Ian Barker

GPU or AI accelerator? Which is the right choice [Q&A]

As enterprises roll out more AI applications, GPUs are in high demand to provide the computing power required to meet the demands of certain AI workloads.

But GPUs aren't the only game in town, there's rising interest in AI accelerators as customers seek choice and flexibility when it comes to their businesses. Last month, Intel and IBM announced a collaboration the availability of Intel Gaudi 3 AI accelerators on IBM Cloud.

Continue reading

Why exposure validation is essential to cybersecurity resilience [Q&A]

Cybersecurity teams are often overwhelmed by an endless backlog of vulnerabilities, but not all of them are high risk. Traditional exposure management emphasizes identifying and prioritizing risks, but without validation, teams often spend time remediating issues that don't even put critical assets at risk.

Dr. Süleyman Özarslan, co-founder of Picus Security and VP of Picus Labs, believes that exposure validation represents the missing piece in risk management. We talked to him about how organizations can move past theoretical risk assessments to create a more resilient approach to cybersecurity.

Continue reading

Why security tools are failing developers and what needs to change [Q&A]

The needs of development and security teams often seem to be in conflict. Developers want speed of delivery while security wants stability and safety.

These competing interests can be made worse by the security tools that developers are expected to use. We spoke to Mackenzie Jackson, developer advocate at Aikido Security, to discuss why security tools are failing developers and what can be done about it.

Continue reading

Fewer than half of UK public sector organizations are backing up data daily

A new report from Object First shows that, based on data from freedom of information requests, only 47 percent of UK public sector organizations back up critical systems daily.

This is despite more than 28,000 data breaches reported across National Health Service (NHS) trusts, local councils, and educational institutions over the past three years, exposing personal, health, and financial data.

Continue reading

The greatest theft in history? -- How big tech is benefiting from our data and why we should care [Q&A]

If you've written a book or composed some music or engaged in any other form of creative endeavour, the chances are that AI will have used it as part of its learning process.

This appropriation of copyright material is controversial since the original creator doesn't benefit.

Continue reading

How real-time analytics is powering innovation [Q&A]

Real-time analytics has rapidly emerged as a transformative technology, empowering businesses to harness immediate, actionable insights that drive personalized customer experiences, optimize operations, and manage risks in real time.

We spoke with Kishore Gopalakrishna, co-founder and CEO of StarTree to discuss the innovations behind this and how real-time analytics is becoming a cornerstone for innovation.

Continue reading

Enterprise SIEMs are detecting only 21 percent of threat techniques

Enterprise security information and event management (SIEM) tools miss 79 percent of the MITRE ATT&CK techniques used by adversaries, according to a new report.

The study from CardinalOps draws on an expansive dataset of 2.5 million total log sources, over 23,000 distinct log sources, more than 13,000 unique detection rules and hundreds of production SIEM environments, and finds that a significant portion of existing detection rules -- 13 percent on average -- are non-functional and will never trigger due to issues such as misconfigured data sources and missing log fields.

Continue reading

AI can transform the supply chain but adoption is slow

A new survey of 300 supply chain and procurement decision-makers in the UK reveals that while 36 percent are in the process of implementing AI, almost a third (32 percent) are either just considering adoption or have no plans to adopt AI at all.

The study from Ivalua indicates a growing divide between businesses moving ahead with AI and those lagging behind, with those that have deployed AI already reaping the benefits, including improved data analysis for decision-making (85 percent), task automation (83 percent), and demand forecasting (79 percent).

Continue reading

Is SaaS adoption making life easier for cybercriminals? [Q&A]

It's common knowledge that technology adoption outpaces security controls. But SaaS applications may be the biggest example of this, and cybercriminals have caught on.

We spoke to Cory Michal, CSO at AppOmni, about how we've made things easier for attackers, decreased our visibility and limited the effectiveness of our controls by the wholesale adoption of SaaS products over the past few years, and how the scale can be tipped in the opposite direction.

Continue reading

Cloud complexity puts strain on traditional security models

Cloud infrastructure is rapidly scaling but security teams are struggling to keep pace according to a new report from Prowler which shows 64 percent of organizations now operate in hybrid and 55 percent in multi-cloud environments, increasing the surface area for potential threats.

This diversification offers flexibility but also adds layers of complexity that traditional security models were never built to handle. Because of this, vulnerability management is a top concern with 46 percent of companies detecting an average of 17 cloud vulnerabilities each week.

Continue reading

Can more tools lead to worse cloud security?

Security teams receive an average of over 4,000 alerts per month from multiple cloud security tools, leading to major inefficiencies and serious delays that result in a weakening of overall cloud runtime security.

This 'cloud security paradox' -- more tools leading to less security -- is revealed in a new report from ARMO based on responses from more than 300 SecOps stakeholders and cybersecurity leaders. It finds that security teams must sift through roughly 7,000 alerts to find a single active threat.

Continue reading

DSPM adoption in 2025 -- what's driving the surge? [Q&A]

Since Gartner introduced Data Security Posture Management (DSPM) in 2022, adoption has grown rapidly, driven by multi-cloud complexity, AI risks, and stricter privacy regulations.

Yet, a knowledge gap remains, as organizations often compare DSPM to traditional tools like DLP or CNAPP without fully understanding its unique benefits. We spoke to Nikhil Girdhar, senior director for data security at Securiti to discuss how DSPM has evolved and how organizations can use it to best advantage.

Continue reading

Google highlights changing online security habits

A new survey released today by Google and carried out with Morning Consult, reveals that over 60 percent of US consumers have seen an increase in scams over the past year, with a third personally experiencing a data breach due to a scam.

Most have seen scams through text messages, but over 61 percent say they've also been targeted via email. As people experience more scams though, they report feeling more confident in their ability to spot them.

Continue reading

56 percent of security incidents caused by lack of MFA

Multifactor authentication

Valid account credentials -- with no MFA in place to protect the organization should they be
misused -- are still by far and away the biggest stumbling block for organizations investigated
by the Rapid7 IR team, occurring in 56 percent of all incidents in the first quarter of 2025.

Exposed RDP services account for six percent of incidents as the initial access vector (IAV) and were abused by attackers more generally in 44 percent of incidents.

Continue reading

Overcoming legacy technology and embracing digital transformation [Q&A]

Digital transformation

Legacy technology is quickly becoming the silent killer of business growth. With many IT leaders still relying on outdated systems, companies using legacy tech face mounting security risks, inefficiency, and spiralling costs.

We spoke to Alex Jeffery, SVP of managed IT services, at OneAdvanced to discuss the challenges that prevent IT leaders from introducing the latest technology and how to get C-suite buy-in to address them.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.