Ian Barker

Lack of data confidence leads to AI failures

data failure

More than a third of AI and analytics projects in the cloud are failing due to poor quality data according to a new survey.

The study from data specialist Trifacta surveyed 646 data professionals across different industries and titles to examine how organizations are handling the accelerating transition of data to the cloud, the obstacles of data cleaning for analytics and the time constraints they face when preparing data.

Continue reading

AI -- separating the reality from the hype to deliver better solutions [Q&A]

Artificial intelligence

Artificial intelligence is making its way into more and more areas of our lives. But how much of this is hype and how much is genuine innovation? And can improved AI learning models deliver better commercial solutions?

We spoke to Ben Lamm, CEO of Hypergiant Industries, a company at the cutting edge of solving problems with AI, to find out.

Continue reading

How machine learning is set to be a major disruptor in the 2020s [Q&A]

machine learning

Over the last decade we've seen significant advances in AI and machine learning. But there's more on its way, with ML set disrupt almost every industry sector in the decade to come.

We spoke to Eric Loftsgaarden, VP of Data Science and co-founder of consulting services company Atrium to find out how ML can be used to set businesses apart from their competitors and give start ups an edge in traditional industries.

Continue reading

CRM is no longer enough say leading software companies

CRM jigsaw

Customer Relationship Management (CRM) systems are no longer enough for the digital era, according to more than 200 software companies.

In a declaration published as an open letter in yesterday's Wall Street Journal, the Platform of Independents set out its belief that companies should never be locked into CRM suites, and that building better products, respecting customer privacy, and making smarter business decisions requires more than a one-size-fits-all approach to their technology stacks.

Continue reading

Phishing dominates the UK threat landscape

Phishing

Using analysis of the last three year's worth of data breach information from the UK's Information Commissioner's Office (ICO), cyber security awareness platform CybSafe has revealed that phishing breaches have jumped significantly.

In 2019, UK organizations reported more cyber security breaches to the ICO than ever before. A total of 2,376 reports were sent to the public body last year, up from 540 in 2017, and 1,854 reports in 2018.

Continue reading

Fake 'compensation' scheme exploits fears of data leaks

cash trap

A new online fraud scheme is designed to trick people into thinking they are owed compensation for data leaks only to scam them out of cash.

Researchers at Kaspersky uncovered the scam which tries to get users to purchase 'temporary US social security numbers' at a cost of around $9 each. Victims have been found in Russia, Algeria, Egypt and the UAE, as well as other countries.

Continue reading

Why consumers must adopt a 'zero trust' approach to security [Q&A]

Trust card

A lot has been written about the consumerization of IT, but when it comes to personal security Josh Wyatt, VP of global services engagement at Optiv Security, believes consumers would be well served to take a page from the corporate cybersecurity playbook and adopt a 'zero trust' security strategy.

We recently spoke with Josh to find out how zero trust security can help consumers defend against cyberattacks, what types of threats we need to be aware of, and how this all relates to the business world.

Continue reading

2019: The year in cyber attacks

Cyber attack

Check Point Research has released its 2020 Cyber Security Report, looking at the key malware and cyber-attack trends during 2019.

Even though cryptomining declined during 2019, linked to cryptocurrencies' fall in value and the closure of the Coinhive operation in March, 38 percent of companies globally were impacted by crypto-miners in 2019, up from 37 percent the previous year. Crypto-miners remain a low-risk, high-reward activity for criminals.

Continue reading

Majority of workloads will be in the cloud by the end of 2020

Cloud

Organizations are becoming more comfortable and familiar with cloud technology while recognizing its increasing benefits. 85 percent of respondents to a new survey say they expect to have the majority of their workloads on the cloud by the end of this year, and 24 percent plan to be cloud-only.

The study from cloud services provider AllCloud also shows more than 56 percent of respondents say that at least half of all their cloud workloads are using containers or microservices.

Continue reading

Why secure data exchange is vital for the fintech industry [Q&A]

financial data exchange

Over the past few years, we've seen a surge in popularity for both consumer fintech apps, as well as fintech services for businesses.

This shift in the financial services ecosystem has empowered users to take greater control of their financial lives, equipping them with tools to better understand how and where they spend their money, increase their credit scores, prepare taxes, aggregate disparate financial and investment accounts, among many other applications.

Continue reading

New Year's resolutions go digital as people vow to cut screen time

sleeping with phone

If you haven't made or broken any New Year's resolutions yet, here are some you might like to try. Research from Kaspersky indicates that 40 percent of people plan to change their digital lifestyle in 2020 with most aiming to reduce the time they spend with their gadgets.

The research shows 42.3 percent would make a digital New Year's resolution for 2020 rather than something more traditional.

Continue reading

US government-funded phones come with pre-installed malware

Mobile app threats

Researchers at Malwarebytes have uncovered malware pre-installed on phones offered under the US government-funded Lifeline Assistance program.

Assurance Wireless by Virgin Mobile offers the UMX U686CL phone as their most budget-friendly option at only $35 under the scheme. However, users are getting more than they bargained for. An app called Wireless Update is designed to update the phone's OS but can also install other apps without consent.

Continue reading

Why your business needs cyber risk insurance [Q&A]

risk jigsaw piece

Protecting against cyberattacks and guarding against technology failures is something that most businesses now do as a matter of course. But insuring against the risks is less common and could be leaving companies open to major losses.

We spoke to Jack Kudale, CEO of cyber insurance specialist  Cowbell Cyber to find out more about cyber risk insurance and why it's increasingly being seen as an essential safeguard.

Continue reading

TiKTok vulnerabilities could allow hackers access to personal data

TikTok app

Multiple vulnerabilities in the popular TikTok video-sharing app and its back end could have allowed attackers to manipulate content on user accounts, and even extract confidential personal information.

Researchers at Check Point have found that an attacker could send a spoofed SMS message to a user containing a malicious link. If the user clicked on the link, the attacker was able to access the user's TikTok account and manipulate its content by deleting videos, uploading unauthorized videos, and making private or 'hidden' videos public.

Continue reading

Implications for CEOs who miss security targets [Q&A]

Uncomfortable board meeting

Increasingly IT security is seen as an issue for the entire organization. This means it's often included in business targets, but setting these in a meaningful way -- and being able to meet them -- is a major challenge .

We spoke to Joseph Carson, Chief Security Scientist and Advisory CISO at Thycotic, to find out more about the difficulties of setting and measuring the success of targets for security.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.