CISOs turn to generative AI to cover skills gaps

AI security

A new report finds 86 percent CISOs are turning to generative AI in order to alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic.

The study from Splunk shows 35 percent are using generative AI for positive security applications and 61 percent say they will likely use it within the next 12 months. On the other side of the coin 70 percent believe that generative AI could give cyber adversaries more opportunities to commit attacks

Continue reading

Microsoft already has some major improvements planned for Windows Copilot including UI upgrade

Copilot

Windows 11 users in many parts of the world are now able to access Windows Copilot -- although, notably, not in the EU (privacy law, natch).

Much has been made of Microsoft's AI-powered assistant, and while it is still early days for the ChatGPT-based tool, Microsoft is already working on significant interface changes. The focus is on making Windows Copilot more customizable rather than forcing a one-size-fits-all design onto everyone.

Continue reading

Businesses struggle with IoT device connectivity

Wireless internet of things

A new report finds that IoT success is being jeopardized with just one percent of respondents achieving better than 98 percent connectivity levels on average across their devices.

The study, by connectivity solutions specialist Eseye, shows that only 16 percent of respondents are achieving more than 95 percent connectivity. Mission-critical IoT devices -- medical equipment for example -- require near-100 percent connectivity and the fact that companies are prepared to accept poor performance is concerning.

Continue reading

Logitech G and Lucasfilm celebrate Return of the Jedi 40th Anniversary with Star Wars-themed gaming gear

In a galaxy not so far away, Logitech G and Lucasfilm Ltd. have joined forces to launch a special edition Return of the Jedi themed collection, marking the 40th anniversary of the cinematic masterpiece. This collection is more than a nod to the Star Wars legacy; it's a tribute designed to take your gaming experience to a galaxy far, far away.

The collection rolls out with the fan-favorite G502 X Plus, now reimagined as the G502 X PLUS Millennium Falcon Edition Gaming Mouse, accompanied by the G840 XL Cloth Gaming Mouse Pad available in Battle of Endor and Darth Vader Editions. It’s the kind of gear that makes you want to queue up the classic John Williams score as you game on.

Continue reading

Kingston unveils striking redesign of FURY DDR4 memory

Kingston today announced a refreshing new look for its FURY DDR4 memory. Kristy Ernt, the DRAM business manager at Kingston, expressed her excitement stating, “We’re happy to now offer users these new modules with heat spreaders specifically designed with the Kingston FURY brand identity in mind.”

The newly redesigned Kingston FURY Renegade DDR4 memory modules come with eye-catching two-tone black heat spreaders, which serve a dual purpose. Besides adding a dash of aesthetic appeal to your build, they work to dissipate heat during intense work or gaming sessions ensuring optimal performance is maintained. The memory doesn’t just stop at looks; it boasts speeds soaring up to a blistering 5333MT/s, making it a go-to choice for power users.

Continue reading

Seven steps to successfully migrate your enterprise data to the cloud

Storage

Amidst a challenging economic climate many businesses are unsurprisingly reviewing their spending, with research from the Institute of Directors finding most businesses are unlikely to increase investment over the next 12 months.

One area currently bucking this trend is the cloud. Research shows almost half of tech and business leaders are increasing investment in cloud-based products and services, and a third of them plan to migrate their legacy enterprise software and on-premises workloads to the cloud.

Continue reading

Cybersecurity best practice? No thanks, we're British

New research to coincide with Cybersecurity Awareness Month finds that 34 percent of Brits admit that they have given up following cybersecurity best practice because it feels like an impossible task.

The study from Thales surveyed over 2,000 UK citizens and finds an alarming level of consumer apathy when it comes to keeping themselves safe online.

Continue reading

How AppSec can help enterprises make sense of cloud-native development [Q&A]

Cloud maze complexity

Today's application security landscape is complex and can lead to teams spending a lot of time hunting down vulnerabilities. Add in the move to cloud-based development and there's an even higher volume of code to deal with

We spoke to Shahar Man, CEO at Backslash Security, to learn more about what AppSec needs to look like in this world and how it ties in with greater use of the cloud.

Continue reading

Google may use AI in Chrome to organize your chaotic tabs for you

Chrome icon in the background with Chrome on mobile in the foreground

Browser tabs were introduced to help fix the problem of having too many browser windows open at once; now instead of being overrun with browser windows, we have the issue of too many tabs. Chrome's upcoming Organize Tabs feature is Google's latest attempt to tame things.

The feature is still undergoing beta testing, but when it lands it will take some of the hard work out of tab management. For anyone happy to hand control over to Google, Organize Tabs will automatically sort open tabs into appropriate Tab Groups, much like the comparable AI-driven feature already to be found in Microsoft Edge.

Continue reading

CISOs watch out: The most effective cyber attacks never touch your company's firewall

Firewall

When CISOs think about cybersecurity for their companies, there are certain expectations. Password protection, firewalls, and continuously training employees on the latest phishing scams, to name a few. And to be sure, cyber risks like these are as relevant as ever. The persisting problem is, cybersecurity is like any defense contest: the burden (and therefore the disadvantage) is on the defender. You have to win every time, whereas an attacker only has to win once to cause major damage.

Frustratingly, cyber criminals have shown time and time again that they are actually quite gifted at creative approaches, thinking outside the box, and combining advanced tech with old school techniques. For instance, a suspicious-looking form letter email is easy to spot and delete. However, by purchasing even a small amount of personal data from the dark web, a smart criminal can craft a phishing email with just enough familiarity so that its target will most likely open it without hesitation. With enough patience and photoshopping, a malicious actor can send customers a message from their favorite store that leads them to a spoofed website solely created to steal their credit card information. Increasingly today, these attacks targeting customers are more prevalent.

Continue reading

Windows 12 could be on the horizon as Intel lets slip Microsoft's 'Windows refresh' plans

Purple Windows 12 logo

Microsoft may be saying nothing about the release of Windows 12, but that's not stopping news slipping out about the successor to Windows 11. And thanks to information from Intel, it seems that 2024 is when we can expect to see a new Windows release.

The leak comes courtesy of David Zinsner -- Chief Financial Officer at Intel -- who confidently referred to "the Windows refresh" which he says is due to land next year. While his comments are not solid confirmation of the launch of Windows 12, it is a credible addition to the ever-growing pile of Windows rumors.

Continue reading

The 4 most important questions CIOs should be asking today

Although chief information officers have been at the forefront of enterprise digital transformation efforts for years, they are still too often reduced to the company’s "technology expert." Even if the reality is different, perception counts for a lot. It’s now time for CIOs to change that perception and evolve into more wide-ranging business strategists, enabling their IT departments to leverage their expertise for high-value business outcomes.

The good news is that most enterprise CIOs already have nimble, intelligent and scalable technology to facilitate that change. What’s needed is an approach that improves efficiency and increases productivity in ways that are directly tied to company goals. Here are four questions every CIO of a B2B enterprise should be asking as they seek to maintain the momentum of their digital transformation.

Continue reading

Staying safe online in 2023

As Cybersecurity Awareness Month celebrates its 20th anniversary this year, it's the perfect time to reflect on the strides we've made in security education and awareness. It’s also a chance to look ahead, combining education with the right technology to protect people at scale.

Two decades is a very long time on the internet -- there was no Facebook or YouTube in 2003. Now there are more than 500 times as many secure websites. Phishing was just beginning to catch on. Now phishing is widely reported to be a multi-billion-dollar problem, with millions of attacks detected and taken down each year. As the internet has evolved, so have cybercriminals.

Continue reading

Twenty years of software updates

In the beginning, software ran mostly on a smart server dumb terminal networked or entirely on a local machine. If there was a defect, it was that the given program wouldn’t run. Once desktops, laptops, mobile phones and even physical devices such as refrigerators started interconnecting via the internet, a software defect could open the device to an attack or shut down a life-critical system. The very real need to stay on top of software updates has been escalating every day.

In the early 2000s, when computer malware began as a few innocent viruses before morphing into full-on malevolent worms, the software giants such as Microsoft (but by no means limited to Microsoft) denied responsibility. There was significant push back with vendors saying that compromise was only possible in only a limited number of scenarios -- almost as though the end user was responsible. Increasingly, though, it became clear that maybe the software itself could be responsible for some of the malicious activity on the early internet. And maybe the software industry needed to take that seriously.

Continue reading

You can't avoid APIs, so you need to secure them 

Intelligent APIs

As APIs emerge as the unsung heroes behind modern software development for their ability to accelerate innovation and streamline processes, it’s no secret or even a surprise that API security is a lingering problem that the broader cybersecurity industry has yet to fully solve. Since abandoning the use of APIs is not a viable option, organizations need to focus on building strong AppSec programs that give the teams developing with APIs, the structure and tooling to ensure connections are secure and software deployed is safe.  

To be most effective, organizations need to prioritize designing security best practices into development workflows from the beginning and by adopting secure-by-design based principles.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.