Ian Barker

Harnessing the power of AI to combat fake reviews [Q&A]

There's a lot of talk about how artificial intelligence (AI) is changing the world. And it's true -- AI has already started transforming the healthcare, finance, and manufacturing industries. But there's one area where AI is causing some severe problems: fake reviews.

We spoke with Truely CEO JP Bisson about AI technology and how companies can use it to protect their interests.

Continue reading

Charging your phone -- and why you may be doing it wrong

The trouble with mobile phones is they rely on a battery and you can almost guarantee that with today's high-res screens and power-hungry applications it never seems to be fully charged when you want it to be.

If you want to avoid waiting for a charge to complete or using your phone while tethered to a wall socket, the team at charger specialist MAGFAST has created an infographic with tips to help you ensure your phone charges faster.

Continue reading

96 percent of known open source vulnerabilities can be easily avoided

With more open source being consumed than ever before, attacks targeting the software supply chain have increased too, both in frequency and complexity. A new report reveals a 633 percent year on year increase in malicious attacks aimed at open source in public repositories -- this equates to a 742 percent average yearly increase in software supply chain attacks since 2019.

The latest State of the Software Supply Chain Report from Sonatype, released today at the DevOps Enterprise Summit, also finds that 96 percent of open source Java downloads with known-vulnerabilities could have been avoided because a better version was available, but was ignored.

Continue reading

Enterprises expect passwordless access to be the leading approach within five years

web authentication

A new survey of over 300 IT professionals with responsibility for workforce identities and their security in large organizations shows that 87 percent expect passwordless solutions will become the leading approach to secure workforce identities within five years.

The study by Dimensional Research for Secret Double Octopus looks at perceptions and adoption of newer FIDO2-certified enterprise passwordless solutions, and the impact of single sign-on portal and endpoint biometric-based 'passwordless-like' experiences.

Continue reading

DevOps pros want to reduce reliance on single cloud providers

Cloud

More than half (53 percent) of DevOps professionals in a new study say they will consider multicloud architecture to reduce reliance on a specific cloud provider.

The survey of over 700 development professionals and leaders from Techstrong Research finds that the cloud landscape is changing as buyers increasingly put the developer experience on the same footing as core technical and performance capabilities of cloud infrastructure services.

Continue reading

Online ad fraud, why it's such a problem and what to do about it [Q&A]

Online advertising is big business and it inevitably follows that where there's money to be made the fraudsters and cybercriminals won't be far behind.

We spoke to Jacob Loveless, CEO of eCommerce specialist Edgemesh, to find out more about why ad fraud has become such an issue and what businesses can do to combat it.

Continue reading

How AI and data analytics are driving instant commerce [Q&A]

The internet has changed the way that most people shop and increasingly we want to get the things we've ordered fast.

This has given rise to on-demand commerce, with deliveries supported by armies of gig workers. But it's also driven rapid technological innovation in the logistics sector. We spoke to Kashyap Deorah, founder and CEO of logistics app specialist HyperTrack, to learn more about the new the phenomenon of 'instant commerce' and what it means for both enterprises and consumers.

Continue reading

New ransomware groups emerge but overall activity slows

Ransomware

Research from GuidePoint Security shows eight new ransomware groups have emerged in the last quarter and that there has been at least one new ransomware group each month since January 2021.

The report, from the GuidePoint Research and Intelligence Team (GRIT), tracked 27 ransomware groups and 568 publicly posted victims in the third quarter of this year and shows a slight slowdown overall of ransomware activity from the previous quarter.

Continue reading

Older generations are less likely to click phishing emails

Digital natives aged between 18-39 are the most vulnerable age group for phishing scams, according to new data from security awareness training company SoSafe.

It finds that 18-39 year-olds have an average click rate of 29 percent on phishing emails, which drops to 19 percent among older age groups.

Continue reading

The forensic analysis of a ransomware attack [Q&A]

A ransomware attack can be devastating for businesses. But while in the aftermath of an attack the focus will be on recovery, it's also important to look at how the attack happened and what information can be gleaned to help prevent future incidents.

We spoke to Joseph Carson, chief security scientist at privileged access management specialist Delinea, to talk through the analysis of a typical attack and what lessons can be learned.

Continue reading

Passkey support comes to Chrome and Android

Password keyhole

Google has announced today that it's bringing passkey support to both Chrome and Android. Passkeys offer a significantly safer replacement for passwords and other phishable authentication factors and mark another step towards a passwordless future.

If you're unfamiliar with passkeys, they're a joint initiative from Apple, Google, and Microsoft. Unlike a password the key is stored exclusively on your devices and never gets shared with anyone else.

Continue reading

SOC stresses mean 71 percent of security professionals consider quitting

Employee leaving

Information and work overload, insufficient downtime, lack of tool integration, and alert fatigue mean that 71 percent of security operations center professionals say they're likely to quit their job.

A new report from logging and security analytics company Devo Technology shows SOC leaders continue to face a tricky balancing act when it comes to retaining SOC analysts amid major talent shortages and turnover.

Continue reading

Remote workforces at SMBs are being left unprotected

working from home

Cyberattacks and other threats aren't limited to large organizations, indeed SMBs are often targeted as they are seen as having fewer resources to devote IT security defenses, particularly related to remote workers.

A new survey from software company Devolutions bears out this view, with only 18 percent of SMBs checking all the requisite IT security boxes and 13 percent not implementing any essential IT security measures at all.

Continue reading

One in five CISOs works over 25 hours overtime each week

According to new research from Tessian, 18 percent of UK and US security leaders work over 25 hours extra a week, double the amount of overtime they reported in 2021.

On average, they work 16.5 hours over their contracted weekly hours, up from 11 hours in 2021. Also three-quarters of security leaders say they aren't able to always switch off from work, 16 percent of these say they can rarely or never switch off.

Continue reading

Consumers want businesses to be more transparent about handling data

Consumers want to see more transparency from businesses around how their data is handled, according to the Cisco 2022 Consumer Privacy Survey.

The survey also shows that while consumers are supportive of artificial intelligence -- 54 percent are willing to share their anonymized data to improve AI products -- they are concerned about how businesses use AI, with 65 percent having lost trust in organizations due to their AI use.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.