Connecting the world: the role of technology in providing humanitarian aid [Q&A]


When a crisis occurs, telecommunications infrastructure can be partially or entirely destroyed, severing the ties between crisis victims and the outside world, and in some cases disconnecting them entirely from their loved ones.
We underestimate the importance of technology until it is taken away, and providing connectivity to affected communities as quickly as possible in times of crisis is extremely important.
Ubuntu Pro becomes available on the AWS EC2 console


Ubuntu Pro is now available in a subscription-included model on Amazon Web Services (AWS), allowing users to launch Ubuntu Pro on-demand instances and purchase Ubuntu Pro Compute Savings Plans from the Amazon Elastic Compute Cloud (Amazon EC2) console.
Users will be able to run Ubuntu machines with expanded security maintenance, kernel live patch, and hardening scripts out of the box with all of these features enabled by default.
Smaller businesses are ready to embrace AI


According to a new report, 61 percent of SMBs expect their AI usage to increase in the next year, and younger groups are more likely to incorporate AI into regular tasks.
The study from DigitalOcean also finds that while 70 percent have used ChatGPT in some capacity, it's still in the early testing stages and only nine percent of companies have policies in place concerning its usage. 62 percent of those using ChatGPT say they are just testing it out, with 23 percent integrating it into regular tasks.
Meeting the challenges of the digital workspace [Q&A]


Remote and hybrid teams are increasingly adopting digital tools to get their jobs done. But while this strengthens productivity for workers it risks compromise to the business's security. In turn, this has exacerbated the need for additional layers of supervision and oversight.
Ungoverned connections leave businesses open to supply chain attacks, data breaches and more. We spoke to Astrix Security CEO and co-founder Alon Jackson to discuss these challenges and how to safely and securely manage the new digital workplace.
Cybersecurity teams are overconfident of their ability to deal with threats


A study from Immersive Labs finds that while businesses have high confidence in their overall resilience, teams are insufficiently prepared for threats.
The study, carried out by Forrester, surveyed 316 global cybersecurity training strategy decision-makers in the UK, US, Canada, Germany, and Sweden, finds that 82 percent agree they could have mitigated some to all of the damage of their most significant cyber incident in the last year if they were better prepared.
Why 5G/LTE network security needs a different approach [Q&A]


The continuing rollout of 5G offers faster mobile networking which will pave the way for new apps and devices connecting to the internet and to corporate networks.
Liron Ben-Horin VP of systems engineering at OneLayer argues that this world of faster connections and more devices will need a new approach to security. We spoke to him to find out more.
Deepfake fraud hits a third of businesses


Deepfake fraud is on the rise, with 37 percent of organizations experiencing voice fraud and 29 percent falling victim to deepfake videos, according to a survey by identity verification specialist Regula.
Fake biometric artifacts like deepfake voice or video are perceived as real threats by 80 percent of companies, with businesses in the USA most concerned, about 91 percent of organizations considering them to be a growing threat.
New community helps businesses to collaborate like scammers


Cybercriminals and fraudsters have long relied on a dark web community to exchange information on vulnerable businesses and individuals as well as trading fraud-as-a-service schemes.
In an effort to turn the tables, Sift is launching a new online community called 'Sifters' to allow its customers to learn from, interact with, and share information with each other, including on any emerging fraud threats they encounter.
Java retains its popularity in a changing landscape


The Java programming language dates back to 1996, released by Sun Microsystems as a way of developing multimedia applications in a portable and interactive way.
That Java is still immensely popular almost 30 years on suggests that it must have got something right. New Relic's 2023 State of the Java Ecosystem report takes an in-depth look at the use of one of the most popular programming languages.
Versa delivers zero trust access across the enterprise


Hybrid cloud and hybrid work have changed where and how we access systems, challenging organizations to find ways to secure the enterprise while delivering the best user experience.
While cloud-delivered Zero Trust Network Access (ZTNA) solutions are now widely adopted to secure remote work, they don't deliver the application performance and inline policy enforcement needed for workers at the office.
How analytics can boost the supply chain [Q&A]


Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.
We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.
Behavioral AI platform defends against multi-channel attacks


While email remains the most common path to target an organization, we're increasingly using other tools like Slack, Teams and Zoom too, so cybercriminals are steadily shifting their tactics and targeting these additional entry points across the enterprise.
AI-based email security platform Abnormal Security is launching a range of new additions to its product focused on expanding security detection for these collaboration tools.
86 percent of developers knowingly deploy vulnerable code


According to a new study, 86 percent of software developers and AppSec managers surveyed have or know someone who has knowingly deployed vulnerable code.
What's more the study from Checkmarx shows 88 percent of AppSec managers surveyed have experienced at least one breach in the last year as a direct result of vulnerable application code.
71 percent of businesses hit with insider attacks from malicious employees


Insider attacks including fraud, sabotage, and data theft, plague nearly three quarters (71 percent) of US businesses, according to Capterra's 2023 Insider Threats Survey.
Perhaps unsurprisingly companies that allow excessive data access are much more likely to report falling victim to insider attacks. However, only 57 percent of companies limit data appropriately while 31 percent allow employees access to more data than necessary and 12 percent allow employees access to all company data.
Integration is a top priority for enterprises


A new report finds that 71 percent of enterprises are actively planning to implement integration technology this year.
The study from enterprise integration platform as a service (iPaaS) company Digibee surveyed over 1,000 US and Canada-based CIOs, CTOs, developers, and enterprise architects, and finds integration strategies being hampered by technology that isn't cloud-native and lack the agility to respond quickly.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.