Ian Barker

AI-driven search helps uncover cloud risks

Cloud data protection

It's crucial for organizations to have a complete and comprehensive view of all their cloud assets, but the process of discovery can be a difficult one, especially if multiple platforms are involved.

Cloud security platform Orca Security is launching a new AI-powered cloud asset search that is aimed at making the process more intuitive and available not only to security practitioners, but also developers, DevOps, cloud architects, and risk governance and compliance teams.

Continue reading

AI chatbot simplifies Kubernetes management

Kubernetes management platform company D2iQ is launching new updates to its D2iQ Kubernetes Platform (DKP) that include DKP AI Navigator, an AI assistant that enables enterprise organizations to overcome the skills gap they face in adopting cloud-native technology.

DKP AI Navigator enables organizations to harness more than a decade of the D2iQ team’s experience. It's been trained on D2iQ's internal knowledge base, enabling customers to ask questions and receive real-time responses in a natural, intuitive way. This can reduce the duration and cost of system misconfigurations and downtime while helping organizations overcome the Kubernetes skills gap.

Continue reading

Lack of cybersecurity staff affects over 70 percent of organizations

Vacant chair

The cybersecurity skills crisis has impacted 71 percent of organizations and left two-thirds of cybersecurity professionals saying that the job itself has become more difficult over the past two years.

New research carried out by Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) finds 66 percent of respondents believe that working as a cybersecurity professional has become more difficult over the past two years, with close to a third (27 percent) stating that it is much more difficult.

Continue reading

Boards show confidence in their cybersecurity but still think they're at risk of attack

A new survey reveals that board members tend to feel good about their company's cybersecurity policy, but that many are still unprepared to face a cyberattack.

The study from Proofpoint surveyed over 650 board members across 12 countries and finds that 73 percent believe cybersecurity is a high priority for their board, 72 percent feel their boards understand the threats they face, and 70 percent agree they have adequately invested in resources.

Continue reading

Why vulnerability management needs a refresh [Q&A]

Adversaries are exploiting new vulnerabilities much faster than organizations are remediating them. As a result, prioritizing the wrong vulnerabilities will squander security teams' most critical resource -- time.

So, how can organizations prioritize the right threats? We spoke with Anthony Bettini, founder and CEO of VulnCheck, to find out.

Continue reading

The IT assets that could put your organization at risk

Network

Attackers are always looking for routes that will offer them a way into organizations' networks. New research released today by Armis shows the devices that are most likely to pose a threat.

Interestingly the list includes various personal devices as well as business assets, suggesting attackers care more about their potential access to assets rather than the type and reinforcing the need for security teams to account for all physical and virtual assets as part of their security strategy.

Continue reading

Two out of three companies lose data due to failed backups

Backup key

Of the 90 percent of UK enterprises that have been forced to turn to their backup system, only 27 percent were able to recover all of their information and documents -- down from 45 percent in 2022.

A survey from encrypted drive maker Apricorn finds 32 percent of the security decision makers in large enterprises surveyed attributed the unsuccessful recovery to a lack of robust backup processes, up from two percent in 2022.

Continue reading

How organizations can safely adopt generative AI [Q&A]

Artificial intelligence

Generative AI tools like ChatGPT have been in the news a lot recently. While it offers many benefits it also brings risks which have led to some organizations banning its use by their staff.

However, the pace of development means that this is unlikely to be a viable approach in the long term. We talked to Randy Lariar, practice director of big data, AI and analytics at Optiv, to discover why he believes organizations need to embrace the new technology and shift their focus from preventing its use in the workplace to adopting it safely and securely.

Continue reading

UK schools not doing their homework on email security

As students at schools and colleges in the UK begin to return after the summer break, new research shows that 96 percent of the top 50 state secondary schools, 92 percent of the top 50 sixth-form colleges and 80 percent of the top 50 universities in the UK are lagging behind on basic cybersecurity measures, leaving students, staff and partners at risk of email-based impersonation attacks.

The research from cybersecurity company Proofpoint is based on an analysis of DMARC adoption and reveals that 70 percent of UK schools are currently taking no steps to protect themselves from domain impersonation by having no published DMARC record.

Continue reading

Why serverless platforms will unlock a new era of low-code development [Q&A]

As developers look for ways to improve productivity they're moving away from 'no-code' offerings and have their sights set on serverless platforms to help bolster their 'low-code' solutions.

Serverless platforms take tasks like managing application resilience, performance, security and compliance away from developers, allowing them to focus on functionality and innovation. We spoke to Briana Frank, VP of product at IBM Cloud to find out more about how serverless will unlock the next era of low-code.

Continue reading

Defender bypass allows threats to be removed from protection database

Microsoft Defender on a laptop

A lot of people rely on Windows Defender to protect their systems, it's free and installed by default so why not?

Defender uses a blacklisting approach to stop threats. Before allowing a file to execute, it will compare it against its database of known threats and stop it from executing if it's on there. However, researchers at SafeBreach have uncovered an exploit that can allow threats to be removed from the database.

Continue reading

Half of European enterprises have no formal BYOD policy

BYOD key

The shift to remote and hybrid working has led to many more people using their personal devices for work purposes.

Yet a new survey, from Apple device management specialist Jamf, reveals that 49 percent of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources.

Continue reading

60 percent of healthcare industry cyber incidents impact patient care

A new survey from Claroty of 1,100 cybersecurity, engineering, IT, and networking professionals from healthcare organizations finds 78 percent of respondents experienced a minimum of one cybersecurity incident over the last year.

Perhaps more concerning is that 60 percent of those incidents had a moderate or substantial impact on patient care and 15 percent had a serious impact that compromised patient health and/or safety.

Continue reading

Over half of data breaches are down to digital certificates

Magnified certificare

Among organizations that have suffered data breaches, 58 percent were caused by avoidable issues related to digital certificates.

New research conducted by Forrester for AppViewX also shows that as a result of service outages 57 percent say their organizations have incurred costs upwards of $100,000 per outage.

Continue reading

Why UK-based companies are at a crossroads with GDPR [Q&A]

GDPR graphic

Data privacy regulation, GDPR, has been in force for five years but it will soon be superseded by UK GDPR. The Data Protection and Digital Information Bill, now wending its way through parliament, will see organisations move to a UK equivalent following the country's withdrawal from the EU. But what will the change mean in practice?

We spoke to Jon Fielding, managing director of EMEA at Apricorn, to find out how UK GDPR will affect businesses and how they handle and protect data.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.