Why unlocking the full potential of your cybersecurity investment isn't just about the tech [Q&A]


For enterprises, making the right cyber security investment isn't just about selecting the most advanced technology. To truly get the best return, decision-makers must also consider the strategic and financial aspects of their choices.
We spoke to Ben Vaughan, chief commercial officer at Bridewell, to discuss how by engaging with the right teams, businesses can ensure their security solutions are not only technically sound but also aligned with their long-term financial goals and sustainable growth.
Google makes it easier to find apps with widgets


A well-designed widget can really enhance an app, helping to make it even more useful; equally, a crappy widget (or a lack of widgets) can completely ruin an otherwise perfect app. Widgets are important, and Google is finally recognizing that fact.
The company is making it easier to find Android apps that include widgets. As well as introducing a new badge to highlight widget-wielding apps in Google Play, Google is also adding the option to search specifically for apps with widgets. But it doesn't end there.
Microsoft adds incredible audio and video file conversion tools to PowerToys v0.89.0


As promised recently, Microsoft has released PowerToys v0.89.0 complete with new features. While there are no brand-new modules this time around, exiting utilities have been given amazing new capabilities, not least of which is Advanced Paste.
While you might think of copying and pasting as being related to text and images, the PowerToys development team has applied it to media files. What does this mean? It means the arrival of easy-to-use media transcoding so you can covert audio and video files into different formats. This PowerToys release also has exciting hints of what is to come.
Inside a cyberattack: How hackers steal data


The truth about cybersecurity is that it’s almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry becomes increasingly sophisticated and their technology more advanced.
Once a hacker has broken through an organization’s defenses, it is relatively easy to move within the network and access information without being detected for days, and even months. This is a significant concern for Banking and Financial Services organizations, which house valuable sensitive and Personally Identifiable Information (PII). The goal of cybersecurity is to minimize the risk and the impact of a breach. Understanding the adversary’s mindset and activity is central to this.
ExpressVPN finally brings GUI to its Linux app


ExpressVPN has rolled out a much-needed update for Linux users, finally adding a graphical user interface (GUI) to its VPN app. Yes, folks, a GUI for Linux is only being rolled out in 2025! Better late than never, I suppose.
Until now, ExpressVPN users in Linux were stuck with a command-line interface (CLI), while Windows and macOS users enjoyed a more user-friendly experience. This update brings ExpressVPN more in line with competitors like Surfshark, which has long offered a Linux app with a GUI.
Apple launches new iPad Air with M3 chip, AI features, and updated Magic Keyboard


Despite owning a fancy iPhone 16 Pro Max, I also have an iPad Air. Why? Well, even though my iPhone has a pretty big screen, sometimes I just want even bigger. Plus, I can use it when my iPhone is charging.
Why didn’t I go with an iPad Pro? Quite simply, Apple’s Pro tablets are too expensive for what I mostly use them for -- media consumption. Hell, I don’t need an expensive iPad Pro for watching TikTok on the toilet.
Enterprises struggle to balance data retention costs with compliance


A new survey of 300 IT and security professionals, commissioned by Red Canary and conducted by Censuswide, finds that just 35 percent of data stored in legacy SIEMs delivers tangible value for threat detection.
In addition, only 13 percent of organizations separate out low value data for cheaper storage in a raw data repository. Due to SIEM storage costs, 68 percent of IT security decision makers say they discard low value data and have to hope they won't regret it.
Over half of organizations experience incidents involving industrial control or operational tech


Over the past year, more than 50 percent of organizations have experienced at least one security incident involving ICS/OT systems. Among the top vulnerabilities exploited are internet-accessible devices (33 percent) and transient devices (27 percent), often used to bypass traditional defenses.
A new report from the SANS Institute, in partnership with OPSWAT, shows that while 55 percent of organizations reported increased ICS/OT cybersecurity budgets over the past two years, much of that investment remains heavily skewed toward technology, with limited focus on operational resilience.
78 percent of CISOs say AI-powered threats have a significant impact


New research from Darktrace finds that 78 percent of CISOs say that AI-powered threats are having a significant impact on their organizations, a five percent increase from 2024.
There's more confidence about dealing with them though, more than 60 percent now say that they are adequately prepared to defend against these threats, an increase of nearly 15 percent year-on-year.
ecobee Smart Thermostat Essential now available


Back in January, we told you about the all-new Smart Thermostat Essential from ecobee. Is it an innovative product? Not at all. However, this new thermostat doesn’t need to break new ground. Instead, it aims to offer a reliable experience at an affordable price. Quite frankly, that’s really all a homeowner wants from a thermostat these days.
ecobee promised the Smart Thermostat Essential would hit stores in March, and wouldn’t you know it, we are now in March. And so, staying true to its word, the affordable thermostat can be purchased immediately.
60 percent of healthcare organizations unprotected against a second major data breach


Inconsistent adoption of DMARC standards is leaving 60 percent of US healthcare organizations that have already reported breaches exposed to a second attack.
The study from Red Sift looks at breaches reported to the US Department of Health and Human Services (HHS) during 2023-2024 shows that of 101 companies analyzed, 61 percent remain unprotected, with 33 having no DMARC policy and 28 lacking any data on DMARC.
New solution provides visibility into certificates


Certificates are an important part of security for organizations but they're not without risks. These include certificates with long lifespans (one in every 13 certificates have lifespans over two years), certificates without key usage (one in every 25 certificates), certificates with negative serial numbers (one in every 27 certificates), and unsanctioned domain usage.
Keyfactor is launching a Command Risk Intelligence which will visibility into every certificate in use and helps teams proactively identify and mitigate certificate-related risks before they disrupt business operations.
What happens when data observability meets unstructured data? [Q&A]


In DevOps and IT circles, the word 'observability' has been bandied about for the past few years. Observability is one of those hot and trendy terms which also means different things to different people.
Yet the goal is generally the same: how can we observe our environment and then proactively and even automatically make fixes to things that aren't working, are anomalous, suspicious and/or could potentially cause a disastrous outcome? Such outcomes could include a network failure, a security breach, a server reaching capacity, or in the unstructured data management world -- something else entirely.
Xiaomi 15 smartphones and Pad 7 tablets are here


Today, Xiaomi introduces its latest flagship devices -- the Xiaomi 15 Ultra and Xiaomi Pad 7 Pro. The lineup also includes the Xiaomi 15 smartphone and Xiaomi Pad 7. Yes, there are Pro and non-Pro variants of both the smartphone and tablet.
Xiaomi says the 15 Ultra is designed with photography in mind, featuring a quad-camera system developed with Leica. The main camera includes a 1-inch 50MP Sony LYT-900 sensor with a variable ƒ/1.63-ƒ/4.0 aperture for improved light control and depth of field. It also uses a Leica Summilux optical lens with an 8P aspherical high-transmittance design and dual anti-reflection coating to reduce glare.
Datacolor LightColor Meter brings Bluetooth precision to photographers and filmmakers


If you are a photographer or videographer, you know just how important lighting is. You can have fancy high-end cameras, but if your lighting sucks, the end result can really suffer. Wouldn’t it be cool to scientifically monitor lighting rather than trust your gut?
Well, if you like that idea, I have great news. You see, Datacolor has launched a really cool new product called “LightColor Meter.” This diminutive device is designed to measure both light intensity and color temperature.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.