Ian Barker

How do you know what's real and what's AI? [Q&A]

robot call center

The world is increasingly buzzing with stories about AI generated content. Today when you contact a business you might equally well be talking to a bot as a human, but is it possible to spot AI generated content and should we be worried about it?

We spoke to Gaurav Kachhawa, chief product officer of conversational messaging platform Gupshup, to find out how to distinguish AI-generated content, as well as the ethics that surround its use.

Continue reading

Developer enablement tools are changing the workplace -- but not necessarily for the better

frustrated

A new study from O'Reilly Media looks at how developer enablement tools including GitHub Copilot and ChatGPT are impacting productivity within the workplace.

And the news isn't all positive; almost half of all respondents (46 percent) say they are struggling with AI-assisted low and no-code tools that have steep learning curves and barriers to entry.

Continue reading

Breaches decline as security culture improves

CISO

The latest Security Maturity Report, published today by ClubCISO, shows 76 percent of CISOs reported no material breaches over the past year, up from 68 percent in 2022.

Despite the difficult economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 60 percent of those surveyed say that no material cyber security incident had occurred in their organization over the past 12 months.

Continue reading

Cost of living crisis raises cyber risk from unhappy staff

A new survey of UK small and medium enterprises shows that 47 percent believe they are at greater risk of a cyberattack since the cost-of-living crisis.

The study from CyberSmart reveals that 38 percent believe this is due to increased malicious insider threats such as disgruntled employees making decisions that are not in the best interest of the company. While 35 percent believe it is due to negligent insider threats such as overworked or distracted employees making mistakes.

Continue reading

Rows gives you your own personal spreadsheet analyst

Earlier in the year, German spreadsheet company Rows launched its latest product with ChatGPT capabilities built in.

Its now introducing a new feature in the form of AI Analyst which summarizes the main takeaways from any dataset, runs in-depth analysis, and answers any questions you might have about your data.

Continue reading

Manufacturing businesses face escalating cyber threats

Two thirds of IT executives in the manufacturing sector believe that their enterprise will be targeted by a cyberattack within the next 12 months.

The study of 300 executives, carried out by CXO Priorities for Quest Software, shows that the most significant threats are seen as ransomware (22 percent), industrial espionage (21 percent), and state-sponsored threats (21 percent).

Continue reading

The top drivers of wasted IT spend in a hybrid-first environment [Q&A]

From rising collaboration expenses to a need for more devices per employee, hybrid work models have driven a need for new investments in workplace technology.

However, a significant portion of IT spend is wasted in a hybrid-first environment, often due to a reliance on manual processes that don't provide much-needed visibility into organizational endpoints.

Continue reading

Canonical brings OpenStack to small-scale clouds

Cloud-PC

Canonical has announced the extension of its commercial OpenStack offering to small-scale cloud environments with a new project, Sunbeam.

The project is 100 percent open source and is available free-of-charge, but enterprise customers can also opt-in for comprehensive security coverage and full commercial support under the Ubuntu Pro + Support subscriptions once they’ve completed the deployment.

Continue reading

Around a third of enterprise software spend is wasted

Despite significant efforts to become more efficient with IT budgets, respondents to a new survey report underutilization or wasted IT spending of 36 percent for desktop software, 33 percent for data center software, 32 percent for SaaS and 32 percent for IaaS/PaaS.

The study into IT asset management (ITAM) from Flexera shows that software asset management (SAM) programs are saving enterprises tens of millions of dollars. 55 percent of respondents say they saved more than $1 million, and 16 percent claim SAM programs saved more than $10 million in the past year.

Continue reading

Financial services businesses face critical data security gap

Lock and money

New survey findings from Lookout show that 70 percent of IT leaders in the financial services sector report a significant increase in data breaches compared to previous years.

Nearly half of organizations (47 percent) are struggling with the heightened difficulty of detecting and mitigating threats, while about a fifth (18 percent) face a significant lack of control over their applications and data.

Continue reading

Firewalla Gold SE is set to offer protection for faster internet speeds

Towards the end of last year we reviewed the Firewalla Gold Plus, a more powerful version of the plug-in network protection device aimed at professional and business users.

Of course the world of the internet doesn't stand still for long and with gigabit speeds becoming more widely available as full fiber services are rolled out, Firewalla is set to up its game again with the launch of the Gold SE.

Continue reading

The devices that pose a threat to critical infrastructure

Industrial IoT

Operational technology and industrial control system devices represent an attractive target for cybercriminals attempting to access networks, and for nation state actors looking to disrupt infrastructure.

Asset visibility and security company Armis is releasing new research identifying the riskiest devices that pose threats to critical infrastructure industries: manufacturing, utilities and transportation.

Continue reading

The importance of blockchain security in an interconnected world [Q&A]

Blockchain

Blockchain is best known for its application in securing cryptocurrency. But in recent years it's expanded to drive emerging business in other sectors such as healthcare, real estate, smart contracts, and more.

Because blockchain ensures a tamper-proof ledger of the distributed transactions, it's sometimes used for high-risk transactions and exchanges. But this presents high stakes opportunities for adversaries to steal money and sensitive information.

Continue reading

Data quality incidents take two days or more to resolve

The latest State of Data Quality survey from Bigeye finds that more than half of respondents have experienced five or more data issues over the last three months.

Another 40 percent say they have experienced moderate to severe data incidents within the last six months, and that it took a major effort to avoid damage to the business. These incidents range from severe enough to impact the company's bottom line, to reducing engineer productivity.

Continue reading

Why organizations shouldn't pay ransomware demands [Q&A]

Many organizations around the world are opting to pay ransoms to cybercriminals in order to buy back ownership of their data. But this can leave them open to further risk of attack.

Gerasim Hovhannisyan, CEO and co-founder of EasyDMARC, believes it's wrong to pay up and that it's better to establish good defenses. We spoke to him to find out why.

Continue reading

© 1998-2023 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.