Ian Barker

The importance of API monitoring across the enterprise [Q&A]

Over the past few years, technology teams have split into smaller work groups with more focused tasks. The rise of the cloud has created the need for DevOps teams, and the gap has grown wider between teams that build products and teams that manage products.

At the same time, applications have become dramatically more complicated. This has given rise to specialized site reliability engineers who are well-versed in monitoring all application components, including APIs. However, focusing API resilience in one team has allowed organizations to treat the symptoms rather than the underlying problem.

Continue reading

Manufacturing and industrial sectors most targeted by attackers

Manufacturing and industrial products remain the most targeted sectors by cyber threat actors in the first half of 2024, with 377 confirmed reports of ransomware and database leak hits in the first half of the year.

A new report from managed detection and response specialist Critical Start is based on analysis of 3,438 high and critical alerts generated by 20 supported Endpoint Detection and Response (EDR) solutions, as well as 4,602 reports detailing ransomware and database leak activities across 24 industries in 126 countries.

Continue reading

Ransomware productivity shows signs of leveling off

According to a new report, ransomware productivity has shown signs of leveling off in 2024, however, the frequency of attacks and ransom payments collected remains higher in the first half of 2024 compared to the same periods in 2022 and 2023.

The report from WithSecure suggests law enforcement actions, notably the take down of the Lockbit ransomware group in February 2024, have played a critical role in disrupting major ransomware operations.

Continue reading

GenAI adoption surges amid concerns about security

Although enterprises are adopting GenAI in a big way, only five percent of the 1,000 cybersecurity experts responding to a new survey have confidence in the security measures protecting their GenAI applications even as 90 percent are actively using or exploring its use.

The research from Lakera shows attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manipulate the applications, gain unauthorized access, steal confidential data and take unauthorized actions.

Continue reading

Real-time hybrid data access is key to AI success

A new report from data lakehouse company Starburst highlights the critical role of real-time hybrid data access and robust security in successful AI implementations.

Based on a survey of 300 IT professionals from diverse industries in the United States and Western Europe, carried out by TheCUBE Research, the report shows 90 percent of respondents believe their data management practices are either somewhat or very aligned with their AI innovation goals, highlighting the critical role of coherent data strategies.

Continue reading

The EU Digital Markets Act and what it means for business [Q&A]

The Digital Markets Act (DMA) is aimed at ensuring a higher degree of competition in European digital markets. It seeks to prevent big companies from abusing their market power and allow new players to enter the market.

We spoke to Chris Hewish, chief strategy officer at video games commerce company Xsolla, to discuss the implications the DMA has on game developers and publishers, particularly in the context of digital distribution platforms, app stores, and online marketplaces.

Continue reading

Ransomware attacks rise over 60 percent

Ransomware Malware Cyber Attack

In the last year, the US has experienced a dramatic 63 percent increase in ransomware attacks, with the UK seeing an even greater rise of 67 percent.

The latest State of Ransomware report from Malwarebytes shows the share of attacks carried out by gangs outside the top 15 increased from 25 percent to 31 percent, indicating that ransomware is becoming more accessible to a broader range of cybercriminals.

Continue reading

Accusoft uses IBM AI to automate document tagging

Document processing specialist Accusoft is releasing new Auto Tagging and Classification modules within its PrizmDoc secure document viewer.

The modules use the IBM watsonx data and AI platform with the IBM Granite foundation model to automate manual tagging and classification providing consistency and ensures documents are meticulously organized, easily searchable, and compliant with regulations.

Continue reading

Over half of enterprises suffer data breaches in non-production environments

A new study shows 91 percent of organizations are concerned about the expanded exposure footprint across non-production environments (including software development, testing, and data analytics).

Once a production dataset is copied many times over into non-production environments, more workers have access to it and the data is no longer subject to the same strict security controls.

Continue reading

72 percent of executives targeted by cyberattacks

Senior executives are prime targets for cybercriminals, with 72 percent of surveyed cybersecurity professionals in the US reporting that this group has been targeted by attacks in the past 18 months.

The study from GetApp also highlights the rising use of AI-generated deepfakes, which have been involved in 27 percent of the attacks.

Continue reading

Raspberry Pi 5 now offers less memory and a lower price

The Raspberry Pi 5 was first released almost a year ago, today the Raspberry Pi Foundation is unveiling a new 2GB version of the popular one-board computer.

The lowest-cost Raspberry Pi 5 has so far been the 4GB variant, priced at $60. The new 2GB Pi comes in at only $50 and is built on a cost-optimised D0 stepping of the BCM2712 application processor.

Continue reading

Combating information overload with different data sources [Q&A]

The majority of teams today are contending with too much data which means they struggle to generate meaningful insights from their information, and can become overwhelmed by the sheer volume.

We spoke to CallMiner CMO Eric Williamson who believes sourcing customer feedback from different sources might help solve the problem.

Continue reading

Enterprises need to update application security practices

Organizations urgently need to modernize their application security practices so that they can support growth and mitigate risks according to a new report.

Thew study from Legit Security and TechTarget's Enterprise Strategy Group (ESG) finds nearly all organizations reporting difficulties in fixing vulnerabilities after applications are deployed, reinforcing the significance of incorporating security processes and tools in the build process.

Continue reading

The challenges of securing Active Directory [Q&A]

Microsoft Active Directory is used by a majority of the world’s organizations. But Cyberattacks and misconfigurations targeting AD have surged in recent years, leading to critical outages and data loss.

We spoke to Bob Bobel, CEO of Cayosoft, about how to address critical weaknesses in enterprise infrastructure associated with Microsoft Directory services.

Continue reading

DDoS attack activity soars in first half of 2024

In the first half of 2024, web DDoS attacks surged globally 265 percent compared to the second half of 2023, according to the latest threat analysis report from Radware.

Organizations in EMEA were the primary target of web DDoS attacks between January and June of 2024, being subject to more than 90 percent of the attacks.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.