Redefining security in mobile networks with clientless SASE

SASE, Secure Access Service Edge

As organizations adapt their IT ecosystems to incorporate IoT devices and expand remote working opportunities allowing employees to use personal mobile devices, enterprise mobility has become indispensable in modern business operations. Nonetheless, this shift presents numerous security challenges and lifecycle management considerations, especially given that mobile devices connecting to networks frequently lack compatibility with traditional security solutions such as Virtual Private Networks (VPNs) or endpoint tools.

Mobile Network Operators (MNOs) and Mobile Virtual Network Operators (MVNOs) are at the forefront of this challenge. These service providers are tasked with the dual responsibility of ensuring optimal connectivity while safeguarding data privacy and user experience. As the market for basic connectivity services becomes increasingly commoditized, these operators are compelled to explore new avenues for revenue through value-added services. Among these, security services stand out as a promising opportunity.

Continue reading

It's not all artificial: The 4 types of intelligence CTOs need to get the most out of AI

Enterprises plan to spend roughly $35.5 million on IT modernization in 2024, with over a third going to AI to boost productivity. But it’s not all sunshine and rainbows. At the same time, 64 percent of IT leaders worry about rushing to adopt generative AI without understanding what's needed to use it effectively and safely. And while 75 percent of organizations have experimented with generative AI, only 9 percent have adopted the technology widely. There’s so much more potential to tap into.

To get the best out of AI to supercharge operations it all comes down to intelligence. Afterall, AI is only as intelligent as those using it. There are the four types of intelligence that CTOs need to build, and it’s nothing to do with coding or super complicated technology. It’s about cultivating soft skills and human talent to control AI in a responsible way.

Continue reading

Microsoft releases the surprisingly feature-packed KB5037853 update for Windows 11

Laptop running Windows 11

It is the time of the month when Microsoft releases previews versions of the following month's updates for Windows, and this week this means the KB5037853 update is available for Windows 11.

As this is a preview, it does not include security fixes and is optional. But the KB5037853 update for Windows 11 is significant because it adds a large number of features to the operating system. In addition to updating sharing options, it also fixes bugs and starts the rollout of the new account manager on the Start menu.

Continue reading

Compliance and cybersecurity in the age of AI [Q&A]

Artificial Intelligence is dramatically transforming the business landscape. It streamlines operations, provides critical insights, and empowers businesses to make data-driven decisions efficiently. Through machine learning, predictive analytics, and automation, AI assists in identifying trends, forecasting sales, and streamlining supply chains, leading to increased productivity and improved business outcomes. It isn't, unfortunately, without problems.

We talked to Matt Hillary, Vice President of Security and CISO at Drata, about the issues surrounding AI when it comes to critical security and compliance.

Continue reading

Framework launches upgraded Laptop 13 with Intel Core Ultra processors

Framework has unveiled the latest iteration of its Laptop 13, now equipped with Intel Core Ultra Series 1 processors, a high-resolution 2880x1920 120Hz display option, and a new 9.2MP webcam. The new webcam technology borrows techniques from modern smartphone cameras, delivering superior low-light performance and clearer audio with its upgraded microphones.

This year’s model marks the fourth generation of Framework Laptop 13 utilizing Intel processors, each iteration benefiting from significant performance enhancements. The latest Intel Core Ultra Series 1 processors offer substantial improvements in efficiency and battery life, notably during video playback. These processors support up to 96GB of DDR5 memory and feature a blend of 6 Performance and 8 Efficient cores, which elevate both productivity and gaming capabilities.

Continue reading

Unlocking cybersecurity success: The need for board and CISO alignment

The C-Suite’s perception of cybersecurity has evolved dramatically over the past decade. It’s gone from being an afterthought for technology departments to worry about, to a cornerstone for business survival and operational strategy. The heightened awareness of cybersecurity stems from a deeper grasp of the legal, reputational and financial implications of data breaches. This, combined with regulatory pressures such as the original NIS directive, has forced leaders to enhance their organizations’ cybersecurity measures.

The result is that 75 percent of organizations now report that cybersecurity is a high priority for their senior management team. While on the surface this should be celebrated, when digging deeper, conversations between CISOs and the wider C-Suite often just revolve around high-profile or user-centric security risks. More technical and advanced threats such as those related to application security are overlooked. The race to embrace AI and increasingly complicated cloud infrastructures have also made communicating cybersecurity priorities even more difficult for CISOs.

Continue reading

Out of the shadows and into the light: Embracing responsible AI practices amid bias and hallucinations

Artificial Intelligence AI

The path to widespread AI is a bumpy one. While its potential to enhance consumer experiences and streamline business operations through personalization, autonomy, and decentralized reasoning is evident, the technology comes with inherent risks.

AI can produce conclusions that aren’t true, spread misinformation and in some cases, perpetuate existing biases. This -- the darker side of AI’s impact -- can leave business leaders facing financial, legal, and reputational damage.

Continue reading

Balancing security and autonomy: Strategies for CISOs in the cloud era

Cloud data protection

Maintaining a secure cloud environment is one of the most important responsibilities of any CISO today, given that over 50 percent of all cyberattacks now originate in the cloud. However, this is a daunting task, as security must now be balanced against other priorities such as maintaining agile operations and the need to innovate.

Organizations today are racing to accelerate their cloud adoption due to the need for greater scalability and cost-efficiency. It has, therefore, become a critical business strategy to ensure efficiency, accessibility, and sustainability in operations. As a result, cloud investments are soaring across the board. Gartner predicts that end-user spending on public cloud services will reach $679 billion by the end of this year and exceed $1 trillion by 2027.

Continue reading

Google unveils Fitbit Ace LTE smartwatch for kids

In an era where parents grapple with balancing their children's independence with safety, Google steps in with a solution—the Fitbit Ace LTE. This new device is designed for kids aged 7 and older and marks Fitbit's latest foray into youth-oriented products. The Ace LTE is not just a tool for tracking physical activity but also a connected smartwatch that incorporates safety features such as reliable calling, messaging, and location sharing.

The Ace LTE aims to make physical activity enjoyable by merging exercise with digital play. It offers interactive 3D games that encourage kids to move more to unlock playtime. Utilizing the smartwatch's built-in features like haptics, sounds, and an accelerometer, these games create a captivating experience for young users. Kids can enjoy a variety of games, such as racing through space as a chicken in a bathtub or fishing at "Smokey Lake."

Continue reading

Tens of thousands of websites vulnerable to data breaches

Over 58,000 unique websites from around the world are vulnerable to data breaches and even complete takeovers according to new research.

The Cybernews research team has investigated publicly exposed environment files (.env) that should be kept private and protected at all costs. These files hold passwords, API keys, and other secrets that websites need to access databases, mail servers, payment processors, content management systems, and various other services.

Continue reading

Why cloud attacks no longer need malware [Q&A]

Cloud risk

As organizations have come to rely more on the cloud, it's become an increasingly attractive target for cybercriminals seeking to steal data or extract ransoms.

In the past this has involved the use of malware, but as attackers get more sophisticated there’s a move towards different types of attack. We spoke to Shai Morag, SVP and general manager cloud security at Tenable, to discover more about these threats and how to tackle them.

Continue reading

Logitech announces MeetUp 2: AI-powered conference camera

Logitech has revealed the upcoming release of MeetUp 2, an AI-enhanced USB conference camera tailored for bring-your-own-device (BYOD) and PC-based setups in huddle and small meeting rooms. Building on the success of its predecessor, the best-selling Logitech MeetUp that has reached over one million units sold, this new model is set to launch in August.

Henry Levak, VP of Product at Logitech B2B, highlights the camera's innovative features, "MeetUp 2 leverages AI with RightSight 2 to create dynamic views that engage remote users effectively, alongside RightSound 2 for advanced voice equalization and noise suppression." This next-generation device also allows IT teams to monitor and update the system remotely, continually enhancing its capabilities.

Continue reading

Microsoft brings Copilot to Telegram

Microsoft has brought its AI-powered Copilot chatbot to the Telegram messaging platform in beta. Designed to enhance user interaction, it leverages Microsoft's GPT models and Bing Search capabilities to provide a wide array of services. These include answering queries with quick facts, offering travel advice, updating sports scores, and giving movie recommendations. Users can interact with Copilot by typing natural language commands, similar to messaging a friend.

To access Copilot, Telegram users can either follow a direct link if they are already using the Telegram app or web platform, or search for @CopilotOfficialBot in Telegram's search bar. Currently in beta, Copilot is free for all users and is available across various operating systems including Windows, macOS, Android, and iOS, as well as via web browsers.

Continue reading

DDoS cyber-attack targeting Internet Archive and the Wayback Machine

Internet-Archive-Wayback-Machine

The DDoS cyber-attack currently targeting the Internet Archive and its Wayback Machine has entered its third day, causing intermittent disruptions in service. The nonprofit research library is best known for housing millions of historical documents, preserved websites, and media content.

The ongoing intrusion has involved the launch of tens of thousands of fake information requests per second, though the source of the attack remains unknown.

Continue reading

Microsoft Start Weather blows away the competition with AI-powered forecast accuracy

Microsoft Start Weather has been recognized as the “overall most accurate weather forecast provider globally” by ForecastWatch for the second consecutive year, relying on AI technology for enhanced forecasting accuracy.

This recognition followed an independent analysis involving 22 weather services, evaluated across 13 metrics throughout 2023. Microsoft Start Weather performed notably well in accuracy for predicting temperatures and cloud cover for short-term forecasts of 1-5 days.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.