Get 'Mastering Cyber Intelligence' ($19.99 value) FREE for a limited time

Mastering-Cyber-Intelligence

Cyber Threat Intelligence converts threat information into evidence-based intelligence that uncovers adversaries' intents, motives, and capabilities for effective defense against all kinds of threats.

Mastering Cyber Intelligence thoroughly covers the concepts and practices required to develop and drive threat intelligence programs, detailing the tasks involved in each step of the CTI lifecycle. You'll be able to plan a threat intelligence program by understanding and collecting the requirements, setting up the team, and exploring the intelligence frameworks.

Continue reading

Three out of four organizations are still vulnerable to Log4Shell

Security breach lock

The Log4j or Log4Shell vulnerability first hit the news in December 2021 sending ripples through the cybersecurity world. So you might be forgiven for thinking that it's safe to assume it's no longer a threat. However, one year on it seems that this is a vulnerability that keeps on being, well… vulnerable.

New research from Tenable, based on data collected from over 500 million tests, shows that 72 percent of organizations remain vulnerable to Log4Shell as of October this year.

Continue reading

Cybersecurity budgets are up but aren't being well spent

budget keyboard

New research from cloud platform Fastly shows that while enterprises are increasing their cybersecurity spending they're not making the most of their investments.

While 73 percent of organizations worldwide are increasing their cybersecurity spending to protect themselves against future risks, IT leaders are investing poorly with only 61 percent of their cybersecurity tools fully active or deployed.

Continue reading

Ensuring compliance through network automation [Q&A]

Compliance gauge

Cyber threats are on the rise across every industry and business size, highlighting the importance of maintaining network compliance for organizations and especially for IT and security teams.

But that's easier said than done, with many industry-specific compliance regulations like the Health Insurance Portability and Accountability Act (HIPAA) or the Payment Card Industry Data Security Standard (PCI) each with their own set of standards and processes.

Continue reading

Detection and protection from crypto romance scams

Crypto Bitcoin Hearts

You likely know what risks you face if you invest in cryptocurrency. The crypto market is highly volatile, and its decentralized status means no central authority backs the value of digital currencies. Another threat to investors is crypto romance scams.

Anyone who owns any form of cryptocurrency is a potential target for crypto romance scams. Here’s how to detect them and strategies to protect your finances from malicious cybercriminals.

Continue reading

CISOs look to balance transformation and cybersecurity

CISO

A new survey reveals that while CISOs are still experiencing challenges around visibility, intelligence and control, nearly half (47 percent) are proactively focused on digital transformation and cloud migration.

The study of 600 UK CISOs from BlueFort Security finds most have moved beyond the challenges of a widespread shift to remote working and are now focused on digital transformation and migration to the cloud, despite an uncertain world picture and bleak economic environment.

Continue reading

Kensington releases SlimBlade Pro Trackball

52455539997_475328340a_k

There are typically two types of people in this world -- those that like mice, and those that prefer trackpads. There is a third group of computer user, however, that is quite small comparatively, but very passionate -- trackball lovers. While trackballs have largely fallen out of favor with most consumers, there are still some folks that swear by them.

Today, Kensington releases a new trackball that is sure to make fans of the product type very excited. Called "SlimBlade Pro," the beautiful trackball can connect to a computer wirelessly or wired (via USB). The product features a large 55mm trackball, Optical Tracking Technology, and 128-bit AES Encryption.

Continue reading

StarTech.com DK31C3MNCR is a premium USB-C Docking Station for Chromebooks

chrome-dock1

A Chromebook is a laptop running Google's Linux-based ChromeOS operating system. However, when you connect such a notebook to a monitor, keyboard, and mouse, it becomes a makeshift desktop computer.

The most elegant way to transform a laptop into a desktop is with a USB-C docking station. But how can you be sure your Chromebook is compatible? Well, if the dock is officially certified as "Works With Chromebook," then you can be assured that it will work flawlessly.

Continue reading

Microsoft releases Windows 11 Build 25252 and highlights new known issues

Windows 11 laptop

Thanksgiving is done and dusted for another year, but Microsoft has something for Windows Insiders in the Dev Channel to be thankful for -- a new Windows 11 Build!

Build 25252 comes with a handful of improvements and fixes, but also highlights some new known issues.

Continue reading

Pressure on developers puts digital transformation efforts at risk

Businessman Scolding Stressed Female Employee

One of the side effects of the pandemic has been a boost to digital transformation efforts. But in the rush to innovate businesses are struggling to find developer talent.

New research shows 72 percent of tech teams have a skills shortage with two million vacancies for tech jobs advertised between May 2021 and 2022 in the UK alone, and tech salaries almost 80 percent higher than those for non-IT roles.

Continue reading

Demand for automation is surging -- here's how to get projects right

Automation

The pandemic accelerated the digital transformation efforts that had already been a top priority for businesses industry wide. In early 2020, many organizations were thrust abruptly into survival mode, forced to rapidly support remote work and find new ways to ensure the success of both employees and customers.

Now, we are in a challenging economic climate where technology innovation has once again become critical to help organizations drive continued efficiency and growth right now. Automation increasingly sits front-and-center in these efforts, helping to drive down costs, enhance productivity, and add value across the business. But to work effectively, automation solutions must be deployed as components in the strategic technology landscape, not as quick fix, throwaway tools.

Continue reading

Becoming a data-informed organization

Digital data

We hear a lot of talk these days about the virtues of data-driven organizations. That’s certainly reasonable up to a point -- but what does it really mean? When it comes to routine operational decisions, in particular, the current bias seems to favor increased automation over human judgment. The data doesn’t lie -- or so the story goes -- so we’re better off deferring to programmatic decision models.

That may be reasonable for some situations, but when you’re operating in a complex and nuanced domain, take casualty insurance claims for example, that highly automated decision paradigm can begin to fall apart very quickly. Thousands of different variables come into play. Medical records and accident reports contain subtle details that provide vital clues about potential risks. To complicate matters further, important minutiae are often buried deep inside the narrative content.

Continue reading

Data privacy and the changes enterprises need to be ready for [Q&A]

privacy key

It has been estimated that there are some 43 zetabytes of data stored by enterprises today that are inaccessible and not commercialized due to privacy concerns, operational complexity and regulations.

With the California Consumer Privacy Act (CCPA) becoming fully operational on January 1 2023 and other legislation in place or coming around the world, the need for businesses to find new data accessibility methods that are compliance-friendly is very real.

Continue reading

3 predictions that will shape the open source landscape in 2023

crystal ball

Digital transformation remains a highly important topic for enterprises that keeps evolving. With ongoing economic uncertainties, like rising inflation, market turbulence, and the energy and cost of living crisis, businesses are realizing they must do more with less over the coming year. 

Organizations are gearing towards technologies that can enable their systems and processes to support each other seamlessly and enable them to drive efficiencies. In particular, they are turning to open source technologies to improve connectivity, observability and security in their ever-growing tech stacks. 

Continue reading

Next wave of digital transformation: What should you know?

digital transformation

We’re all witnessing how the second wave of digital transformation (DT) or the so-called "digital transformation v2.0" is gaining steam. How does it differ from the primary version and what should you expect from it? How can it impact your digital strategy and what top priorities should you focus on?

91 percent of organizations have already implemented at least some digital initiatives, while the global spending on DT has passed a 1.5 trillion threshold and is predicted to reach 2.8 trillion by 2025. Sooner or later, every business that wants to survive the competition will face this next wave of digital transformation inevitably. What is it like and how to prepare for it to get transformed painlessly? Let’s get your ducks in a row so that you’re ready for the next step in your DT journey.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.