Maximizing value from Microsoft 365 [Q&A]


Many organizations have now adopted Microsoft 365 as a central part of their office service provision. But are they getting the most out of the software that they’re paying for?
We spoke to Vadim Vladimirskiy, CEO of Nerdio, about how businesses can use more than just the big services and why it’s important to understand sizing and bolt-ons in order to extract maximum value from their M365 investment.
Automated red-teaming helps protect enterprise AI


Artificial intelligence is being used to streamline many business tasks, but at the same time it opens up new attack vectors and risks.
Secure AI specialist WitnessAI is announcing two new products aimed at securing enterprise LLMs and AI applications through automated red-teaming and behavioral runtime protection.
Enterprises spend 11 hours on resolving each security alert


On average, enterprises spend 11 hours of employee time investigating and remediating a single critical identity-related security alert.
A new study from Enterprise Strategy Group, of 370 IT and cybersecurity decision makers, shows this affects the capacity of security teams to manage alert volume, and this is only made worse in the age of AI.
Enterprises struggle with too many identity tools


With identity security growing more complex a new report shows that of 70 percent of enterprises recognize the need to consolidate their identity security tool stack.
The study by Enterprise Strategy Group for Silverfort finds that while 70 percent of teams plan to expand their use of an existing tool to cover a new use case in the next 12-18 months, 62 percent of organizations plan to implement a new tool to satisfy a use case, hinting that current solutions may not be adequate to satisfy evolving priorities.
Why browser security is increasingly essential for the enterprise [Q&A]


As enterprises embrace hybrid work, SaaS applications, and AI tools at unprecedented scale, one critical access point is being increasingly targeted by attackers: the browser.
To better understand the risks and what can be done to secure the browser, we spoke with Alon Levin, vice president of product management at Seraphic Security, and an expert in enterprise browser security.
The rise of vishing and why enterprises need to be ready [Q&A]


Vishing (voice phishing) attacks have surged by over 1,600 percent so far this year, partly driven by a rise in AI-driven deepfake voice scams.
This is yet another way cybercriminals are seeking to impersonate those with access to company systems to disrupt organizations and hold data for ransom. We spoke to Anthony Cusimano, solutions director at Object First, to discover more about this trend and how businesses are at risk.
Hackers weaponize GenAI to boost cyberattacks


Adversaries are weaponizing GenAI to scale operations and accelerate cyberattacks -- as well as increasingly targeting the autonomous AI agents reshaping enterprise operations. This is among the findings of CrowdStrike’s 2025 Threat Hunting Report.
The report reveals how threat actors are targeting tools used to build AI agents -- gaining access, stealing credentials, and deploying malware -- a clear sign that autonomous systems and machine identities have become a key part of the enterprise attack surface.
Companies pay multiple ransoms as attackers step up threat levels


A new report from Semperis, based on a study of almost 1,500 organizations globally, shows that hackers are stepping up threat levels and ransomware is still a global epidemic.
In 40 percent of attacks threat actors threatened to physically harm executives at organizations that declined to pay a ransom demand. US-based companies experienced physical threats 46 percent of the time, while 44 percent of German firms experienced similar forms of intimidation.
Almost half of enterprises not prepared for quantum threats


A new report looks at the state of post-quantum cryptography (PQC) from the perspective of
cybersecurity professionals, finding that 48 percent of organizations aren’t prepared to confront the urgent challenges posed by quantum computing.
The report from Keyfactor, based on a survey of 450 cybersecurity leaders across North America and Europe carried out by Wakefield Research, finds mid-sized organizations are particularly vulnerable, with 56 percent saying they are not ready.
Navigating the hidden dangers in agentic AI systems [Q&A]


According to Gartner 33 percent of enterprise applications are expected to incorporate agentic AI by 2028, but are their security teams equipped with the latest training and technology to protect this new attack surface?
We spoke with Ante Gojsalić, CTO and co-founder at SplxAI to uncover the hidden dangers in agentic AI systems and what enterprises can do to stay ahead of the malicious looking to exploit them.
New ‘hardened runtime’ standard aims to make organizations more secure


Traditional runtime security solutions have tended to focus on detection and as a result generate thousands of low-fidelity alerts. Edera is launching what it says is a new software security category aimed at ending the era of 'move fast and break things'.
Edera's ‘hardened runtime’ provides production-grade sandboxing that assumes a breach before it occurs. This architectural approach eliminates the root causes of privilege escalation, lateral movement, and data exfiltration while dramatically reducing operational overhead for security teams.
Privileged access management is key to enterprise defense


New survey data reveals that 49 percent of organizations with privileged access management report fewer security incidents tied to privilege misuse.
The report from Keeper Security, based on a global survey of 4,000 IT and security leaders in the United States, Europe and Asia, explores the motivations driving PAM adoption, the most common obstacles to deployment and the features enterprises consider essential for securing access in today’s cybersecurity threat landscape.
60 percent of enterprise firewalls fail critical checks


New research from FireMon shows that 60 percent of enterprise firewalls fail high-severity compliance checks immediately upon evaluation, with another 34 percent falling short at critical levels.
Using data collected anonymously from AI-powered analytics platform FireMon Insights deployments across large enterprises and regulated industries, the study found misconfigurations, outdated rules, and bloated policies that bog down performance and leave security teams struggling to keep up.
Millions of unsecured Wi-Fi networks are putting data at risk


New threat intelligence from Zimperium reveals over five million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025, with a staggering 33 percent of users still connecting to these open networks, putting enterprise data at risk in the process.
“Mobile devices are now a primary gateway to corporate data, but during travel, they’re also the most vulnerable,” says Kern Smith, VP of global solutions at Zimperium. “Unsecured Wi-Fi, phishing disguised as travel alerts, and risky sideloaded apps are creating an ideal attack surface for cybercriminals -- especially in peak travel months.”
Microsoft to stop adding new features to Office apps for Windows 10 users


As we are being reminded on a near daily basis, Microsoft is ending support for Windows 10 in mid-October. The company has made it clear that the end of support means the end of security updates, but this does not mean that all Windows 10 users will take notice and jump to Windows 11.
However much Microsoft might wish otherwise, Windows 10 will remain in popular usage for some years to come – so the company is tightening the thumbscrews. A quiet announcement reveals that anyone sticking with Windows 10 will no longer receive feature updates for their Microsoft 365 (Office) apps.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.