Ian Barker

Is this the year we take quantum threats seriously? [Q&A]

quantum computing

Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.

More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.

Continue reading

Cloud professionals cling to their passwords despite the risks

Despite the fact that insecure password practices are regularly exploited in cyberattacks worldwide, 83 percent of cloud professionals surveyed at the recent Cloud Expo Europe event say they are confident about passwords' security effectiveness, with 34 percent 'very confident'.

But the study, of over 150 people, carried out by Beyond Identity also reveals frustrations. 60 percent find it frustrating to remember multiple passwords, 52 percent are frustrated by having to regularly change their passwords, and 52 percent by the requirement to choose long passwords containing numbers and symbols.

Continue reading

The rise of biometrics for identity verification [Q&A]

Biometric scan

As the world increasingly moves away from relying solely on passwords for identity verification, the focus is on alternative technologies. Whether that is passkeys, biometrics or other options, each has its own advantages and adherents.

Ricardo Amper, CEO and founder of next-generation identity verification solution provider Incode, sees biometrics as the key to eliminating discrimination and to creating a world of greater trust. We spoke to him to find out more.

Continue reading

SMEs underestimate the cost of cyber incidents

A new report from cyber insurance provider Cowbell shows that 90 percent of small business leaders underestimate the cost of a cyber incident.

The study of 500 SME leaders across the US shows that 50 percent of SMEs have experienced a significant cyber incident in the past 12 months and, of those, 90 percent say the attack cost more than they anticipated.

Continue reading

Google brings AI collaboration to work

Google used yesterday's Google I/O to announce new services and capabilities across Google Cloud and Workspace.

Among these is Duet AI, an AI-powered collaborator, to enable more users and developers to start seeing the impact AI can have on their organization and help solve day-to-day work challenges.

Continue reading

Bad bot threats present a growing risk to organizations

A global analysis of automated bot traffic across the internet finds that in 2022, almost half (47.4 percent) of all internet traffic came from bots, a 5.1 percent increase over the previous year. At the same time the proportion of human traffic (52.6 percent) decreased to its lowest level in eight years.

The report from Imperva shows the volume of bad bot traffic has grown for the fourth year in a row, presenting a significant risk for businesses. The level of activity in 2022 is the highest since Imperva produced its first Bad Bot Report in 2013.

Continue reading

Consumers remain hesitant about using biometrics

A new survey of 1,000 global consumers shows that 54 percent think digital authentication methods such as biometrics are revolutionizing the customer experience when it comes to online transactions and payments.

However, the study from Incode Technologies, also reveals that 48 percent of respondents do not see digital authentication as contributing to trust in the online world. This is due to concerns about fraud protections, privacy, and security.

Continue reading

Compliance professionals want no-code platform solutions

Among governance, risk, and compliance (GRC) professionals responding to a new survey, 69 percent say that deploying a GRC platform that doesn't need developer support would improve their role.

The study from Onspring finds that a worrying 73 percent of respondents still needed a developer to update and administer their GRC programs, indicating a clear need for technologies that don't require developer input.

Continue reading

Combating phishing and social engineering threats [Q&A]

Social Engineering

The majority of cyberattacks are made possible by some degree of human error. Phishing emails and social engineering continue to dominate as the most common delivery systems for an attack.

We spoke to Mika Aalto, CEO and co-founder at Hoxhunt, about why a human-focused cyber-strategy is the key to success in combating attacks, about the initiatives that organizations can implement to establish this and how he expects human-related cyber-attacks to evolve.

Continue reading

Network edge technologies fail to cut it for modern businesses

Networked computers

New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.

Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.

Continue reading

Business leaders don't understand cybersecurity

A new survey from Delinea of over 2,000 IT security decision makers (ITSDMs) reveals that only 39 percent of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler.

In addition, over a third (36 percent) believe that it is considered important only in terms of compliance and regulatory demands, while 17 percent say it isn't seen as a business priority.

Continue reading

Technology sector suffers most from poor cyber hygiene

security flaw

Analysis of exposed dark web assets from SpyCloud finds that the technology sector has the highest number of malware-infected employees and consumers, the highest number of exposed corporate credentials, and the most exposed malware cookie records.

In the analysis of the darknet exposure of employees of Fortune 1000 enterprises across 21 industry sectors, researchers uncovered 27.48 million pairs of credentials with corporate email addresses and plain text passwords, with over 223,000 exfiltrated by malware.

Continue reading

Should IT chiefs be wary of vendor lock-in when moving to the cloud? [Q&A]

In the dash to move systems to the cloud it's easy to become dependent on the services of a specific vendor, making it time-consuming or costly to move to an alternative at a later date.

We spoke to Cooper Lutz, chief architect, digital solutions at AHEAD, to get his advice for IT teams making their way to the cloud on the best practices to mitigate vendor lock-in.

Continue reading

Cyberattacks seek to exploit trust in Microsoft and Adobe tech brands

The first quarter of 2023 has seen a significant increase in cyberattacks looking to exploit trust in established tech brands like Microsoft and Adobe.

A new report from Avast also finds a 40 percent rise in the share of phishing and smishing attacks over the previous year. Overall, two out of three threats people encounter online now seek to use social engineering techniques, taking advantage of human weaknesses.

Continue reading

Why customers are reluctant to share data online and what you can do about it [Q&A]

Brands are increasingly focussed on providing a good digital experience for their customers, yet many people remain reluctant to share their information with websites.

What are the reasons behind this reluctance? And what can enterprises do to overcome it? We talked to Josh Koenig, co-founder and chief strategy officer at SaaS web platform Pantheon, to find out.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.