Latest Technology News

Compliance and cybersecurity in the age of AI [Q&A]

Artificial Intelligence is dramatically transforming the business landscape. It streamlines operations, provides critical insights, and empowers businesses to make data-driven decisions efficiently. Through machine learning, predictive analytics, and automation, AI assists in identifying trends, forecasting sales, and streamlining supply chains, leading to increased productivity and improved business outcomes. It isn't, unfortunately, without problems.

We talked to Matt Hillary, Vice President of Security and CISO at Drata, about the issues surrounding AI when it comes to critical security and compliance.

Continue reading

Framework launches upgraded Laptop 13 with Intel Core Ultra processors

Framework has unveiled the latest iteration of its Laptop 13, now equipped with Intel Core Ultra Series 1 processors, a high-resolution 2880x1920 120Hz display option, and a new 9.2MP webcam. The new webcam technology borrows techniques from modern smartphone cameras, delivering superior low-light performance and clearer audio with its upgraded microphones.

This year’s model marks the fourth generation of Framework Laptop 13 utilizing Intel processors, each iteration benefiting from significant performance enhancements. The latest Intel Core Ultra Series 1 processors offer substantial improvements in efficiency and battery life, notably during video playback. These processors support up to 96GB of DDR5 memory and feature a blend of 6 Performance and 8 Efficient cores, which elevate both productivity and gaming capabilities.

Continue reading

Unlocking cybersecurity success: The need for board and CISO alignment

The C-Suite’s perception of cybersecurity has evolved dramatically over the past decade. It’s gone from being an afterthought for technology departments to worry about, to a cornerstone for business survival and operational strategy. The heightened awareness of cybersecurity stems from a deeper grasp of the legal, reputational and financial implications of data breaches. This, combined with regulatory pressures such as the original NIS directive, has forced leaders to enhance their organizations’ cybersecurity measures.

The result is that 75 percent of organizations now report that cybersecurity is a high priority for their senior management team. While on the surface this should be celebrated, when digging deeper, conversations between CISOs and the wider C-Suite often just revolve around high-profile or user-centric security risks. More technical and advanced threats such as those related to application security are overlooked. The race to embrace AI and increasingly complicated cloud infrastructures have also made communicating cybersecurity priorities even more difficult for CISOs.

Continue reading

Out of the shadows and into the light: Embracing responsible AI practices amid bias and hallucinations

Artificial Intelligence AI

The path to widespread AI is a bumpy one. While its potential to enhance consumer experiences and streamline business operations through personalization, autonomy, and decentralized reasoning is evident, the technology comes with inherent risks.

AI can produce conclusions that aren’t true, spread misinformation and in some cases, perpetuate existing biases. This -- the darker side of AI’s impact -- can leave business leaders facing financial, legal, and reputational damage.

Continue reading

Balancing security and autonomy: Strategies for CISOs in the cloud era

Cloud data protection

Maintaining a secure cloud environment is one of the most important responsibilities of any CISO today, given that over 50 percent of all cyberattacks now originate in the cloud. However, this is a daunting task, as security must now be balanced against other priorities such as maintaining agile operations and the need to innovate.

Organizations today are racing to accelerate their cloud adoption due to the need for greater scalability and cost-efficiency. It has, therefore, become a critical business strategy to ensure efficiency, accessibility, and sustainability in operations. As a result, cloud investments are soaring across the board. Gartner predicts that end-user spending on public cloud services will reach $679 billion by the end of this year and exceed $1 trillion by 2027.

Continue reading

Google unveils Fitbit Ace LTE smartwatch for kids

In an era where parents grapple with balancing their children's independence with safety, Google steps in with a solution—the Fitbit Ace LTE. This new device is designed for kids aged 7 and older and marks Fitbit's latest foray into youth-oriented products. The Ace LTE is not just a tool for tracking physical activity but also a connected smartwatch that incorporates safety features such as reliable calling, messaging, and location sharing.

The Ace LTE aims to make physical activity enjoyable by merging exercise with digital play. It offers interactive 3D games that encourage kids to move more to unlock playtime. Utilizing the smartwatch's built-in features like haptics, sounds, and an accelerometer, these games create a captivating experience for young users. Kids can enjoy a variety of games, such as racing through space as a chicken in a bathtub or fishing at "Smokey Lake."

Continue reading

Tens of thousands of websites vulnerable to data breaches

Over 58,000 unique websites from around the world are vulnerable to data breaches and even complete takeovers according to new research.

The Cybernews research team has investigated publicly exposed environment files (.env) that should be kept private and protected at all costs. These files hold passwords, API keys, and other secrets that websites need to access databases, mail servers, payment processors, content management systems, and various other services.

Continue reading

Why cloud attacks no longer need malware [Q&A]

Cloud risk

As organizations have come to rely more on the cloud, it's become an increasingly attractive target for cybercriminals seeking to steal data or extract ransoms.

In the past this has involved the use of malware, but as attackers get more sophisticated there’s a move towards different types of attack. We spoke to Shai Morag, SVP and general manager cloud security at Tenable, to discover more about these threats and how to tackle them.

Continue reading

Logitech announces MeetUp 2: AI-powered conference camera

Logitech has revealed the upcoming release of MeetUp 2, an AI-enhanced USB conference camera tailored for bring-your-own-device (BYOD) and PC-based setups in huddle and small meeting rooms. Building on the success of its predecessor, the best-selling Logitech MeetUp that has reached over one million units sold, this new model is set to launch in August.

Henry Levak, VP of Product at Logitech B2B, highlights the camera's innovative features, "MeetUp 2 leverages AI with RightSight 2 to create dynamic views that engage remote users effectively, alongside RightSound 2 for advanced voice equalization and noise suppression." This next-generation device also allows IT teams to monitor and update the system remotely, continually enhancing its capabilities.

Continue reading

Microsoft brings Copilot to Telegram

Microsoft has brought its AI-powered Copilot chatbot to the Telegram messaging platform in beta. Designed to enhance user interaction, it leverages Microsoft's GPT models and Bing Search capabilities to provide a wide array of services. These include answering queries with quick facts, offering travel advice, updating sports scores, and giving movie recommendations. Users can interact with Copilot by typing natural language commands, similar to messaging a friend.

To access Copilot, Telegram users can either follow a direct link if they are already using the Telegram app or web platform, or search for @CopilotOfficialBot in Telegram's search bar. Currently in beta, Copilot is free for all users and is available across various operating systems including Windows, macOS, Android, and iOS, as well as via web browsers.

Continue reading

DDoS cyber-attack targeting Internet Archive and the Wayback Machine

Internet-Archive-Wayback-Machine

The DDoS cyber-attack currently targeting the Internet Archive and its Wayback Machine has entered its third day, causing intermittent disruptions in service. The nonprofit research library is best known for housing millions of historical documents, preserved websites, and media content.

The ongoing intrusion has involved the launch of tens of thousands of fake information requests per second, though the source of the attack remains unknown.

Continue reading

Microsoft Start Weather blows away the competition with AI-powered forecast accuracy

Microsoft Start Weather has been recognized as the “overall most accurate weather forecast provider globally” by ForecastWatch for the second consecutive year, relying on AI technology for enhanced forecasting accuracy.

This recognition followed an independent analysis involving 22 weather services, evaluated across 13 metrics throughout 2023. Microsoft Start Weather performed notably well in accuracy for predicting temperatures and cloud cover for short-term forecasts of 1-5 days.

Continue reading

Opera integrates Google Cloud’s Gemini models for enhanced browser AI

Opera has revealed a strategic partnership with Google Cloud to integrate Gemini models into its Aria browser AI, marking a significant advancement in browser technology. This collaboration will see the incorporation of Google's latest and most advanced large language model, Gemini, into Opera's Aria, which is powered by the multi-LLM Composer AI engine. This engine is uniquely capable of selecting the optimal model for different user tasks, enhancing performance and user experience.

The Gemini model is celebrated for its modern, powerful capabilities and user-friendly design, and its integration is expected to boost the accuracy and speed of information delivery to Opera users. "Our companies have been cooperating for more than 20 years, and we are excited to deepen this collaboration into the field of generative AI to further power our suite of browser AI services," said Per Wetterdal, EVP of Partnerships at Opera.

Continue reading

New Dashlane tool warns of compromised credentials

Credentials on sticky note

Leaked or stolen credentials remain a major cause of security breaches and reuse of passwords between accounts only compounds the problem.

Password manager company Dashlane is launching new automated tool to empower admins to proactively create a more security-conscious workforce and drive better credential security behavior across their organization, reducing the risk of credential theft.

Continue reading

90 percent of enterprises experience identity-related incidents

identity theft mask

A new study from the Identity Defined Security Alliance (IDSA) finds that 90 percent of organizations experienced an identity-related incident in the past year and 84 percent suffered a direct business impact as a result.

The survey of over 520 identity and security professionals from organizations with over 1,000 employees finds the most significant impact, seeing a measurable rise this year, is distracting from core business (52 percent).

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.