BetaNews Staff

Protect cloud-native data with cloud-native backup and recovery software

Cloud recovery

Cloud-native applications are rapidly being deployed in full production. To manage cloud-native data, organizations are turning to Kubernetes-friendly storage platforms.

However, with these apps supporting real-world use cases, organizations need to plan beyond general data storage by deploying cloud-native backup and recovery software to protect these key applications and their data.

Continue reading

Building better resiliency: Why DRaaS and BaaS?

disaster plan

As cases of ransomware continue to proliferate the news, many CEOs are approaching their CTOs and CSOs, asking, "What should we be doing?" When it comes to ransomware threats, it’s not if an attack will happen, but when -- and when again.

Proper threat mitigation for your business involves a two-pronged approach: preventative and restorative efforts. But far too often businesses are prioritizing their preventative measures instead of giving adequate attention to the restorative side of the equation -- which ransomware cybercriminals exploit. For example, in a recent Pulse Study on IT executives’ perceptions of managed resiliency, 32 percent of respondents claimed to favor preventative measures over restorative measures.

Continue reading

Five ways 5G will impact hotels with the rise of the contactless era

5G circuit board

Companies operating in the hotel and hospitality industry face strong competition from rivals when attempting to attract customers. The past 18 months have been difficult for the industry as well as the country as a whole. In the wake of the COVID-19 pandemic, the population is beginning to travel more extensively again, presenting an excellent opportunity to stimulate interest in a particular hotel destination.

The features and amenities a hotel offers can be the difference between serving satisfied guests who will happily return and disgruntled customers who are already looking for an alternative for their next trip. One of the features that a majority of travelers expect is connectivity for their mobile devices. Hotels that do not offer robust connectivity will not live up to the expectations of the majority of their customers.

Continue reading

How to finally meet your cost objectives in the cloud

Cloud dollars

Migrating to the cloud offers many benefits for an organization, including  increased efficiency, security and stability for many technology functions. But once an organization has made the move to the cloud, it’s critical to keep a close eye on ongoing costs. According to a recent Pulse/InterVision study, 92 percent of technology leaders and executives say their organizations expect technology teams to operate with a cloud-first approach, but 45 percent were either unsure about or not meeting their cost objectives in the cloud.

Skepticism towards the cloud will only continue to increase if costs cannot be controlled. To avoid this unfortunate trend, businesses should have certain tools in their arsenals like AWS and a trusted strategic service provider.

Continue reading

Parallels Desktop 17 for Mac is here with support for Windows 11 and macOS Monterey

Virtualization software Parallels Desktop 17 for Mac is now available, and the latest update brings with it a host of important changes and additions. Among the highlights of the latest version is full support for not only Windows 11, but also macOS Monterey. Both of these operating systems have yet to be released, but Parallels is ready for them, meaning eager testers can get on and try them out.

Parallels Desktop 17 for Mac also boasts support for Apple's M1 chip as well as more traditional Intel-based platforms. The update also sees huge performance improvements with an improved gaming experience and better USB support.

Continue reading

Launching a new product in an existing market: What you need to know

No matter the timeline, no matter the market, launching a new product is never easy. Even the most innovative companies look for ways around the challenges that they face when developing and introducing new products. If you’re launching a new product in an existing market, it’s tempting to rely on your existing code and infrastructure. Building on existing projects, though, might have unforeseen drawbacks.

There are two significant factors that can hamstring innovation and creation. First, building toward an audience of existing customers can mire new thinking and possibilities. Second, using a code base from an existing product can close doors that designers didn’t know existed in the first place. If you rely on existing products, development of your new project could be slowed to a crawl, as the old or existing code can stifle the flexibility needed for the new product and limit creativity.

Continue reading

Is AI actually you?

This seems like a great time to ask this question, as it might not matter soon. With the direction things are heading, we may soon arrive at an intersection where the blurring of identity reality and identity fiction is so extreme that we’ll simply stop asking what is authentic personhood. 

Case in point, a story out of Paris in July outlines not a dystopian future, but a troubling present reality. The piece recounts the story of computer-generated YouTube storytime videos. The genre is pretty much what it sounds like:

Continue reading

Tackling the cyber threat to manufacturing businesses

Ransomware skull

The manufacturing industry has become a major target for ransomware attacks. The reason is simple: if criminals can cripple the operational technology that controls the manufacturing plant, a company will rapidly come to its knees. With no product to sell, any company will fear for its existence -- and with that fear, the criminals believe any manufacturing company will be more likely to pay a sizable ransom to stay in business. Sophisticated cyber criminals understand this. They choose and research their targets and set their ransom to the maximum amount they believe the company can afford to pay.

For many years, the manufacturing industry didn’t worry about cyber threats. Its operational technology (OT) was air-gapped from outside interference, and was therefore safe from external compromise. This is no longer true. The advent of the fourth industrial revolution -- otherwise known as business digitisation -- has eroded that airgap. IT and OT are now totally interdependent. Bringing down a manufacturing company’s IT will almost certainly have a knock-on effect against its OT.

Continue reading

Cybersecurity in the new hybrid workplace

Remote working

As more organizations begin to establish plans to return to the physical office, the majority of employees are still expecting to conduct their work in a hybrid environment post-pandemic. Many businesses are navigating what this means for their infrastructure as a hybrid environment brings its own set of challenges for cybersecurity.

At the start of the pandemic, as physical offices closed and employees were sent to work from home, businesses were forced to immediately adapt their infrastructure and security measures. No longer were employees working from desktop computers behind a firewall in the office. Instead, many were on brand new laptops that were purchased at the last minute and deployed with an immature security posture. With an impending hybrid work environment, organizations are starting to evaluate their temporary security measures in lieu of more permanent controls better suited for the organization.

Continue reading

The Olympic Cyber Defense Games: How the Tokyo Olympic Games will fare keeping cyber attacks at bay while the world watches

Thanks to the COVID-19 pandemic, the whole world watched as the International Olympic Committee (IOC) postponed the Tokyo Olympics in 2020. Fast forward a year later and the change in sentiment -- from excitement to weariness -- is palpable in Japan and the rest of the globe. In fact, over 70 percent of the country wanted the IOC to cancel the games outright. And a resurgence of COVID cases throughout the country effectively cripples Japan’s ability to create revenue streams through international tourism and event attendance, resulting in an inevitable hit to its economy. But the IOC insists on pushing forward as the Olympic Games is a symbol of unity and resilience. 

Like the IOC, however, cybercriminals will charge ahead too in their own race to potentially disrupt the Olympic games. Ultimately, it isn’t a matter of "if" they’ll succeed in doing so, but "when" and how much damage will it cause. It takes a collective of lawmakers, government officials, security and IT teams assigned to maintaining the games’ online infrastructure to ensure that proper measures are in place to deter any cyber attacks and disruptions long enough for proceedings to cross the finish line. What sorts of threats does the Tokyo Olympics face; where will those threats stem from; and can previous history lessons effectively inform present day defense tactics?

Continue reading

How security teams can manage data protection post Brexit

EU and UK data-driven businesses no doubt breathed a sigh of relief with the EU recently approving the continued flow of data between the EU and UK.

But the news is just one hurdle as Cyber Security Officers (CSOs) and information security teams both in mainland Europe and the UK consider challenges that lie ahead and prepare to flex as necessary in a new era in data management. Now more than ever, it is the security leaders that work collaboratively with legal and data counterparts who will conquer.

Continue reading

Building a 'sticky' app, and why it matters

It is instantly clear to anyone who casts an inquiring eye over the digital landscape that mobile apps are the single most ascendant platform, and therefore afford businesses and content producers with the greatest opportunity. Anyone looking to establish a full digital suite to engage users or market their product would be remiss to overlook the efficacy of their application; and yet many apps are unintuitive, tricky to use, or bloated with confusing user interfaces (UI) or too many ideas.

The benefits of a great app are well-established. When compared with traditional customer management and communications platforms such as email, an application offers a far more engaged and purposeful experience -- the so-called 'captive audience' effect. Equally, the ability to maneuver away from volatile and unpredictable social media platforms, many of which increasingly require substantive investment in ongoing market campaigns to cut through to users, can be both lucrative in cost-savings and of significant brand value.

Continue reading

Avoiding the big bang data migration

Data migrations are by their very nature high risk initiatives and, if not planned effectively, they can create a significant headache for both the IT team and the organization. That’s because modern technology transfers are massively complex undertakings. However, data migration problems can often be traced back to confusion and disorganization surrounding the migration plan (if one is in place) and a failure to adequately prepare for the move.

Additionally, every company’s data landscape is unique. It may encompass everything from legacy systems to homegrown one-off databases, each with its own level of support. Documentation may be non-existent, institutional knowledge may be limited, and key staff may have left. This makes the task much more complex to undertake.

Continue reading

What does the Edge mean for IoT?

A lot has been written about the IoT revolution and how the technology has the capability to revolutionize industries, transform productivity and unlock new levels of insight. But for those intrigued by the possibilities and looking to dip their toe in the water, the potential myths of high price point, infrastructure and connectivity challenges, as well as the required skill set can be significant hurdles that seem insurmountable.

In addition, especially when it comes to the reality of industrial IoT, the cost, time and disruption that goes into a brand new facility -- the prospect of having to rip and replace new infrastructure to support IoT just isn’t a viable option for many businesses. So what’s the alternative? In this article I'll explain how edge IoT and analytics can provide a powerful mechanism for translating complex data sources into a streamlined, lower cost platform with faster return on investment and higher value. First, let's consider some of the key challenges businesses face when considering an investment in IoT.

Continue reading

Is detection of ransomware the key solution for small business rather mitigation?

ransomware laptop

According to Checkpoint Research, ransomware attacks have surged significantly, hitting a double-digit increase of 93 percent year-on-year. As of June 2021, the number of organizations impacted by ransomware has risen to 1,210. This exponential rise is also attributable to the migration to remote work globally. The amount paid by victims of these attacks has increased by almost 300 percent in 2020 alone

These staggering statistics paint a grim picture of the security threat that companies face. As early as July 2021, as many as 1,500 businesses world-wide have been affected by ransomware attack -- REvil. The group has reportedly used Kaseya IT software as backbone for this notorious attack. Around $70 million dollars were demanded from the affected companies to restore business data. The companies that majorly came under the radar were supermarkets, IT companies -- primarily small to medium sized, schools and kindergartens

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.