How artificial intelligence and machine learning are changing the development landscape [Q&A]


It's an increasingly rare application these days that doesn’t claim to incorporate some form of artificial intelligence or machine learning capability.
But while this may be great from a marketing standpoint it does pose a challenge for developers. We spoke to Luis Ceze, CEO and co-founder of OctoML, to find out more.
82 percent of CIOs believe their software supply chains are vulnerable


A new global study of 1,000 CIOs finds that 82 percent say their organizations are vulnerable to cyberattacks targeting software supply chains.
The research from machine identity specialist Venafi suggests the shift to cloud native development, along with the increased speed brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex.
New study reveals serious disconnect in executive planning for cyberattacks


A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.
The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.
The role of encrypted traffic analysis for threat detection [Q&A]


Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.
But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.
What is needed to make digital transformation work? [Q&A]


Digital transformation is a topic that's been in the air for more than just a few years now, but the impact of the pandemic and the need for businesses to adapt has rapidly brought it back to the forefront.
It's also no longer just about IT. Digital transformation is an enterprise-wide endeavor, connecting and affecting all business units and requires a shift in mindset to take full advantage of the opportunities it offers.
Researchers uncover cybercriminal stronghold targeting Facebook users


The Facebook Messenger 'Is That You?' video phishing scam has been around since 2017, but a recent investigation into it by researchers at Cybernews has led to the discovery of what they're calling a 'cybercriminal stronghold'.
Threat actors are using this to infect the social network with thousands of malicious links each day. The research has also identified at least five suspects, thought to be residing in the Dominican Republic.
Americans have their sensitive bits exposed over 700 times a day


Americans have sensitive data relating to their online activity and location exposed 747 times daily, almost twice as much as Europeans who have their data exposed 376 times a day on average.
A new report from Atlas VPN looks at real-time bidding (RTB), which runs in the background on websites and apps and tracks what you look at, no matter how private or sensitive it is.
BEC attacks get more businesslike to trick users


Business email compromise attacks are up 53 percent over the last year and are increasingly trying to look more like legitimate emails in their use of language.
A new report from Armorblox shows 74 percent of BEC attacks are using language as the main attack vector.
Business-critical systems going unsecured and unmonitored


According to a new poll 40 percent of enterprises don't include business-critical systems such as SAP in their cybersecurity monitoring. In addition, a further 27 percent are unsure if systems are included in their cybersecurity monitoring at all.
The survey from Logpoint also shows only 23 percent say the process of reviewing SAP logs for cybersecurity events or cyberthreat activity is automated through SIEM, with almost 19 percent still doing so manually.
Identity-based attacks are top threat to businesses


Ransomware, software supply chain attacks, data breaches, and more have become an almost daily occurrence in an increasingly challenging threat landscape.
Automated threat detection company Blumira has released a new report based on its security detections which reveals that identity-based attacks and living off the land behaviors were the top threats organizations faced in 2021.
Consumers want digital identity verification from online brands


Providing a digital identity to create an online account or complete a transaction is becoming more commonplace globally and consumers are now expecting this as part of their engagement with a business.
Research carried out by Opinium for Jumio surveyed 8,000 adult consumers split evenly across the UK, US, Singapore and Mexico. It finds that 57 percent now say they have to use their digital identity 'constantly' or 'often' to access their online accounts.
Website shadow code represents major risk for enterprises


A new report from web application protection specialist Source Defense highlights the risk presented by the use of third and fourth party code on corporate websites.
The digital supply chain means that highly dynamic and unpredictable scripts and code from third parties and beyond, permeate every aspect of a business's web presence. This shadow code has led to some high profile breaches including the British Airways hack in 2018.
Elevation of privilege is the top Microsoft vulnerability category


A new report into Microsoft vulnerabilities shows 2021 saw a 47 percent decrease in critical vulnerabilities, marking the lowest ever total since the report began.
The 2022 Microsoft Vulnerabilities Report from BeyondTrust also reveals that for the second year running, elevation of privilege was the #1 vulnerability category, accounting for 49 percent of all vulnerabilities.
Growing complexity leads enterprises to look for new service providers


A new study from CloudBolt Software reveals that 80 percent of enterprises are so frustrated with their existing cloud-oriented provider they are actively looking for a replacement within the next twelve months.
At the core of this dissatisfaction with CSPs and MSPs is the growing complexity of multi-cloud environments, and a widening skills gap among both enterprises and service providers.
Two-thirds of data breaches at UK legal firms caused by insiders


New analysis of data breaches in the UK legal sector reveals that 68 percent were caused by insiders.
Analysis by secure cloud platform NetDocuments of data from the Information Commissioner's Office (ICO) reveals evidence of a 'Great Exfiltration' where employees are leaving their jobs and taking their company's data with them.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.