From fixing issues to fueling innovation: The growing business case for observability


This year, embracing a leading observability practice will not only be a key priority for organizations but an essential competitive differentiator. Recent data shows that leading organizations with mature observability practices spend 38 percent more of their time on innovation, in contrast with organizations early on in their observability journey. This greater amount of time to focus on product innovation can equate to significant benefits for an organization, such as increased developer productivity, improved operational efficiency and more importantly winning market share.
2024 has shown us that the impact and business value of observability is expanding. It is evolving from a reactive practice to a proactive one where organizations not only use observability for troubleshooting issues but now also to inform their customer experience strategy and to fuel faster innovation.
How cloud security teams should think about AI


According to estimates from Goldman Sachs, generative AI (GenAI) will constitute 10-15 percent of cloud spending by 2030, or a forecasted $200-300 billion (USD). The public cloud serves as the perfect vessel for delivering AI-enabled applications quickly, cost-effectively, and at scale. For organizations looking to profit from AI’s potential, the path effectively travels through the cloud.
For cloud security teams on the ground, however, the impact of AI can seem complicated. Understanding the challenges it presents, and the key capabilities it enables, can help them work smarter and more effectively. This article explores the three ways cloud security teams should think about AI to enhance protections, improve efficiency, and address resource constraints.
Photoshop for free? The new Adobe Photoshop iPhone app makes the dream a reality


Adobe has launched a brand-new iPhone edition of its flagship Photoshop software. Enticingly, the app is free of charge! The company is clear from the offset that “Photoshop on the phone is not intended to replace Photoshop on the desktop”, but there is a lot here, nonetheless.
The new app goes much further than the existing Photoshop Express app, enabling creatives to use layers, masks, and the advanced Spot Healing Brush. For now, it is only owners of iPhones who are getting the free Photoshop treatment, but Android users will gain access later in the year.
Plugable officially launches PS-10CC 10-port USB-C charger with priority-based charging


Plugable has launched the PS-10CC, a USB-C charger with 10 ports. Following a Kickstarter campaign in October, it goes on sale today for an introductory price of $84.95, which is less than its MSRP of $99.95.
Created to eliminate cable clutter and completely improve charging efficiency, the PS-10CC uses precise, real-time current sensing to allocate power to each port that needs it. Devices connected to the ports farthest to the left get charged faster. Users should consider this when plugging in laptops and phones so they receive priority.
86 percent of commercial codebases expose organizations to risk


Analysis of 965 commercial codebases across 16 industries during 2024 by Black Duck Software finds 86 percent contain open source software vulnerabilities and 81 percent high- or critical-risk vulnerabilities.
Black Duck's Open Source Security and Risk Analysis (OSSRA) report also shows that the number of open source files in an average application has tripled from around 5,300 in 2020 to more than 16,000 in 2024.
New solution automates fixing Linux vulnerabilities


More than ever enterprises are turning to Linux solutions. But while the open source OS has a good reputation for security that doesn't mean that it’s invulnerable and it's important to stay on top of updates and patching.
Seal Security is launching Seal OS, a holistic solution designed to automatically fix vulnerabilities in both Linux operating systems and application code.
Record-breaking number of vulnerabilities predicted for 2025


A new report predicts a record-breaking 41,000 to 50,000 new Common Vulnerabilities and Exposures (CVEs) this year, based on data from the National Vulnerability Database (NVD).
The forecast, from the Forum of Incident Response and Security Teams (FIRST), suggests an 11 percent increase compared to 2024, and a whopping 470 percent increase compared to 2023.
You can get Office apps for free if you're willing to opt for an ad-supported Microsoft 365 subscription


The gradual move towards a subscription-based model for software payments has been continuing for a number of years now -- and the costs can soon add up. For anyone who is looking for ways to make things a bit less of a strain on their wallet, Microsoft has come up with a solution -- ad-supported versions of its Office apps.
If you are happy to endure advertising in the likes of Word and Excel, you can opt for a free Microsoft 365 subscription. Sadly, ads are not the only catch.
Deepfake fraud calls target consumer cash


AI-generated voice impersonation scams are an increasing threat, with 31 percent of US consumers, 27 percent of Canadians, and 26 percent of UK consumers reporting encounters with deepfake fraud calls.
A new report from Hiya, based on data from the company's Voice Intelligence Network and a January 2025 survey of 12,000 consumers across the US, Canada, the UK, Germany, France, and Spain, shows that more than 30 percent of those targeted fell victim, suffering significant financial losses. In the US, the average reported loss was $539, while UK victims faced the steepest losses at £1,479 ($1,867).
Windows Vista 2025 Edition fixes Windows 11's biggest problems -- download it now


For a lot of people, the biggest, most noticeable difference between Windows 10 and 11 is the centered taskbar and Start menu that Microsoft introduced to its latest operating system.
The software giant made the change to give Windows 11 a fresh, modern look and set it apart from its predecessor, but Windows has had a left-aligned taskbar and menu since Windows 95, and as the company proved when it gave us a tiled Start screen in Windows 8, change isn't always good -- or welcome.
The encryption backdoor debate: Why are we still here?


Earlier this month, reports emerged that the UK government had pressured Apple, under the Investigatory Powers Act 2016, to create a backdoor into encrypted iCloud data. Unlike targeted access requests tied to specific cases, this demand sought a blanket ability to access users’ end-to-end encrypted files.
Apple was forced to reconsider its Advanced Data Protection service in the UK, and this latest development raises a fundamental question: Why does the debate over encryption backdoors persist despite decades of technological progress and repeated warnings from cybersecurity experts?
The US is not the only country to ban Kaspersky product because of security concerns


Security firm Kaspersky has suffered a dramatic fall from grace in recent years because of its Russian ties. Around the world, concerns have sprung up that the security software actually poses a security risk.
In the middle of last year, the US government banned the software from being sold in the country -- or even updated for existing users. Following suit, Australia has also announced a ban, citing a "security risk to the Commonwealth". Fears of "foreign interference, espionage and sabotage" were also key factors.
Attacks on manufacturing up but less than half businesses are prepared


A new study from Omdia finds that 80 percent of manufacturing firms experienced a significant increase in overall security incidents or breaches last year, but only 45 percent are adequately prepared in their cybersecurity.
The survey of over 500 technology executives worldwide shows a heightened risk of cyber attacks comes as manufacturers move to leverage IT such as cloud, AI, and Internet of Things (IoT) as part of their digital transformation -- a process defined as Industry 4.0.
Apple has removed its strongest data protection from UK users -- why and what does it mean?


Apple's Advanced Data protection allows the data that its users store in iCloud to be end-to-end encrypted. On Friday of last week the company announced that it would be removing this tool from users in the UK.
The move follows a demand from the UK government to allow 'backdoor' access into data in order to investigate crime. The problem is that even Apple can't access ADP protected data and the company argues that a backdoor would be exploited by attackers.
How GenAI adoption introduces network and security challenges [Q&A]


Enterprises are increasingly using GenAI to transform their organization. As they move ahead, they're evaluating their preparedness from a business, safety, skills, and product level. But there's another key factor at the backend that's being overlooked: the network.
Full GenAI adoption introduces significant new challenges and demands on the network, such as bandwidth strain and unique security vulnerabilities. If these demands aren't accommodated, organizations won't realize the benefits of GenAI.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.