BetaNews Staff

GPU revolution: Harnessing the power of advanced technology through cloud delivery

Recent advancements in GPU (Graphics Processing Unit) technology, accompanied by new innovative use cases and increased user expectations have produced a profound impact on the industry. Together, they have driven the proliferation of new application architectures, fueling growth in artificial intelligence (AI), machine learning, and visual computing.

In this era of relentless innovation, the key to staying competitive lies in quickly meeting user expectations through cloud delivery. Its multiple advantages -- on-demand consumption, scalability, global availability, a safeguard against supply chain disruptions, and financial perks -- shape a compelling strategy for deploying GPU technology via the cloud.

Continue reading

What's in a name? How to navigate the crowded SASE marketplace

SASE, Secure Access Service Edge

According to Dell’Oro Group, there are more than 30 SASE vendors. That number is likely to go up consistently for the foreseeable future. Despite this growth, not all these providers are delivering the same basic foundational elements to customers. At best, these providers don’t realize that they’re not offering a true SASE solution, and at worst, they’re falsely advertising SASE capabilities to expand their customer bases.

For example, would a company that strictly sells bread say that they offer cakes? While bread and cakes do share some of the same ingredients and both end products require a baking process, it would be disingenuous for the bread company to say that it sells cakes. This is the issue we’re currently battling against in the quickly evolving SASE space.

Continue reading

Providing the legal sector with the deep visibility, security, and data monitoring they need to thrive

Cybercriminals frequently target the legal sector due to its extensive holdings of highly confidential, commercially sensitive, and often personal information. As a sector built on trust and reputation, this growing threat continues to disrupt and create havoc in business operations, underscoring the necessity for a deeper understanding of cyber threats and stronger cyber security measures within the legal industry.

A recent report from the National Cyber Security Centre (NCSC), published in early 2023, revealed that the UK has over 32,900 legal enterprises, encompassing barristers, solicitors, and other legal service providers. With an estimated total revenue of £43.9 billion and more than 320,000 people employed in the legal sector, it represents a large and lucrative target for cybercriminals.

Continue reading

Global Encryption Day: Protecting our first line of defense  

Data encryption

Today, Global Encryption Day 2023, marks the perfect opportunity to reflect on what has been a highly challenging year for the technology.

Encryption acts as a fundamental safeguard of data privacy, securing data both during transmission and while at rest. It often serves as a primary defense against hackers and is indispensable in preventing unauthorized access to sensitive information. With the risk of reputational damage and massive fines for those who are breached, it is essential for any organizations looking to ensure regulatory compliance.  

Continue reading

Why open banking holds the key to customer centricity

The proliferation of fintech platforms has prompted consumers to demand more from their banks. Historically, legacy industry resistance to securely sharing customer data with third parties has deprived banks of opportunities to engage customers and foster longer-term retention more deeply. Many incumbent banks felt an open banking structure threatened their business models. However, as banks shift their mindset and embrace open banking, it’s evident that the 'mainstreaming' of an open banking infrastructure benefits both banks and consumers through a larger marketplace of product options.

Consumers can use open banking by consenting to share their data with other providers securely and receive a more comprehensive range of product offerings and more personalized and efficient services -- all in one place.

Continue reading

Sleuthing for the threat of a Business Email Compromise

Malicious email

In this new era of generative artificial intelligence, one of the biggest security risks involves business email compromise attacks. Countless malicious phishing emails are already being cloned, refined, and delivered by smart AI bots around the world.

A business email compromise (BEC) is a sophisticated cybercrime that uses emails to trick the receiver into giving up funds, credentials, or proprietary information through social engineering and computer intrusion techniques. Many BEC attacks combine multi-channel elements to make the frauds seem more convincing, such as incorporating fake text messages, web links, or call center numbers into the mix with email payloads. For example, the attackers might spoof a legitimate business phone number to confirm fraudulent banking details with a victim.

Continue reading

Unmasking cybersecurity's hidden threats

security skull

The cybersecurity landscape is experiencing an unprecedented surge in vulnerabilities. In 2022 alone, a staggering 25,096 new vulnerabilities were added to the National Vulnerability Database (NVD). This number represents the highest count of vulnerabilities ever recorded within a single year and reflects a 25 percent increase compared to the 20,196 new vulnerabilities reported in 2021.

This escalating trend indicates that cybersecurity threats are not only on the rise but are also accelerating at an alarming pace. The reasons behind this surge in vulnerabilities are multifaceted, stemming from factors such as the increasing complexity of software and technology systems, the rapid pace of digital transformation, and the growing sophistication of cyber attackers.

Continue reading

DevOps, diversity, and the lens of intersectionality

IT professionals

One of the core principles of DevOps is to build a supportive culture, one based on collaboration and empathy. This is often overlooked in the rush to build, deploy and continuously run applications.

Empathic, collaborative environments equip DevOps teams to better understand the unique challenges they face as individuals, enhancing their ability to resolve issues together in a way that promotes a culture of blamelessness. This can help pave the route to a greater sense of psychological safety (the belief that you’re safe to take interpersonal risks, such as sharing ideas or soliciting feedback).

Continue reading

Eight ways to bolster your cybersecurity resources without blowing your budget

IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a Data Breach Report 2023 UK organizations shell out an average of £3.4m for data breach incidents. There isn't a CISO around that doesn't wish they had that kind of budget to spend on IT security. The tools to help security teams do their job more effectively are out there, but getting them approved in the annual budget is not guaranteed and investment can sometimes be too late.

So what can UK IT leaders do to make sure they continue to improve their IT security without blowing their budget? Here are eight ways to bolster cybersecurity resources: 

Continue reading

Your 'personal' personal information

Let’s talk about the personal information that belongs to you, your personal personal information. What is your level of tolerance for the amount of data collected about you? Are you willing to provide your email to get a 15 percent discount? What if it’s 50 percent? What if it’s your phone number, too? These are all questions that we are faced with almost everyday and everyone has a different opinion.

One of the biggest problems is knowing what you are signing up for, and what personal information may have already been obtained. When you first visit a site, cookies and other technologies can automatically collect your IP address, set trackers, and more. Once you enter your personal information into other places, you may unwittingly allow yourself to receive direct marketing, allow the business to sell your information, or allow it to be shared with others for purposes you were not anticipating. 

Continue reading

Microsoft data leaks and the importance of open-source intelligence

Microsoft logo on glass building

Interconnected digital technology advances at a rapid pace, and so do the tactics and strategies employed by malicious individuals, criminal groups, and even nation-states. The World Economic Forum predicts global cybercrime will reach $10.5 trillion by 2025, forcing businesses and governments to look for next-generation solutions against emerging digital threats.

Unfortunately, deliberate criminal activity is only part of the challenge in this data-driven era. Costly leaks of sensitive data might happen due to simple human errors -- in September, Microsoft’s data was leaked two times, not only disclosing the company’s plans for the next-gen Xbox but also exposing private employee data. As we already know, at least one of these events happened due to an accidentally misconfigured URL link.

Continue reading

Mastering cloud cost optimization: Strategies for efficiency and resiliency

Cloud dollars

In an era driven by digital transformation, cloud computing has emerged as a game-changer for businesses of all sizes. However, as cloud adoption continues to soar, so does the need to manage cloud costs effectively. Balancing cost reduction with maintaining and increasing resiliency has become a top priority for businesses seeking to maximize the benefits of the cloud.

The need to optimize is evident, but achieving this goal can be complicated. Without appropriate cost containment and governance strategies, organizations risk falling into a continuous climb spend pattern. Often, businesses address cost optimization as a sporadic, reactive exercise -- like making annual bulk purchases of reserved instances. To break free from this cycle and achieve sustained cost efficiency, a shift towards a collaborative, ongoing and iterative approach to cost optimization and management is a key priority.

Continue reading

Cybersecurity Awareness Month: Another year of challenging the 'inevitable'

2023

Cybersecurity Awareness Month does precisely what its name suggests. It serves as a reminder of the sector's importance for businesses and consumers across the globe.  

As we look back on yet another year where threats have continued to evolve, and the task at hand seems greater than ever -- it's important to take cognizance of the cyber-dangers out there and recognize our roles in the fight against 'hackers'. 

Continue reading

Artificial intelligence is amazing -- but it won't integrate with your company on its own, you need a strategy

The enormous wave of public interest in AI is undoubtedly caused by how the results of machine learning were turned into a product bundle in the form of ChatGPT. A layman might come to the conclusion that artificial intelligence came out of the blue in 2022. Its success, however, lies in astronomically high investments in infrastructure and countless hours of human and machine labor at OpenAI. How can you make use of the currently available models in your company?

The more technical crowds have been talking about AI since the fifties, but it was first a mathematical concept -- this is where we get the famous Turing test from. Thanks to brilliant scientific work, research investments, and mass adoption of computer technology in the nineties, we are now experiencing what authors in the past used to write sci-fi novels about. One could think that AI is just a software achievement. However, advancements in miniaturization, increases in computing power, and reductions in the costs of obtaining hardware play a big role too. What would’ve cost hundreds of billions of dollars back in the day now sets you back "just" a couple of millions.

Continue reading

AI's future success depends on the success of its integration 

Artificial-intelligence

While AI is taking the workplace by storm, this technology -- especially the AI-enabled smart and automated platform tools -- will not replace the role of employees in the workplace. Instead, AI will become more integrated into everyday workflows as a way to help employees do their jobs more effectively.

For example, generative AI is emerging as a tool that can help with content creation, such as sales pitches, email newsletters and, memos. In applications like this, the technology is already helping to provide users with a better day-to-day and overall experience, which positively contributes to adoption. This in turn has a direct impact on technology investment ROI at scale. 

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.