Banks choose to build their own tech solutions


While banks are investing in technology solutions to meet increasing demands, a new study shows that 61 percent prefer to build their own technology stack, rather than buy technology solutions from a third party.
The study from IT services company NTT DATA surveyed 900 senior banking respondents across 12 countries and examines the state of corporate banking following the COVID-19 pandemic.
Successful AI deployment needs to be enterprise wide


Businesses are keen to capitalize on AI, with 72 percent of business leaders in a new survey believing their competitors are using AI, and 63 percent concerned their competitors will use AI to gain an advantage over their own business.
But the study from SambaNova Systems, of over 2100 enterprise and IT leaders based in the US, UK, and Germany, shows just 18 percent of organizations with AI are rolling it out as a large-scale enterprise-class initiative. The majority -- 82 percent -- are rolling it out as multiple programs, creating disorganization and hindering successful deployment.
Do we need a cyber NATO to address the changing threat landscape? [Q&A]


The threat landscape facing enterprises is changing constantly. In recent months, major vulnerabilities like Log4j and malware-based threats have demonstrated the need for organizations to move quickly in order to defend themselves.
Is the best way to stay on top of the most pressing threats to harness the power of the global cybersecurity community for defense in a sort of cyber NATO? We talked to SOC Prime CEO Andrii Bezverkhyi to find out.
Honor among cyber thieves, the professional side of the dark web


Much like the legitimate eCommerce world, trust and reputation have become essential parts of the cybercriminal trade. New research by HP Wolf Security finds 77 percent of cybercriminal marketplaces analyzed require a vendor bond -- a license to sell -- which can cost up to $3,000.
In other evidence of a professional approach, 85 percent of these sites use escrow payments, and 92 percent have a third-party dispute resolution service. Every marketplace provides vendor feedback scores too. Cybercriminals also try to stay a step ahead of law enforcement by transferring reputations between websites -- as the average lifespan of a dark net website is only 55 days.
New process helps deliver Kubernetes observability


As Kubernetes becomes increasingly widely adopted, monitoring these systems effectively becomes even more critical for businesses. But because Kubernetes is by nature ephemeral -- things can be created and destroyed quickly -- this represents a challenge.
As a Gartner report last year pointed out poor or manual monitoring procedures can introduce friction for developers and loss of visibility. To combat this problem, analytics platform Sumo Logic has unveiled a new process to deliver Kubernetes observability in just a few clicks.
IT and security leaders lack confidence in their ability to protect the cloud


A new study from secure access specialist Appgate based on research by the Ponemon Institute finds 60 percent of IT and security leaders are not confident in their organization's ability to ensure secure cloud access.
The survey of nearly 1,500 IT decision makers and security professionals worldwide sets out to examine the pain points experienced in securing cloud environments and how zero trust security methods can enable digital transformation.
Almost half of organizations suffer voice network attacks


A new survey shows that 47 percent of organizations have experienced a vishing (voice phishing) or social engineering attack via their voice networks in the past year.
The study by voice traffic protection specialist Mutare also finds most are unaware of the volume of unwanted phone calls traversing their network, or the significance of threats lurking in unwanted traffic, which includes robocalls, spoof calls, scam calls, spam calls, spam storms, vishing, smishing and social engineering.
Quantum computing and its impact on cybersecurity [Q&A]


Quantum computing with its vastly improved processing capability offers the chance of many positive developments in research and science. But it also represents a potential threat to our current encryption models.
How big is quantum's threat to cybersecurity? And should we be taking action on this now? We talked to Skip Sanzeri, QuSecure co-founder and COO, to find out.
More than half of enterprises worried about supply chain risks


Software supply chain risk has become mainstream, with 52 percent of respondents to a new survey being concerned about it.
The study from cybersecurity company Coalfire also finds 50 percent of boards of directors with software-buying companies are raising concerns, which means that responsibility for software supply chain risk is no longer confined to technical teams.
Research reveals weaknesses in five popular web services


New research from Specops Software finds major cybersecurity weaknesses in popular web services including Shopify, Zendesk, Trello, and Stack Overflow.
The study shows several popular business web applications have failed to implement critical password and authentication requirements to protect customers from cybercrime.
Average cost of a data breach increases by 16 percent


A new report released today by ForgeRock shows the average cost of a breach in the US has increased by 16 percent to $9.5m, making the US the costliest place in the world to recover from a breach.
It also reveals a massive 297 percent surge in breaches caused primarily by security issues associated with supply chain and third-party suppliers and representing almost 25 percent of all breaches.
Overview of network operations is crucial for IT teams


A unified view of network operations is essential for IT teams that want to improve the digital customer experience while boosting their overall productivity, according to a new study.
A new survey for Riverbed, conducted by IDC, reveals that 90 percent of respondents currently use observability tools, yet 60 percent of them believe those tools are too narrowly focused and fail to provide a complete and unified view of their organization's operating conditions.
Now that 5G is becoming widespread what can we expect from 6G? [Q&A]


The 5G rollout is continuing, but technology companies, academics, service providers, and even governments are already starting to look ahead to the next generation of mobile technology.
So, what is 6G and what benefits will it offer over earlier standards? We spoke to Roger Nichols, 6G program manager at Keysight Technologies, to find out.
Lack of automation costs enterprises millions


A lack of automation capabilities for managing IT performance costs an average of $46 million a year according to a new study. While 57 percent of organizations see automation as the key enabler for closing the modernization skills gap in managing IT Operations.
The report from research firm Digital Enterprise Journal also reveals a 54 percent increase in cost of one hour of IT service down time since 2019. In addition 68 percent of IT teams' time is spent on tasks that do not contribute to key business outcomes.
The artificial intelligence tug-of-war in the world of cybersecurity [Q&A]


It's a rare cybersecurity product these days that doesn't claim to have some form of AI capability. But exactly what benefits does AI deliver? And is there a risk of an arms race as threat actors also turn to the technology?
We spoke to Corey Nachreiner, CSO at WatchGuard Technologies, to find out more about the role of AI in cybersecurity.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.