Agile Pentesting offers developers more control and flexibility

Software testing

Pentest as a Service (PtaaS) company Cobalt is today launching Agile Pentesting, a new offering that provides more control and flexibility to better meet the needs of businesses through versatile, ad hoc testing.

Agile Pentesting allows organizations to identify and address vulnerabilities at a faster, more frequent rate to minimize risk. This contrasts with what Cobalt calls 'comprehensive pentesting', which is often done in support of business drivers like compliance or M&A activity, the new offering helps accelerate customers' DevOps journeys while aligning with their CI/CD pipelines.

Continue reading

Talent shortages are shaping tech investment

talent

Almost three quarters (73 percent) of senior IT leaders agree that acquiring IT talent has never been harder and 98 percent say attracting IT talent influences their organization's technology investment choices.

The research from MuleSoft also shows that 86 percent of senior IT leaders now say the experience an organization provides its employees and customers is as important as its products and services.

Continue reading

Watch Apple reveal the new iPhone 14 at today's 'Far Out' event, here live

Apple

It’s that time of year again, when Apple is set to unveil the next generation of iPhones, as well as other hardware, like the Apple Watch Series 8.

It is expected that Apple's Pro and Max models will see a processor boost, improved cameras (with the main camera jumping up to a 48-megapixel sensor), and lose the notch at the top. The new phones may also gain an always-on feature.

Continue reading

Understanding threat detection methods [Q&A]

Threat

Detecting threats today isn't just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well.

In order to be effective, security teams need to look at what data to use, what the science says can be done with the data, and what to expect. We spoke to Andrew Hollister, CISO at LogRhythm to find out more.

Continue reading

Microsoft releases PowerToys v0.62.0 with THREE amazing new utilities to play with

PowerToys

Recent updates to PowerToys have focused on fixing bugs and improving stability, but now it is finally time for some new features. With the release of PowerToys v0.62.0, Microsoft has added not one, not two, but three new utilities.

If you have been following PowerToys news, you will probably be aware of the Text Extractor tool which can be used to grab text from images, and has been in development for a little while. Likewise, the self-explanatory Screen Ruler utility is one you may have heard of. Completely new, however, is Quick Accent which makes it quick and easy to type accented characters.

Continue reading

Making sure 5G networks are a friend, not a foe, to organizations

5G circuit board

Over the last five years, 5G has been one of the biggest buzzwords in the technology industry, with the largest telecommunication providers and the latest devices offering the service. Whilst it does offer lightning-fast internet speeds, real-time connectivity, and many more benefits, there is a catch.

5G creates businesses both opportunities and dangers, with cyber criminals using the technology to aid their attacks and breach networks. Therefore, organizations must understand the cyber threats that are present within their 5G networks and how they can be stopped.

Continue reading

Why accessibility is good business but rarely a priority

According to the World Health Organization, one billion people -- approximately 15 percent of the world’s population -- live with some form of disability. There are more than 350 million people suffering from color blindness alone, and discretionary disposable income of people with disabilities is estimated to be half a trillion dollars in the U.S. The potential revenue that businesses can gain from better serving people with disabilities is immense.

But despite those staggering numbers, accessibility is often ignored in the design and development of digital products. When not completely ignored, it is commonly planned and budgeted for to be done at a later time, often due to a product management paradox.

Continue reading

Security awareness training goes mainstream but still needs more work

training key

Some form of cybersecurity awareness training has been implemented in 97 percent of enterprises this year, according to a new survey of 1,900 security professionals from ThriveDX.

However, only 42 percent report involving their employees in security detection with the use of such measures as a Phishing Incident Button, while 65 percent agree that their training program needs expansion.

Continue reading

Almost half of education institutions see attacks on their cloud infrastructure

cloud worry

A new study reveals that 47 percent of educational institutions have suffered a cyberattack on their cloud infrastructure within the last 12 months.

The research from Netwrix shows that for 27 percent of these incidents in the cloud were associated with unplanned expenses being incurred to fix security gaps.

Continue reading

Western Europe dominates broadband speed tables

fibre broadband

Western European countries take seven of the top ten fastest spots in the world for broadband, with Macau, Taiwan and Japan the only locations elsewhere to make it into the top ten fastest in the world.

The five places with the fastest internet in the world are: Macau (262.74Mbps), the Channel Island of Jersey (256.59Mbps), Iceland (216.56Mbps), Liechtenstein (166.22Mbps) and Gibraltar (159.90Mbps).

Continue reading

Slackware-based Salix 15 Linux distribution available for download

nerd_laptop_teen

Are there way too many Linux distributions these days? Absolutely. More specifically, there are far too many operating systems that are based on other operating systems. If I see one more Linux distro based on Debian or Arch, I swear I am going to literally puke.

Linux distributions based on Slackware, however, are far less common these days, so such distros are definitely worth some attention. Today, the Slackware-based Salix 15 becomes available for download. This Linux-based operating system uses the Xfce 4.16 desktop environment and kernel 5.15.63. In addition to Flatpak support, this version of the distro comes with some excellent software pre-installed, such as Firefox 102 ESR, GIMP 2.10, and LibreOffice 7.4. Believe it or not, there are even versions for both 32-bit and 64-bit processors!

Continue reading

Why solving the identity management crisis facilitates the adoption of digital transformation

digital transformation

Identity data is frequently stored by organizations using a variety of sources, formats, and protocols, sometimes making it impossible to access essential identity information needed for security and business decisions. Without precise identity data, systems cannot decide what users should and should not be able to access which resources. Even worse, to make life easier for the admins, sometimes the default is overextending access and over-privileging accounts. This raises the possibility of a successful breach, as well as the possibility that it will go unnoticed for a longer period of time.

The number of identities linked to companies has also been increasing exponentially -- a recent study by Gartner Peer Insights  found that 60 percent of organizations have more than 21 identities per user.

Continue reading

Cloud servers are the most common way in for cyberattacks

Cloud access

New data unveiled by the Atlas VPN team shows that cloud servers are now the number one way in for cyberattacks on businesses, with 41 percent of companies reporting them as the first point of entry.

The data, based on the Cyber Readiness Report 2022 by insurer Hiscox, also shows a 10 percent increase in cloud server attacks over the year before.

Continue reading

Get 'Pivot for Success' ($15 value) FREE for a limited time

Pivot

Pivot for Success tells business leader and entrepreneur Amy Hilliard’s stories of success, struggle, and sustainability to inspire you to become resilient. Hilliard offers her hard-won perspective on what it takes to "make it" in American business and in life. She talks about the tough stuff, the stuff that most people who rise to her level of accomplishment aren't eager for others to know. Few women, and few women of color, have created multi-million-dollar brands in senior corporate positions, legendary entrepreneurial environments, and start-ups. Hilliard’s fearless honesty in revealing her experience can help you find your way forward, even if you face obstacles in today's business environment.

While Hilliard is a Harvard Business School graduate, Pivot for Success contains lessons not taught in school. Her perspective on success and the failure it often takes to succeed are invaluable. In this book, you will learn the 10 Pivot Points that have led Hilliard to where she is today, including Purpose, Passion, Perseverance, Positivity, Priorities, and more.

Continue reading

Critical infrastructure cyberattacks: What are the implications of their increasing prevalence?

hand on world map

Over the past couple of years, there have been a growing number of cyber attacks on critical infrastructure around the world. Most recently, Estonia was subjected to its most extensive cyberattack since 2007, apparently in retaliation to the country removing Soviet-era monuments from public places. Earlier this year, Costa Rica had to declare a state of emergency after a Russian-speaking ransomware gang threatened to overthrow the government in the wake of two cyberattacks. In July last year, South Africa’s ports were almost totally shut down after a ransomware attack.

While these attacks are of varying severity -- Estonia experienced minimal disruptions to critical websites while Costa Rican health officials were unable to access critical healthcare records and tax systems were frozen for weeks -- they show that cybercrime is no longer just about obtaining data. Instead, cybercrime is being used against real-world infrastructure and with very real consequences.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.