BetaNews Staff

Cybersecurity in the utility space isn't just about keeping the lights on, it's about saving lives.

Russia’s invasion of Ukraine in February 2022 signaled many things to the Western world, but perhaps one of the biggest warnings was how precarious energy security really was as oil and gas prices skyrocketed following the start of the war.

As Europe entered winter and the demand for energy increased, it highlighted just how vicious the cycle can be as cyber attacks on critical infrastructure and operation technology increased.

Continue reading

Exposed: Understanding the threat of digital spying & stalkerware

Stalker

The global market for commercial spyware is currently estimated at around $12 billion, which over the last 10 years has seen 80 countries purchase the technology. Spyware is used for a range of purposes, allowing operators to gain remote access to devices from across the world. Once a device becomes infected, the perpetrator gains complete control of the device, which can mean unfettered access to messages, audio calls, photos, and remote access to cameras and microphones.

What’s worrying is spyware is becoming accessible even to users lacking advanced tech skills. Cheaper, more rudimentary forms of spyware like stalkerware exist. Stalkerware can be particularly intrusive and abusive as it must be physically installed, meaning attackers need direct access to which ever device they try to infiltrate. In this article, we will expose the threat from digital spying and stalking, and how to maximize protection.

Continue reading

The biggest impediments to user adoption of enterprise technology

Workplace

An investment in enterprise technology can’t truly be deemed a success unless the organization achieves successful user adoption. While there are key best practices that can steer organizations towards successful adoption, there are also several impediments along the way. Here we’ll explore the impediments and how to overcome them.

The #1 impediment to successful user adoption is having a tech-focused mindset. Oftentimes, a customer will think to themselves: "OK, all the various bits of the tech are working. The project is on time and on budget. Let's roll this stuff out organization-wide, offer a bit of training, and people should love it and adopt it to solve their problems."

Continue reading

Transforming talent acquisition: An introduction to predictive analytics in recruitment

Recruitment

In the age of data, recruitment is undergoing a seismic shift. Predictive analytics is at the forefront of this revolution, supporting talent acquisition with data-driven insights while facilitating more precise decision-making than ever before. But what is predictive analytics and how exactly can it enhance your recruitment processes?

Predictive analytics (PA), simply put, uses historical data to forecast future outcomes. In recruitment, predictive analytics is like having a crystal ball that provides insights into hiring lead times, future employment needs, potential employee performance, and retention rates.

Continue reading

Digital accessibility: Supporting a culture of continuous improvement

Online Shopping

In spite of all the attention and welcomed awareness digital accessibility has received in recent years, lawsuits filed against companies who are not attentive to this issue show no signs of abating. In fact, the number of suits brought to federal court citing the Americans with Disabilities Act (ADA) reached a new record in 2022 (and this is just the number of cases that were involved in litigation -- the actual number of ADA demand letters was likely much higher).

Throughout 2022, several high-profile household brand names were the target of legal actions, including the Gap, Zola, Barnes & Noble and Goop. In fact, e-commerce companies remain the biggest risk for digital accessibility lawsuits, amounting to 77 percent of cases according to UsableNet. Almost 20 percent of the top 500 e-commerce websites received accessibility complaints in 2022; however, there is an interesting trend of accessibility lawsuits against smaller e-commerce companies (less than $50 million per year) which is on the rise

Continue reading

Understand how Cyber Threat Intelligence can best leverage the capabilities of network detection and response

Intelligence is now considered essential to the process of identifying, understanding and acting upon threats. According to the "Global Perspectives on Threat Intelligence" study conducted by Mandiant, 96 percent of decision-makers interviewed for the research believe that it is important to understand which cyber threat actors could be targeting their organization. Consequently, threat Intelligence should be fully integrated into the internal mechanisms linked to threat detection and response. 

Before detailing how intelligence can be integrated into defense tools, it is necessary to talk about the nature of intelligence, the complexity of collecting it, and how to curate, qualify and act on it in the most efficient way. Intelligence effectiveness depends on the contextualization of the elements collected in relation to a business’s specific environment. Once the qualified information is available and translated into specific formats and languages, it can then be used appropriately in detection tools, such as network detection probes, SIEMs, EDRs, etc. 

Continue reading

Tackling patchwork IT: Key strategies MSPs can use to streamline solutions


The traditional office has undergone a significant transformation in recent years. The COVID-19 pandemic pushed companies to adopt technologies to facilitate remote work and collaboration. Gone are the days of a centralized, physical workspace and the four walls that defined it. But, this rapid transition has given rise to a new challenge: the emergence of a patchwork of solutions.

A patchwork of solutions refers to when a company uses various technologies or software solutions. Often these solutions don’t work together seamlessly or efficiently. In a recent report from SoftwareOne, 78 percent of IT leaders agree that patchwork systems make it harder to achieve business goals.

Continue reading

Creating digital workplaces with IT, AI and IoT

AI-workspace

Due to the many advances and new developments in technology, the way in which businesses are communicating is changing. Technology holds a central role in reshaping how employees work, interact and engage with others. This is helping to create digital workplaces, where emerging technologies like Artificial Intelligence (AI) and the Internet of Things (IoT) are powering organizations to utilize data and increase access to information.  

While technology such as AI and automation have been in existence for some time, the speed and rate of adoption across the business landscape is gathering pace as a means to digitize workplace settings. Currently, 15 percent of all UK businesses have adopted at least one AI technology, with the IT and telecommunications sector leading the way with the highest rate of adoption at 29.5 percent. But what features and technologies matter most to end users and how is this evolving across the digital workplace?

Continue reading

How freelancers can save time with ChatGPT

As a freelancer, your most valuable resource is time. With the gig economy and your workload always changing, you must find new ways to stay productive. That’s where ChatGPT comes in.

ChatGPT can help freelancers save hours every week by automating tasks, such as generating new content ideas and topics, writing code for apps and plugins, and even putting together personalized client proposals. The following guide will investigate how freelancers and professionals can use ChatGPT (and ChatGPT-adjacent tools) to be more productive and time-efficient.

Continue reading

How to enhance integrations for better security outcomes

Whether security leaders oversee a small security team or an enterprise-scale team spread over numerous security operations centers (SOCs), building and maintaining integrations with other tools in the tech stack can be difficult and time-consuming.

The average business integrates approximately 75 different security products and often multiple public, and private cloud services into its technology stacks. Many dynamic factors are at play with integrations, from versioning and version control to the constant evolution of Application Program Interfaces (APIs).

Continue reading

AI ethics and innovation for product development

AI

AI ethics are a factor in responsible product development, innovation, company growth, and customer satisfaction. However, the review cycles to assess ethical standards in an environment of rapid innovation creates friction among teams. Companies often err on getting their latest AI product in front of customers to get early feedback.

But what if that feedback is so great and users want more? Now.

Continue reading

Dealing with data: What to do and where to store it

data storage

Today’s digitally-enabled organizations generate huge volumes of data that needs to be stored, maintained, and accessed. Indeed, it’s been estimated that globally, around 2.5 quintillion bytes of data is created every day. A figure that is escalating at a rapid rate as enterprises pursue big data analytics and IoT projects.

Added to which, the rising use of video, rich imaging, and AI applications means that much of this data is 'unstructured'. So much so that according to IDC as much as 80 percent of the world’s data will be unstructured by 2025. All of which adds further complexities into the equation when it comes to storing and preserving data so that it is accessible and available for analysis.

Continue reading

Reality check: Time for rugged devices to get a security upgrade!

Zebra-TC7X

Let’s face it, the world is moving at an unprecedented pace. It has become imperative for all industries to evolve and adapt to the digital transformation wave. As the reliance on technology and devices to improve communication and collaboration in the industrial sector increases, mobile devices have been undergoing unbelievable transformations. One such device that is in the spotlight is the rugged handheld devices that are predominantly found in the supply chain, logistics and construction sectors.

For those who were of the notion that handheld devices are just rugged, tough hardware, it is worth taking the time to look at reports that suggest these devices are expected to witness a growth of $1.85bn in the next three years. The digits in billions indicate that it is no longer about having devices that can tough it out at extreme conditions but about revolutionizing a product to suit the dynamic working conditions and to not fade away in the digital transformation wave.

Continue reading

Is the future unified SASE?

SASE, Secure Access Service Edge

Many organizations going through digital transformation are running into roadblocks as their networks become larger and more complex; with approximately 70 percent of companies failing to complete their digital transformation successfully.

The Secure Access Services Edge (SASE) framework has emerged as one of the most effective solutions for getting firms back on track. SASE solutions combine the Network as a Service (NaaS) component and Security as a Service (SaaS) component into a single cohesive solution.

Continue reading

Data: The once coveted resource that has become tricky to extract value from

Data Stream

Traditionally, oil has been the metaphor of choice when discussing the value of data. Like oil, data has been considered a coveted resource that governs the modern world. This is why organizations around the globe preserve vast stores of data even when it has no immediate value. Companies hold onto the asset with the belief that they will call upon it at some point in the future.

But alas, this comparison has become a poor fit in recent times. Data has become risky, expensive to store, hard to extract value from, and a desirable target for adversaries. More businesses are now realizing that data banks bear more in common with the valuable, although hard to extract value from, and dangerous, uranium.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.