85 percent of enterprise web traffic is cloud services

Cloud

A new study based on aggregated, anonymized data from millions of global users reveals that cloud services now account for 85 percent of all enterprise web traffic.

The report from cloud security company Netskope also reveals that heavy use of cloud services is often driven by multiple instances of cloud service usage across an organization.

Continue reading

Cisco to pay $8.6 million for supplying the US government with software known to be insecure

Cisco has agreed to pay $8.6 million to settle a claim that it sold video surveillance software to the American government even though it was aware it contained security vulnerabilities.

A total of fifteen US states filed a case under the False Claims Act after Homeland Security, the Secret Service, the Army, the Navy, the Marines, the Air Force and the Federal Emergency Management Agency all purchased flawed software from Cisco. Rather than improving security as desired, the complainants said that Cisco's software actually made systems less secure.

Continue reading

Lost in the world of endless scrolling

Can you help me? I seem to be lost. I was surfing the Internet for funny cat videos and I stumbled onto this "web page." Or, at least, I thought it was a page. Now, I’m not so sure. I’ve been scrolling for a while now, but I can’t seem to find a way out. Every time I think I’ve reached the end, I find myself in yet another "page." Yet I have no recollection of clicking a link or taking any direct action. It just sort of…happened.

I think I remember where I started from. There was this link to a story about kittens. Or maybe it was baby tiger cubs. I’m not too sure anymore. In fact, my memory of just where I’ve been or even how I got to this point is a little fuzzy.

Continue reading

Closing the complexity gap in device management

plugging a gap

The device landscape is becoming increasingly complex, as the proliferation of platforms, manufacturers and ownership options intersects with the need to track, manage and secure these devices in an ever-changing risk environment.

Piece by piece, IT teams have picked up new devices and solution-specific tools to manage and track each device or pain point as it arises. Over time, organizations may develop entirely different teams to oversee similar management tasks for different platforms. While these specialized tools are effective individually, as the device landscape and management tasks expand, the net result of these devices and siloed tools is a "complexity gap" that outpaces the staff needed to manage them all.

Continue reading

Four ways your boss can access your private data

employee snoop

Privacy is a currency these days. With social media, target advertising, and constant connectivity, it’s harder than ever to keep elements of your private life truly private. This crisis of privacy becomes especially concerning in the context of the workplace.

In the old days, it was easy to keep your work life and your personal life entirely separate. Today, those boundaries are blurrier than they used to be, and that fact has led to a big question for many employees: how much of my private data can my boss access?

Continue reading

Microsoft releases Windows 10 20H1 Build 18950 and teases forthcoming 'Cloud download' feature

Microsoft released two Windows 10 20H1 builds to Insiders last week --18947, which was pushed out accidentally to all Insiders and sported an ugly revamped Start menu without Live titles, and 18945, which rolled out as expected and came with welcome improvements to Cortana, Windows Subsystem for Linux, and File Explorer.

Today we’re back to how things usually run, with a new build for Insiders on the Fast ring.

Continue reading

Samsung Galaxy Tab S6 is actually a really exciting Android tablet

Android tablets have fallen out of favor with consumers, and that's sad. Things have gotten so bad for this device type that Google -- the maker of Android -- has even pulled the plug on making them. Yikes! That is as ominous as it gets, folks. Why did this happen? Well, I blame the influx of cheap no-name tablets from China that crowded the market. Not to mention, smartphones started getting ridiculously large, making tablets a bit redundant. Ultimately, Android tablets became synonymous with crap. With the exception of Samsung and Huawei, quality tablets running Google's mobile OS have been few and far between.

Today, Samsung announces its latest Android tablet, and you know what? It is actually very exciting. Called "Galaxy Tab S6," it is just 5.7mm thin and has a 10.5-inch Super AMOLED screen. The device is outfitted with some really cool technology too. For instance, it has an in-display fingerprint reader and a dual-camera setup on the rear -- one of the lenses is "ultra wide." It features an octa-core processor with either 6GB or 8GB of RAM -- depending on configuration. Storage is either 128GB or 256GB, and yes, you can increase that using micro SD. The super-cool DeX feature, which can essentially transform the tablet into a desktop/laptop experience, is also included.

Continue reading

Flexera helps businesses tackle vulnerabilities more quickly

Installing...

In the modern world it's vital for businesses to know what software they have, and where vulnerabilities lie. Flexera already assists IT and security teams to do this with its Software Vulnerability Manager, and it's now launching new modules to help address threats.

It's produced two new modules for SVM. The first of these is the Vendor Patch Module, which allows organizations to take advantage of insights and mitigate them more quickly, by using comprehensive patch coverage -- with more than 1,000 out-of-the-box patches. Additionally, the Vendor Patch Module delivers details to help companies more easily create over 1,000 additional patches.

Continue reading

Jaybird VISTA wireless headphones make Apple AirPods look like trash

AirPods are trash. Yeah, I know, they are very popular and Apple sells a ton of them, but that doesn't mean they are good. Look, the iPhone-maker could do much better than a set of rigid hard plastic things that you shove in your ear. They cause me, and others, severe ear canal pain. It doesn't have to be that way either -- Apple could very easily design them with replaceable tips to provide a customized experience. But no, Tim Cook and company would rather not. Oh well.

Thankfully, there are other companies willing to acknowledge that not everyone has the same size ear holes. Jaybird, for instance, makes many comfortable wireless headphones with replaceable tips. Their focus is on both performance and comfort -- what a concept! Today, the company launches its latest product, and it is clearly an AirPods-killer. Yeah, calling a product that competes with Apple a "killer" is a bit of a cliché, but hey, facts are facts.

Continue reading

NordVPN brings WireGuard-based NordLynx to Linux users

VPN shield

NordVPN has announced an important new option for users of the Linux version of its eponymous VPN tool. The company is introducing a new technology called NordLynx which is based on the WireGuard protocol.

The company says that it successfully combines the highspeed connection offered by WireGuard with NordVPN's own privacy-protecting double NAT system.

Continue reading

Chrome 76 arrives, blocking Flash and making paywalls easier to bypass

Chrome icon with a padlock

Google has released Chrome 76 for Windows, macOS and Linux. As expected from the preview releases, this version of the browser brings a couple of important changes: Flash is now blocked by default, and Incognito mode detection is also blocked.

The blocking of Flash will be welcomed by many, and -- once word spreads about what the implications are (namely that it makes it far easier to get around paywalls) -- the same is likely to be true of the changes to the detection of Incognito mode. The changes have been welcomed by privacy and security advocates.

Continue reading

Phishing and credential stuffing remain top threats

Phishing password

As we have seen in another report today, the financial sector remains a prime target for cybercriminals. Phishing attacks and credential stuffing are the two most common forms of attack used against the industry according to another report from Akamai.

In the six months between December 2018 and May 2019, nearly 200,000 phishing domains were discovered by the research and 50 percent of all unique organizations impacted are from the financial services sector.

Continue reading

Financial sector faces a broad range of cyberthreats

card theft

The finance industry is a prime target for cyberattacks and a new report from F-Secure shows that it's facing a wide range of threats that go far beyond traditional theft.

Attacks targeting banks, insurance companies, asset managers and similar organizations can range from common script-kiddies to organized criminals and state-sponsored actors. And these attackers have an equally diverse set of motivations for their actions, with many seeing the finance sector as a tempting target due to its importance in national economies.

Continue reading

Microsoft announces that Skype for Business Online will be retired

Microsoft building logo

As Microsoft continue to push Teams, the company has announced that Skype for Business Online will be retired in 2021.

While this is far from surprising, this is the first time a date has been mentioned so users can prepare to transition away. With the retirement date set at July 31, 2021, users have two years to get ready for a move to Teams.

Continue reading

Apple Card: The Apple credit card is coming in August

Apple Card

You might well be waiting for news of the new iPhone line-up, and we'll know more about that soon. In the meantime, however, Apple has a new product for its loyal fanbase. A credit card.

The Apple Card has been talked about for some time, and now Tim Cook has revealed that it will be launching in August. The news came from the Apple CEO during an earnings call yesterday, and he said that the company's employees have been beta testing the Apple Card, which comes in both digital and physical forms.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.