Why subsea cables are essential to business resilience [Q&A]

Underwater cable fibre

While businesses focus on cloud services and digital transformation, they often don't realize that their operations depend on the massive cable networks laid underwater.

Recent incidents have highlighted how critical these subsea cables are for business continuity, so do businesses need to rethink their approach to infrastructure as a result? We spoke to Sharat Sinha, director and CEO of Airtel Business to find out.

Continue reading

Chainguard launches malware-resistant dependencies for Python

Software supply chain blockchain

The Python programming language has become the foundation of modern AI and machine learning applications. Of course that makes it a prime target for supply chain attacks.

Public registries do minimal vetting of hosted artifacts, and they don't provide assurance that the distributed library matches its source code, exposing enterprises to supply chain attacks. Python libraries are also susceptible to supply chain attacks because many projects include more than just pure Python code -- for example project maintainers often rebundle shared system libraries into their Python libraries to ensure stable behavior.

Continue reading

Enterprises rush to adopt AI but struggle to measure its value

AI network enterprise

New research shows that enterprises are going beyond AI experimentation and into large-scale production but that return on investment is taking a back seat in the process.

The report from Domino Data Lab shows that while 88 percent of organizations report improved ability to move AI from experimentation to production, nearly 60 percent expect less than 50 percent ROI in the rapidly changing areas of machine learning (60 percent) or Gen AI (57 percent).

Continue reading

New edge appliances allow organizations to deploy AI securely

Edge computing

Enterprises and governments share a common interest in safeguarding private information, but often the rollout of AI systems can unwittingly put sensitive data at risk.

Trusted AI specialist Seekr is announcing a new all-in-one AI system -- built for government agencies -- to ensure that AI can be deployed in air-gapped environments, standalone data centers, and contested environments.

Continue reading

Employee browser activity creates a security blindspot

Man working on computer laptop with triangle caution warning sig

Thanks to a growth in remote working and the use of SaaS applications enterprise reliance on browsers is growing, but this leaves them open to risks stemming from dangerous employee web behavior.

According to a cybersecurity expert at network security platform NordLayer, some employee activity that may go undetected by security teams can result in confidential data and industry secrets leaks or violations of GDPR.

Continue reading

Enterprises shift to software-based pentesting

Pentesting penetration testing

The latest State of Pentesting report from Pentera reveals that over 50 percent of enterprise CISOs now report using software-based pentesting to support their in-house testing practices.

Based on research conducted by Global Surveyz, the report notes that 50 percent of CISOs now identify software-based testing as a primary method for uncovering exploitable security gaps within their organizations.

Continue reading

76 percent of enterprises make decisions without consulting data because it's too hard to access

Decision guess coin toss

A new report finds that 76 percent of enterprises admit they've made business decisions without consulting available data because it was too difficult to access, creating a concerning gap between data availability and data-driven decision-making.

The report from Sisense with research firm UserEvidence shows that although 81 percent of organizations believe they have good or full control of their data, 64 percent acknowledge that they can't reliably access it for decision-making.

Continue reading

New MCP server uses AI to help enterprises secure SaaS

SaaS AI

Organizations are often using 50 or more different security tools and, even with the help of AI, they need to manually interact with each when investigating cybersecurity incidents.

A new SaaS security Model Context Protocol (MCP) server launched by AppOmni at this week's RSA Conference is designed to let security teams spend less time investigating incidents and more time taking action to fix them.

Continue reading

Mobile becomes the preferred route for attacks on enterprises

Mobile phishing mishing

Mobile threats are no longer an emerging issue, they're here, rapidly evolving, and targeting the devices organizations depend on every day.

As employees use smartphones, laptops, and tablets to access sensitive data and systems, a new report from Zimperium zLabs shows attackers are increasingly exploiting these endpoints through mobile-first strategies that bypass traditional security defenses.

Continue reading

Cloud waste -- why it's a problem and how to tackle it [Q&A]

Cloud money dollar

In recent years, businesses have stampeded to move systems to the cloud. But in doing so they often unwittingly introduce multiple layers of virtualization which means they can be paying to run the same processes multiple times.

Can optimization techniques help to improve performance and cut cloud costs? We spoke to Dr. Ignacio M Llorente, CEO and founder of OpenNebula Systems to find out more.

Continue reading

Enterprises struggle with serious gaps in cyber response plans

Incident response plan

A new survey of 1,000 businesses across the UK, UK, Europe and the Asia-Pacific region reveals a worrying disconnect between organizations' perceived readiness and actual performance in cyber crisis response.

The study for Semperis, with research from Censuswide, finds 90 percent of enterprises surveyed struggle with serious blockers to effective cyber response. Top issues include cross-team communication gaps (48 percent), out-of-date response plans (45 percent) and unclear roles and responsibilities (41 percent).

Continue reading

New Qualys tool aims to streamline enterprise compliance audits

Compliance rule law and regulation graphic interface for business quality policy

Enterprises are grappling with an increasing compliance burden, subject to multiple frameworks and more regulatory mandates that stretch resources and drive-up costs.

Misconfigurations can further complicate things, often leading to non-compliance and regulatory penalties. Plus time-consuming tasks like auditing, reporting, and system remediation are prone to human error.

Continue reading

AI tools present critical data risks in the enterprise

Risky AI

New research shows that 71.7 percent of workplace AI tools are high or critical risk, with 39.5 percent inadvertently exposing user interaction/training data and 34.4 percent exposing user data.

The analysis from Cyberhaven draws on the actual AI usage patterns of seven million workers, providing an unprecedented view into the adoption patterns and security implications of AI in the corporate environment.

Continue reading

1Password adds protection for agentic AI in the enterprise

Agentic AI

Current AI models can perform many tasks such as generating text, but these are 'prompted' -- that is the AI isn't acting by itself. But this is about to change with the arrival of agentic AI.

Gartner estimates that by 2028, 33 percent of enterprise software applications will include agentic AI, up from less than one percent in 2024, enabling 15 percent of day-to-day work decisions to be made autonomously.

Continue reading

Enterprises change how they manage cyber risk

Risk-dial

A new report from Zafran Security shows that enterprise risk management is shifting from volume to value, and from patching everything to fixing what matters most.

The study, carried out by Foundry MarketPulse, reveals that only one in 50,000 vulnerabilities actually pose a critical risk -- and the ones getting exploited the most are often old, quiet, and ignored.

Continue reading

Load More Articles