Protecting sensitive data in the cloud [Q&A]


The use of sensitive data for business is crucial. The growing amount of sensitive data stored in cloud infrastructure and applications creates an increasing and constantly evolving data risk landscape for organizations.
The main cause of risk is how broadly this data is shared within and outside the organization, and how it is being used by users, services, or other applications. We spoke to Liat Hayun at Eureka Security about how this risk can be addressed while still allowing safe use and storage of data.
Tech investments often driven by fear of missing out


New research shows that 61 percent of CIOs say their investments are often driven by the fear of missing out. What's more, 79 percent say they have to take risks on emerging technologies or they will 'go the way of the dinosaurs'.
The study, from SaaS company Ardoq, of 700 CIOs and other senior IT leaders in enterprises of more than 2,000 employees, finds 91 percent of CIOs say that if successful, emerging technology research can put them at the forefront of their market -- but 99 percent say the success rate tends to be much lower than for established technologies.
How to ensure customers and developers are on the same page [Q&A]


It should be the case that in the business world systems deliver for the customer. But often there can be conflict between what the customer wants -- usability and feeling valued -- and what the developer is looking to provide -- technical mastery, collaboration and self-serve capabilities.
We spoke to Gilad Shriki, co-founder of Descope to discover how enterprises can satisfy the needs of both.
New solution helps enterprises secure Gen AI APIs


As enterprises increasingly integrate generative AI into critical applications they, often unwittingly, expose those applications to attacks that exploit the unique characteristics of AI, such as prompt injection, insecure outputs, and sensitive data disclosure.
API security company Traceable AI is announcing an early access program for its new Generative AI API Security capability, aimed at specifically targeting the security risks of integrating Gen AI into applications.
Get 'Enterprise Transformation to AI and the Metaverse' (worth $59.99) for FREE


Enterprise Transformation to AI and the Metaverse provides guidance on how organizations can respond effectively to a rapidly converging collection of advanced technologies, methods, and models often referred to as “the metaverse.”
The arrival of the metaverse will likely lead to one of the most disruptive eras in modern history. We will see our personal, social, professional, and business lives change just as dramatically as we experienced with the arrival of the personal computer, Internet, and smart phone.
Identity and permissions present a major security challenge


The average organization has roughly 1,400 permissions for every employee, according to a new report from Veza.
The findings also show that identity teams face a daunting number of groups and roles to manage. With organizations averaging nearly 700 groups for every 1,000 users, it is difficult for admins to choose the least-privilege groups and roles that will meet the needs of any given employee, contractor, or service account.
The changing face of the cybersecurity market [Q&A]


The cybersecurity world is a fast changing one with a constant arms race between attackers and defenders.
New entrants are always coming to the market with innovative technologies to solve particular problems. We spoke to Justin Somaini, a partner at cybersecurity venture capital firm YL Ventures, to find out more about up and coming security trends and shaping the future of cybersecurity.
Internal communication gaps leave enterprises vulnerable to attack


A new report shows that CISOs find it difficult to communicate threats to the C-suite, which is leaving gaps in the organization’s understanding of cyberrisk.
The study from Dynatrace reveals that 87 percent of CISOs say application security is a blind spot at the CEO and board level.
New solution helps enterprises demonstrate security and compliance


As numbers and severity of third-party breaches grow, companies are scrutinizing not just how they handle data, but how their vendors do as well. Trust management platform Vanta is launching a new addition to its Trust Center to allow enterprises to automate security questionnaires
Questionnaire Automation in Trust Centers uses Vanta AI to save time by generating suggested responses for security teams to review and approve, rather than starting from scratch each time. This will make it easier for enterprises to proactively and reactively demonstrate their security and compliance.
New threats and regulations lead companies to update security strategies


A new report from LogRhythm, based on a survey from Dimensional Research, reveals that 95 percent of enterprises have changed their cybersecurity strategies in the last 12 months.
Drivers of this change include keeping pace with the shifting regulatory landscape (98 percent), the need to meet customer expectations for data protection and privacy (89 percent) and the rise of AI-driven threats and solutions (65 percent).
New tool lets enterprises build their own secure gen AI chatbots


Many companies have blocked access to public LLMs like ChatGPT due to security and compliance risks, preventing employees from taking advantage of the benefits of generative AI for day-to-day use.
Even when employees do have access, mainstream LLMs lack the ability to query an organization’s internal data, making insights unreliable and considerably limiting enterprise value for chat applications.
Ransomware rampage -- how to fight back against attacks [Q&A]


Amid a tumultuous 2023 marked by economic anxieties and rising geopolitical tensions, threat actors seized the opportunity to weaponize fear and uncertainty. While ransomware trends had previously ebbed and flowed, experiencing a 23 percent decrease in just the first half of 2022, they took a shocking turn in 2023, skyrocketing by a staggering 95 percent.
We spoke with Andrew Costis, chapter leader of the Adversary Research Team at AttackIQ, to discuss why ransomware has taken headlines by storm and how the industry can empower security teams with the tools to fight back.
The dynamics of modern Windows device management [Q&A]


Despite Apple and Linux gaining ground in recent years Windows still commands over 50 percent of the endpoint desktop market.
This means that Windows device management is a key priority for enterprises. We spoke to Apu Pavithran, founder and CEO of Hexnode, to learn more about device management and how it can be used effectively.
Cybercriminals take aim at ERP apps


Many enterprises rely on some sort of ERP application for their business operations and decision making. The vast majority of large organizations use ERP applications from leading vendors like SAP and Oracle.
New research from threat data and intelligence leader Flashpoint and ERP cybersecurity and compliance leader Onapsis reveals evidence that SAP business-critical applications are increasingly in the sights of and valuable for cybercriminals.
People prefer support from humans over AI when implementing CRM


A survey from CRM solution provider Workbooks finds participants voicing their strong preference for human support over AI-powered solutions.
This not entirely surprising result shows that while AI-powered support may offer efficiency and cost-effectiveness, it falls short of meeting the nuanced needs of businesses seeking personalized assistance.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.