Employees would rather be Mobile Mollies than Desktop Doras

working from home

More than 80 percent of global employees do not want to return to the office full-time, despite 30 percent claiming that being isolated from their team was the biggest hindrance to productivity during lockdown.

A new study from mobile-centric security platform MobileIron also uncovers some worrying views around security, with 33 percent considering it to be low priority.

Continue reading

The fashion of the future: What will tech bring next?

Like many industries, the world of fashion has become intrinsically linked with technology. From the textiles used in garment manufacturing to creating a sustainable supply chain, technological advancements are set to innovate fashion in countless ways. For a long time, the processes used in the fashion sector have remained remarkably unchanged. In the coming years, however, we can expect big things.

As of 2020, fashion generates an estimated $664 billion revenue, making it one of the biggest industries in the world. Because of this, technological innovations within this sector are set to be nothing less than world changing. If implemented correctly, technology in fashion could make an unfathomable change in creating a greener, cleaner world. From big data to Blockchain technology, let’s take a look at the innovations that we can expect to see in the world of fashion over the coming years.

Continue reading

New Kodi 19 'Matrix' release offers major interface and playback improvements

If you’re a Kodi user, then the next big release of the hugely popular home theater software is probably something you’ve been eagerly awaiting.

Development has been continue apace, despite a Windows crisis last year, and today the team rolls out a brand new Kodi 19.x 'Matrix' preview build.

Continue reading

Industrial companies face increased cyber threats

industrial skyline

A new study finds that 56 percent of IT and operational technology security professionals at industrial enterprises have seen an increase in cybersecurity threats since the start of the COVID-19 pandemic in March.

In addition, the research from Claroty, based on a global, independent survey of 1,100 full-time IT and OT security professionals, shows that 70 percent have seen cyber criminals using new tactics to target their organizations in this time frame.

Continue reading

How to disable Bing in the Windows 10 Start menu

With Windows 10, Microsoft is understandably keen to promote its own products, and this is something that has been noticeable in the Start menu. Search results from Bing have long-featured there, and this is not something everyone is happy with.

For a while it was possible to disable the BingSearchEnabled key in the Registry to turn this off, but this option was removed in Windows 10 version 2004 (or Windows 10 May 2020 Update). So, if you want to disable Bing, there is now a new method you have to use -- and there is the happy side effect that it also disables Start menu ads.

Continue reading

Microsoft wants you to vote for what the next PowerToys utilities should be

Microsoft PowerToys

The development of PowerToys for Windows 10 has been impressive, with Microsoft continuing to add new utilities all the time. Now the company is looking for feedback from users to help decide just what it should focus on next.

Specifically, the development team says that while it currently has ideas for three new PowerToys, it only has time to work on two of them next year. Rather than making the decision itself, power users are being asked to vote, choosing between a Gif/Video screen recorder, the ability to adjust font rendering, and a tool called "Mouse without borders".

Continue reading

How to enhance security education, training and awareness for employees

Training course

Many organizations struggle to develop education, training and awareness initiatives that are impactful, engaging and resonate with the audience. Typically, a lack of funding forces organizations to run plain, dull, repetitive awareness campaigns, or they just do enough to meet regulatory requirements. This approach to changing security behavior is fundamentally flawed -- however, there are several cost-effective approaches that organizations can use to change, promote and sustain good security behavior.

Firstly, the idea of 'blanket awareness' is dead -- all content needs to be tailored and contextualized to specific role requirements. For example, a senior executive will not experience the same threats as a marketing manager, so why should they both have to complete the same training course? Each employee should be equipped with the necessary knowledge and skills to identify and respond appropriately to role-specific threats. Security mentor schemes are particularly helpful in upskilling movers and joiners, and a robust threat intelligence and incident management capability can help inform awareness campaigns of emerging and common threats that each role is likely to experience.

Continue reading

Delivering stronger security for enterprise data [Q&A]

Data security watch face

Data is among an enterprise's most valuable assets, no matter where or how it's stored, having visibility and unified access control is essential.

Mohit Tiwari, CEO at Data Store and Object Security (DSOS) company Symmetry Systems, left a professorship at the University of Texas in Austin to start the business and develop a new approach to data security in the form of Symmetry DataGuard which maintains authority over data even when all else fails. We spoke to him to find out more.

Continue reading

A third of companies caught unprepared by shift to home working

Confused

New research out today finds that 36 percent of companies weren't prepared to support the large-scale and abrupt transition to a remote workforce forced by COVID-19 measures.

The study, from managed cloud provider Navisite, of more than 100 executives and IT professionals in the US reveals that, as a result, 51 percent experienced IT pains during the transition process, with 29 percent reporting that they are still facing issues.

Continue reading

Technology in manufacturing: Why innovation must never stop

Technology’s grip on modern-day life has tightened over the last decade, especially in the world of manufacturing. Innovation, efficiency, safety and hygiene have been the order of the day for quite some time, with the latter gaining more spotlight due to the coronavirus pandemic.

With production lines in many industries, such as pharmaceutical, food and beverage to the automotive industry, needing to work around the clock to support the US economy and beyond, innovation -- and the use of technology -- in factories and warehouses must continue well past the point a vaccine is found for the virus. Today, we look at how the evolution of technology has benefited the manufacturing sector so far and what the future looks like in a post-pandemic world.

Continue reading

Windows 10 is getting a screen recorder PowerToys utility called Video GIF Capture

Microsoft Video GIF Capture PowerToy

Here on BetaNews, some of our most constantly popular posts relate to Windows 10's 'secret' screen recorder that is part of the Game Bar tool.  Seemingly aware that people are keen to be able to create video of on-screen activity, Microsoft is now working on a dedicated screening recording app.

Currently known as Video GIF Capture, the tool is being created by the PowerToys developers and it promises to give people the ability to record what is happening on their screen and save it as an animated GIF or video file.

Continue reading

Calibre 5.1.0 builds on recent 5.0 release to deliver improved search functionality to all-in-one eBook tool

Popular ebook management (and creation) tool Calibre 5.1.0 has been released, just one week after version 5.0 made its debut. The open-source tool, which is available on Windows, Mac, and Linux, fixes several bugs while adding a couple of minor new features.

The main highlight is the ability to use templates in search expressions, while a new checkbox gives users the ability to disable automatic update of lookups when text changes in the Viewer lookup panel. The Viewer also now supports the skipping of a confirmation when the remove highlight button has been used in the popup bar.

Continue reading

A practical guide to cloud migration

According to FLEXERA 2020 State of Tech Spend Report, the top three IT investments that organizations of all sizes are considering in the current scenario are digital transformation, cybersecurity, and cloud migration. Another report from Research and Markets says the global cloud computing market is expected to grow from USD 371.4 billion in 2020 to USD 832.1 billion by 2025. There are multiple reasons why organizations are considering and prioritizing cloud adoption. While cost optimization is one of the key reasons, it’s not the ONLY reason.

Businesses know that they’ll have to accelerate their digital strategy to ensure growth in the coming years. Moving to the cloud will provide them the much-needed elasticity, agility, flexibility, and security to achieve and sustain that growth. The COVID-19 pandemic has also brought to the forefront the need for a robust remote workforce -- and that’s another reason cloud readiness has gained additional importance.

Continue reading

Four steps to securing sensitive data in the cloud

Data cloud lock

For organizations across the globe, the journey to effectively manage, and extract value from, sensitive data in the cloud isn’t a new one. IT and security professionals have long struggled with challenges to the easy adoption of cloud technologies, and the question of how to ensure that data, including personal identifiable information (PII) or sensitive data, stays safe and compliant with regulatory requirements, without sacrificing data utility, remains a top challenge.

In 2020, the ongoing global pandemic increases this obstacle as remote work drives businesses to move more activity to the cloud quickly. A cloud usage survey released in May found organizations had already surpassed their 2020 cloud spend budget by 23 percent -- highlighting the question of how well data is being protected during this shift to home offices.

Continue reading

Is it time to retire your VPN?

Historically, one of the most popular tools used to connect remotely to a corporate work environment has been a virtual private network -- VPN for short. A VPN enables corporate users to send and receive data across public networks such as the internet through a secure encrypted tunnel, providing something akin to a direct, private connection to the corporate network.

However, VPN technology was introduced at a time when business IT environments reside on business premises, and did not include distributed elements that are now commonplace, such as cloud computing, mobile devices, and flexible remote work policies. Even as VPNs have adapted to stay relevant to some of the changes in how people now work, they have struggled to keep up with the modern threat landscape.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.