Articles about cybersecurity

Skills crisis forces risky security shortcuts

Risk threat readiness

A growing cybersecurity skills crisis is forcing 64 percent of the organizations across Europe the Middle East and Africa to take risky shortcuts and temporary fixes to meet security demands.

Research from Insight Enterprises shows only 24 percent of IT decision-makers across EMEA say they have sufficient in-house cyber skills to keep pace with evolving threats. These shortages are delaying key initiatives (57 percent) and leaving more than half (57 percent) struggling to meet compliance requirements.

Continue reading

How ‘confidential computing’ can add trust to AI [Q&A]

AI PC

Artificial intelligence is finding its way into more and more areas of our lives. But while there are concerns around the use of the technology itself, there are much greater ones over how we secure it.

We spoke to Anand Kashyap, CEO and founder of Fortanix, to discuss confidential computing, a technology backed by Microsoft, Intel, Arm, AMD and Nvidia, which encrypts data while it's being processed, even by AI systems.

Continue reading

Lookout uses AI to guard against mobile social engineering threats

Mobile security

As we do more and more on our mobile devices it’s clear that the front line of cyber defense isn't the corporate server it's the employee's phone.

As AI boosts social engineering, hackers are bypassing traditional firewalls to target people directly with smishing and phishing, making every employee a critical, and often vulnerable, defender against highly convincing threats.

Continue reading

Responding to the challenge of deepfakes [Q&A]

Deepfake plan

Recent advancements in publicly available AI models have made it incredibly easy to generate deepfakes -- so much so that attackers don’t need to be technical experts to pull off convincing deception campaigns.

Attackers can scrape public content to recreate someone's voice or face, and inject that fake identity into virtual meetings, phone calls, or even training videos.

Continue reading

Gigamon harnesses agentic AI to deliver guidance for security and IT teams

Cloud security lock

As cyber adversaries increasingly use AI to move faster and exploit blind spots, security, network, and application teams face mounting challenges, not helped by a global shortage of skilled professionals.

Observability specialist Gigamon is launching a new agentic AI application purpose-built for network-derived telemetry to deliver immediate guidance for security and IT operations teams.

Continue reading

Ransomware costs jump 17 percent though insurance claims fall

Ransomware dark web

A new report from risk solutions company Resilience shows in the first half of 2025, the average cost of an individual ransomware attack rose by 17 percent, while the volume of incurred claims across Resilience's portfolio dropped by 53 percent, highlighting the persistent and destructive threat of financially motivated cybercrime.

Ransomware accounted for almost all (91 percent) of incurred losses, while financially motivated social engineering, especially via tailored attacks bolstered by AI-powered phishing content, fueled 88 percent.

Continue reading

Taking a holistic approach to human risk management

Person Protecting Human Figures Forming Circle

We tend to think of cybersecurity as being a technology problem, but in fact it’s often about humans. Attackers exploit our weaknesses with social engineering, phishing and other attacks designed to trick us into giving up valuable information.

A new whitepaper released today by KnowBe4 looks at the core principles of a modern human risk management (HRM) approach and how organizations can apply the framework to strengthen security culture and drive measurable change in employee behavior.

Continue reading

Rethinking AppSec for the AI era [Q&A]

AI robot security

The application security landscape has always been a complex one and can lead to teams spending too much time hunting down vulnerabilities. With AI becoming more popular there are even greater risks to consider.

We spoke to Yossi Pik, co-founder and CTO at Backslash Security, to discuss how AppSec needs to adapt to the greater use of AI.

Continue reading

New enterprise browser aimed at securing BYOD and third-party devices

Man working on computer laptop with triangle caution warning sig

Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.

The new feature, available to Check Point Harmony SASE customers from today, delivers full visibility, granular policy enforcement, and compliance-ready data protection without persistent agents or endpoint ownership.

Continue reading

Insider breaches hit 61 percent of enterprises

Data-Breach-Hand

A new study sponsored by OPSWAT, a specialist in critical infrastructure protection, reveals that organizations face escalating risks from insider activity, legacy tools, and the growing complexity of artificial intelligence (AI).

Based on research carried out by the Ponemon Institute, the report finds that in the past two years, 61 percent of organizations have suffered file-related breaches caused by negligent or malicious insiders, at an average cost of $2.7 million per incident.

Continue reading

How AI agents are reshaping the threat landscape

Risk threat readiness

The agentic AI ecosystem, powered by large language models (LLMs), is creating a new class of cybersecurity risks according to a new report.

The study from Radware finds AI agents can act autonomously, access tools and private resources, and interoperate between one another. As enterprises turn to AI agents, there is a need to govern and secure this new emerging layer of digital infrastructure.

Continue reading

Enterprises left dangerously exposed by identity protection ‘maturity myth’

Glowing security padlock

New research from Osterman and Silverfort reveals that although nearly 70 percent of organizations believe their identity defenses are ‘mature’ there is a worrying gap between perception and reality.

This comes against a rising tide of identity threats, 72.1 percent of identity leaders report that the threat level of identity-related attacks has increased or remained unchanged in the past year. The most significant jumps include AI-powered attacks, ransomware-based attacks, and social engineering of desk staff to reset credentials or MFA factors (up 14.3 percent).

Continue reading

Tycoon phishing kit uses sneaky new techniques to hide malicious links

Woman touching a phishing concept

Phishing emails often feature malicious links (URLs) that lead victims to fake websites
where they are infected with harmful software or tricked into giving away personal
information.

There’s a constant battle between security tools getting better at identifying bad links and attackers trying to hide them more effectively. Barracuda has uncovered some of the latest approaches its researchers are seeing in attacks involving the advanced phishing-as-a-service (PhaaS) kit, Tycoon.

Continue reading

Securing Kubernetes in the enterprise [Q&A]

Secure by design

As more organizations scale up containerized workloads they’re also facing increasing security and compliance challenges.

Kim McMahon part of the leadership team at Sidero Labs to discuss the vulnerabilities enterprises are encountering when scaling up Kubernetes on traditional operating systems and what they can do to counter them.

Continue reading

Why one-time security assessments are no longer sufficient [Q&A]

Observability magnifier code

With cyber threats becoming more numerous and ever more sophisticated, it’s becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.

One-time security assessments are looking increasingly inadequate. We spoke to CyberProof CEO Tony Velleca to discuss how organizations can effectively implement a Continuous Threat Exposure Management (CTEM) strategy to improve their protection.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.