80 percent of enterprises struggle to protect machine identities

network

The protection of human identities tends to be high on the agenda for organizations, but what about machine identities?

Recent increases in the number of machines on enterprise networks, shifts in technology, IoT devices and new computing capabilities have created a set of challenges that require increased focus on protecting machine identities.

Continue reading

New technology moves AIOps out to the edge

Edge computing

Artificial intelligence for operations (AIOps) is gaining ground, allowing businesses to use AI and machine learning on big data from their devices and IT tools to find and address problems in real time.

Pioneer in the field Moogsoft is launching a new tool that extends its core AIOps platform capabilities from centralized analytics outwards to the data source.

Continue reading

Google's Titan Security Key now available for $50

Google Titan Security Key

A month after it was announced, Google is now selling its Titan Security Key for $50. Currently available in the US, the FIDO-compatible keys help to boost security with two-step verification (2SV).

Google boasts that the keys have "special sauce" in the form of tamper-resistant firmware that helps to further improve security. Costing roughly the same as a Yubikey, Google is hoping to offer a viable alternative to the current FIDO key leader.

Continue reading

YouTube alternative Facebook Watch rolls out globally

Facebook Watch

Following a successful launch in the US a year ago, Facebook is launching its Watch service globally. Competing directly with the likes of YouTube, Facebook Watch is the social network's platform for original video content, including Major League Baseball games and entertainment news.

Just 12 months after launching in the US, the service enjoys 50 million monthly viewers and Facebook will be hoping to continue this success in other parts of the world. The company is pushing the social aspect of Facebook Watch as a major draw.

Continue reading

Sony SF-G TOUGH SD card is extremely rugged and world's fastest

When you think of SD cards, your mind probably goes to brands such as SanDisk and Kingston. While both of those companies make great storage products, they aren't the only game in town. In fact, Sony actually sells both storage cards and USB flash drives that are quite good.

Sony's latest SD card is very intriguing. Called "SF-G TOUGH," it is designed to be extremely rugged -- it is IPX8 waterproof, IP6X dust-proof, and will survive drops from up to 5 meters. By design, it has no write-protection switch, as that part that can be prone to failure. In addition, Sony says these TOUGH cards are "X-ray proof, magnet proof, anti-static, temperature proof and feature UV Guard." Its durability is only half of the equation, however.

Continue reading

You may soon be able to sign into Windows 10 with a Google account

At the moment, you have two options when using Windows 10. You can create a local account, or you can use a Microsoft account to sign in. In the future, however, it’s possible that you might also be able to sign in using your Google account details.

ChromeStory spotted a massive code commit on the Chromium Gerrit site which refers to a "Google Credential Provider for Windows."

Continue reading

Attention span of a goldfish? Maybe the message is at fault

Goldfish and laptop

It's commonly assumed that the internet and electronic communication is making people less able to concentrate and leading to shorter attention spans.

But a new study from presentation platform Prezi finds that in fact attention spans may not be shrinking, rather they are evolving to be more selective.

Continue reading

SocialChorus platform aims to modernize workforce communications

communication

As technology makes many workplaces more fragmented with staff out in the field or working from home, keeping everyone up to date with company activity can become a major challenge.

Workforce communications platform SocialChorus is aiming to provide a seamless and scalable experience for internal communicators with the launch of its new Innovation Lab.

Continue reading

The top cybersecurity concerns for IT and business

business fear

Everyone is aware that cybersecurity threats are out there, but what are the biggest threats and are IT and business executives worried about the same things?

New research from data security specialist Varonis highlights some major differences -- and potential challenges -- when it comes to communicating and aligning on key threats.

Continue reading

Stay ahead of cyber threats with effective cybersecurity training

training key

According to the ESG brief: 2017 Cybersecurity Spending Trends, 45 percent of organizations claim to have a problematic shortage of cybersecurity skills. Another ESG report, The Life and Times of Cybersecurity Professionals, reveals that 27 percent of cybersecurity professionals say that the cybersecurity skills shortage has had a significant impact on their organizations.

Training a capable IT staff to keep their network secure and running amid a growing threat landscape is a business imperative. Here’s a look at what executives need to keep in mind to increase the security posture of their organization through cybersecurity training.

Continue reading

Are you the target of a Smishing attack?

Internet scam artists have found a new way to deceive user to surrender their personal information. It’s called SMISHING -- when someone tries to trick you into giving them your private information (including user IDs and passwords) via a text or SMS message.

It is an emerging and growing threat, a form of criminal activity using social engineering techniques in the same way Phishing is for email scamming. Smishing may include tricking the user into downloading a Trojan horse, virus or other malware onto their cell phone or other mobile device. Criminals love Smishing because users tend to trust text messages, as opposed to email, of which people are naturally more suspicious.

Continue reading

Privacy: Yahoo still scans your emails... and wants to sell data to advertisers

Yahoo sign logo building

Oath -- the owner of Yahoo -- is in talks with advertisers, promoting a service that scans the content of emails and provides a wealth of information about users.

The service would give advertisers access to data contained in over 200 million Yahoo Mail inboxes. Email scanning would also apply to AOL Mail inboxes, also owned by Oath. As noted by the Wall Street Journal, Oath is now the only major US email provider than scans emails in this way -- and the way to opt out is well-hidden.

Continue reading

Now you can get verified on Instagram

While getting a verified account is something that's usually associated with Twitter, other social media services have similar schemes -- Facebook, for instance. The latest to join the verification party is Instagram which is now giving users the option of applying for a verified badge.

It is possible for anyone to request to have their account verified, but only a handful of applicants are likely to be accepted. Instagram has outlined details of how to apply, and the criteria that need to be met.

Continue reading

Google denies bias after Trump launches accusatory attack on the search giant

Broken Google logo

Donald Trump has accused Google of rigging its search results so that "good news" about the president is drowned out by unfavorable stories from the "Fake News Media".

Using his preferred medium of Twitter, he alleged that 96 percent of search results for "Trump News" were from the "National Left-Wing Media", something he described as "very dangerous". Google denied these  accusations of political bias, saying searching results are controlled by constantly-updated algorithms.

Continue reading

TP-Link announces Intel-powered Archer C2700 Dual-Band AC2600 Wi-Fi Router

I am a huge fan of TP-Link routers. While not the most popular brand with the mainstream, in-the-know consumers choose the company's products as a way to save money without sacrificing quality. These budget-friendly routers offer very respectable performance and many useful features. Hell, you can score a really nice TP-Link router with Amazon Alexa support for less than $80!

Today, TP-Link announces a higher-end router powered by the Intel Home Wi-Fi Chipset. The "Archer C2700," as it is called, is an AC2600 (1733Mbps 5GHz band, 800Mbps 2.4GHz) Dual-Band Wi-Fi router with four Gigabit LAN ports. Two of those LAN ports can be aggregated for a combined 2 Gbps -- great for a compatible NAS. It also features two USB Type-A ports -- one is 2.0, while the other is 3.0. And yes, it has Amazon Alexa support!

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.