Panos Panay's shift to Amazon could signal the death of Microsoft Surface

In a startling development, Panos Panay, the mind behind Microsoft’s Windows and Devices division, has officially jumped ship to Amazon. Yes, folks, the rumors were true. Amazon CEO Andy Jassy announced today that Panay will, in fact, be helming the Devices and Services business, replacing Dave Limp later this year.

While on the surface this seems like a significant win for Amazon, it might be worth pondering the implications of Panay’s exit from Microsoft. With nearly two decades at Microsoft, Panay’s sudden move raises eyebrows and stirs concerns regarding the internal dynamics at Microsoft.

Continue reading

Get 'Mastering Linux Security and Hardening -- Third Edition' (worth $35.99) for FREE

The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux.

In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies.

Continue reading

Conquering disruption: How to build a more resilient business

Cyber resilience

From COVID-19, the energy crisis and widespread strikes, business continuity managers have been kept busy in the last few years. And the impact of these events, as well as ongoing threats like cyber attacks, mean that continuity planning is a regular topic on boardroom agendas.

Business resilience is now crucial to guaranteeing continuity and sustainable operations. In fact, according to PwC’s Global Crisis Survey 2023, 89 percent of organizations state business resilience as one of their key strategic priorities. But what are the key factors at play in building a more resilient organization?

Continue reading

Enterprises have ambitious plans for machine learning but the road isn't a smooth one

machine learning

A new survey looks at how organizations find business value from machine learning (ML), how they plan to invest in the near term, and the challenges they expect to face in achieving their ambitious goals for getting new ML initiatives into production.

The study, conducted by NewtonX for Wallaroo.AI, asked asked chief data officers, chief analytics officers and leaders responsible for AI business outcomes in US private enterprises how they plan to invest in the near term and the challenges they expect to face in achieving their goals for getting new ML initiatives into production.

Continue reading

Xiaomi 13T Series Android smartphones have Leica cameras for professional-level photography

Xiaomi has unveiled its new 13T Series smartphones, made with the help of Leica to help customers take great photos. These phones aim to capture the classic Leica photo experience.

The Xiaomi 13T Series makes professional-level photography accessible. Both the Xiaomi 13T Pro and Xiaomi 13T have a triple camera setup with lenses made with Leica. This includes a 50MP wide angle and telephoto camera, and a 12MP ultra-wide-angle camera, suitable for panoramic shots and landscape photos. The cameras support high dynamic range shooting and have a wide color range for capturing detailed and vibrant photos.

Continue reading

Account takeover attacks surge by over 300 percent

Hacker

Account takeover (ATO) attacks jumped a massive 354 percent year-on-year in Q2 2023 according to the latest quarterly Digital Trust and Safety Index from Sift.

Analysis across Sift's global network shows the fintech and food and beverage categories experienced especially large increases. ATO spiked 808 percent across fintech, hitting loyalty sites and crypto, and opening the gate to downstream payment fraud, while the food and beverage industry saw a 485 percent increase in ATO.

Continue reading

Why bad bots and open banking are creating opportunities for cybercriminals [Q&A]

We all know that bad bots are, well… Bad. But open banking is supposed to be good, giving consumers more control over their finances. Combine open banking and bad bots though and you have opened up a world of new threats to banks, customers, and their data.

We spoke to Alan Ryan, AVP for UK and Ireland at Imperva, about how open banking has created new opportunities for cybercriminals, and why the traditional siloed approach to security needs re-appraising.

Continue reading

Zyxel Networks launches WiFi 6-enabled USG FLEX 100AX Firewall

Zyxel Networks has rolled out an impressive update to its lauded ZyWALL USG FLEX 100 firewall series, with the introduction of WiFi 6-enabled security firewalls. The newly announced USG FLEX 100AX Firewall not only supports WiFi 6 (802.11ax) for enhanced wired and wireless solutions but also guarantees comprehensive security for small- and medium-sized business networks.

This innovative firewall aligns with Zyxel's scalable Nebula Cloud Networking Solution, allowing for centralized security policy provisioning and distributed network management from a single dashboard. The USG FLEX 100AX, with WiFi 6 connectivity delivering speeds up to 1800 Mbps, promises robust VPN connectivity and advanced networking security features for various remote work locations, reducing the attack surface and inhibiting threat propagation.

Continue reading

How to get the big Windows 11 update, with Copilot AI and other features

Today is a huge day for Windows 11 users, as it’s when Microsoft begins rolling out a major update for the new operating system, bringing the power of Copilot to Windows, as well as other new AI powered experiences to apps.

Provided you have a device running Windows 11 version 22H2, you can install these non-security updates -- there will be more than one -- as soon as they start to roll out.

Continue reading

The vital role of multi-factor authentication in your security stack

Stop me if you have heard this story before. A threat actor sends a crafty phishing email. An unsuspecting end user clicks a hyperlink in the email and enters their username and password, unknowingly providing those credentials to the threat actor. The threat actor then uses these credentials to gain access to all sorts of personal or company sensitive information. While this may be a "tale as old as time", it’s still happening today. Literally every day. According to the latest Verizon Data Breach Report, stolen credentials is still the primary way attackers gain access to organizations.

The fact is passwords continue to be a target for threat actors and are becoming increasingly vulnerable to attack. Threat actors leverage techniques like phishing campaigns, brute force attacks, information-stealing malware, and social engineering to gain access to user credentials. End users often contribute to the problem by using easily guessed passwords or reusing the same passwords across multiple accounts making a threat actor’s job easier. The bottom line is putting your data protection hopes into a single username and password is a foolish endeavor when the need for more robust authentication controls is evident.

Continue reading

Remote work creates extra challenges for network teams

The ongoing shift to hybrid and remote work environments has resulted in key changes to the roles and priorities of network administrators in order to address new connectivity challenges and prioritize and preserve a secure, productive end-user experience.

New research by Enterprise Management Associates (EMA) and Auvik shows 73 percent of network professionals reported an increase in workloads, either slightly or significantly, following the shift from traditional to hybrid work environments.

Continue reading

Businesses not prepared for PKI automation

Magnified certificare

As we reported three months ago, there are some significant changes coming to the PKI marketplace, not least being Google's move to reduce the lifespan of SSL/TLS certificates.

A new report from GlobalSign, based on 110 responses, finds 30 percent of respondents say the increased administrative work and complexity of the changes is their biggest concern.

Continue reading

Lenovo launches ThinkCentre M90a Pro Gen 4 AIO business desktop

Today, Lenovo launches a cutting-edge addition to the all-in-one (AIO) business desktop computer lineup -- the ThinkCentre M90a Pro Gen 4. It is expertly engineered to meet the needs of contemporary workplaces and content creators.

The ThinkCentre M90a Pro Gen 4 is not just a high-performing PC. It is embedded with top-of-the-line components including up to 13th Gen Intel Core i9 processors and NVIDIA GeForce RTX 4050 Laptop GPU, promising performance, expandability, and results as and when needed.

Continue reading

Enterprises lack strategy for DevOps automation

DevOps

Investments in DevOps automation are delivering significant benefits, including a 61 percent improvement in software quality, a 57 percent reduction in deployment failures, and a 55 percent decrease in IT costs.

However, a new survey from Dynatrace shows that just 38 percent of organizations have a clearly defined DevOps automation strategy.

Continue reading

Almost 8 million DDoS attacks launched in first half of 2023

DDoS attack

Cybercriminals have launched approximately 7.9 million DDoS attacks in the first half of 2023, representing a 31 percent year-on-year increase.

A new report from NETSCOUT shows global events like the Russia-Ukraine war and recent NATO bids have driven recent DDoS attack growth.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.