control and medical devices -- and may therefore slip below the radar of traditional cybersecurity approaches. The survey, of 1,100 infosecurity, OT engineering, clinical and biomedical engineering, and facilities management and plant operations professionals, shows concerns that economic policies and geopolitical tensions are adding to risk.

Continue reading

Why the retail industry needs to rethink identity [Q&A]

identity individual crowd

The retail industry continues to be a top target for cyber criminals, retailers rely heavily on digital infrastructure to manage consumer data and operations so they remain an attractive target for attackers seeking financial or operational disruption.

The cyberattacks earlier this year hitting UK retail (Marks & Spencer, Co-op, Harrods) are the latest reminder that identity is still one of the weakest links.

Continue reading

One in four organizations victims of AI data poisoning

Poison bottle

A new study finds 26 percent of surveyed organizations in the UK and US have fallen victim to AI data poisoning in the past year. This is where hackers corrupt the data that trains AI systems by planting hidden backdoors, sabotaging performance, or manipulating outcomes to their advantage.

The research from information security platform IO (formerly ISMS.online) surveyed over 3,000 cybersecurity and information security managers in the UK and US, and finds that that 20 percent of organizations have also reported experiencing deepfake or cloning incidents in the last year.

Continue reading

Skills crisis forces risky security shortcuts

Risk threat readiness

A growing cybersecurity skills crisis is forcing 64 percent of the organizations across Europe the Middle East and Africa to take risky shortcuts and temporary fixes to meet security demands.

Research from Insight Enterprises shows only 24 percent of IT decision-makers across EMEA say they have sufficient in-house cyber skills to keep pace with evolving threats. These shortages are delaying key initiatives (57 percent) and leaving more than half (57 percent) struggling to meet compliance requirements.

Continue reading

How ‘confidential computing’ can add trust to AI [Q&A]

AI PC

Artificial intelligence is finding its way into more and more areas of our lives. But while there are concerns around the use of the technology itself, there are much greater ones over how we secure it.

We spoke to Anand Kashyap, CEO and founder of Fortanix, to discuss confidential computing, a technology backed by Microsoft, Intel, Arm, AMD and Nvidia, which encrypts data while it's being processed, even by AI systems.

Continue reading

Lookout uses AI to guard against mobile social engineering threats

Mobile security

As we do more and more on our mobile devices it’s clear that the front line of cyber defense isn't the corporate server it's the employee's phone.

As AI boosts social engineering, hackers are bypassing traditional firewalls to target people directly with smishing and phishing, making every employee a critical, and often vulnerable, defender against highly convincing threats.

Continue reading

Responding to the challenge of deepfakes [Q&A]

Deepfake plan

Recent advancements in publicly available AI models have made it incredibly easy to generate deepfakes -- so much so that attackers don’t need to be technical experts to pull off convincing deception campaigns.

Attackers can scrape public content to recreate someone's voice or face, and inject that fake identity into virtual meetings, phone calls, or even training videos.

Continue reading

Gigamon harnesses agentic AI to deliver guidance for security and IT teams

Cloud security lock

As cyber adversaries increasingly use AI to move faster and exploit blind spots, security, network, and application teams face mounting challenges, not helped by a global shortage of skilled professionals.

Observability specialist Gigamon is launching a new agentic AI application purpose-built for network-derived telemetry to deliver immediate guidance for security and IT operations teams.

Continue reading

Ransomware costs jump 17 percent though insurance claims fall

Ransomware dark web

A new report from risk solutions company Resilience shows in the first half of 2025, the average cost of an individual ransomware attack rose by 17 percent, while the volume of incurred claims across Resilience's portfolio dropped by 53 percent, highlighting the persistent and destructive threat of financially motivated cybercrime.

Ransomware accounted for almost all (91 percent) of incurred losses, while financially motivated social engineering, especially via tailored attacks bolstered by AI-powered phishing content, fueled 88 percent.

Continue reading

Taking a holistic approach to human risk management

Person Protecting Human Figures Forming Circle

We tend to think of cybersecurity as being a technology problem, but in fact it’s often about humans. Attackers exploit our weaknesses with social engineering, phishing and other attacks designed to trick us into giving up valuable information.

A new whitepaper released today by KnowBe4 looks at the core principles of a modern human risk management (HRM) approach and how organizations can apply the framework to strengthen security culture and drive measurable change in employee behavior.

Continue reading

Rethinking AppSec for the AI era [Q&A]

AI robot security

The application security landscape has always been a complex one and can lead to teams spending too much time hunting down vulnerabilities. With AI becoming more popular there are even greater risks to consider.

We spoke to Yossi Pik, co-founder and CTO at Backslash Security, to discuss how AppSec needs to adapt to the greater use of AI.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.