Ian Barker, BetaNews.com

Ian Barker

BetaNews.com

United Kingdom

Contact Ian

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • BetaNews.com

Past articles by Ian:

Google Workspace gains generative AI

Generative AI is very much flavor of the month at the moment thanks to tools like ChatGPT. Now business tool Google Workspace is getting in on the act with new features to help users create drafts, proofread, generate images and more. → Read More

New platform helps uncover vulnerable secrets

Complex software today includes components that rely on digital authentication credentials commonly referred to as secrets, which include tools such as login credentials, API tokens, and encryption keys. While critical for the software to function, managing secrets across every component of code is a challenge that can result in secrets being left vulnerable. → Read More

95 percent of business leaders expect AI/ML investments to boost revenue

A new survey of 100 chief data officers (CDOs) and chief data analytics officers (CDAOs) at companies with $1B+ in revenue shows that 95 percent say their company leadership expects investments in AI and ML applications will result in a revenue increase. → Read More

Consumers turn to biometrics as they struggle to remember passwords

People are struggling to recall an ever-growing number of passwords, with 51 percent of respondents to a new study by Entrust saying they reset a password at least once a month because they can't remember it. → Read More

Want cheap broadband? Head for Sudan

Analysis of data on over 3,700 broadband packages from 219 countries around the world shows that if you want the cheapest deal you should consider moving to Sudan. → Read More

Over 700 million credentials exposed and 22 million devices infected in 2022

The latest Identity Exposure Report from SpyCloud shows that last year its researchers recaptured 721.5 million exposed credentials from the criminal underground, and found over 22 million unique devices infected by malware. → Read More

How software pricing strategy is evolving [Q&A]

Buying software used to be relatively simple. You either paid a one-off fee, or an ongoing license, or sometimes a combination of both. → Read More

The rise of hardware-based security and why it matters [Q&A]

Cybersecurity is usually viewed as something to be addressed via software. In recent years though we've seen a hardware element start to creep in -- Windows 11's requirement for TPM capability for example. → Read More

21 percent of government workers don't care if their organization is hacked

With 70 percent of government workers reporting that they work virtually at least some of the time, a new survey shows some worrying trends. → Read More

QuSecure pioneers quantum-resilient satellite link

Much of our modern communication relies on satellites, but the data sent between them and ground stations is vulnerable to theft, leaving satellite communications even more accessible than typical internet communications. → Read More

1Password introduces one-click login for enterprise users

Password service 1Password is launching a new service that will allow enterprise customers to unlock their 1Password accounts using third-party identity services. → Read More

New UK privacy laws aim to cut red tape for business

The UK's new Data Protection and Digital Information Bill is set to reduce costs and burdens for British businesses and charities, and remove barriers to international trade. → Read More

Economic uncertainty puts the focus onto cloud costs

This year marks the first time in more than a decade that managing cloud spend has overtaken security as the top challenge facing organizations, according to the latest State of the Cloud report from Flexera. → Read More

Weak passwords are still allowing attackers into networks

A new study from Specops Software finds that 88 percent of passwords used in successful attacks consisted of 12 characters or less, with the most common being just eight characters (24 percent). → Read More

Cloud adoption leaves regulated industries open to attack

Switching to the cloud has left organizations in heavily regulated industries like healthcare and financial services with a greater attack surface, according to a new report. → Read More

Tackling cloud costs and multicloud networking in a bad economy [Q&A]

It's become common for businesses to use more than one cloud, however, service providers have no incentive to offer unified management tools as they want to keep customers for themselves. → Read More

Free scanning service helps companies build an up-to-date SBOM

As developers increasingly rely on open source components in their projects, knowing which have been used is a key part of being able to identify updates and potential threats. This is where a software bill of materials (SBOM) is essential. → Read More

Financial services is the most impersonated industry in phishing attacks

Threat protection company Vade has released its latest Phishers' Favorites report for 2022 which finds that financial services is the most impersonated industry, accounting for 34 percent of phishing pages as attackers continue to follow the money. → Read More

Social engineering remains the top threat for enterprises

The latest Annual Trends Report from Jamf, based on a sample of 500,000 devices protected by the company's technology, looks at the threats impacting devices used in the modern workplace and finds social engineering tops the list. → Read More

Deploying at scale -- what does it mean and why does it matter? [Q&A]

One of the popular buzzwords in development circles in recent years has been 'deployment at scale'. Now, while it's nice to have a universally recognized term, opinions about what deployment at scale actually means tend to vary. → Read More