Latest Technology News

Get 'Kubernetes Secrets Handbook' (worth $35.99) for FREE

Securing Secrets in containerized apps poses a significant challenge for Kubernetes IT professionals.

Kubernetes Secrets Handbook tackles the critical task of safeguarding sensitive data, addressing the limitations of Kubernetes encryption, and establishing a robust Secrets management system for heightened security for Kubernetes. Starting with the fundamental Kubernetes architecture principles and how they apply to the design of Secrets management, this book delves into advanced Kubernetes concepts such as hands-on security, compliance, risk mitigation, disaster recovery, and backup strategies.

Continue reading

Cloud Software Group and Microsoft announce $1.65 billion cloud and AI partnership

Cloud Software Group and Microsoft have announced an eight-year strategic partnership agreement, with Cloud Software Group committing $1.65 billion to Microsoft’s cloud and generative AI capabilities. This collaboration aims to strengthen the Citrix virtual application and desktop platform and develop new cloud and AI solutions with an integrated product roadmap.

Under this partnership, Citrix, a business unit of Cloud Software Group, will be the preferred Microsoft Global Azure Partner solution for Enterprise Desktop as a Service when collaborating with joint Azure customers. The companies will jointly support customer success by offering tailored solutions, expert guidance, and support to accelerate customers’ cloud journeys. Citrix will also leverage Microsoft Azure as its preferred cloud solution, integrating the benefits of the Citrix platform with Azure Virtual Desktop and Windows 365.

Continue reading

Industry turns to zero trust

A new study of industrial enterprises shows 72 percent have started adopting zero trust principles, with 38 percent of organizations establishing, implementing, and optimizing zero trust control measures.

The study from Xage and Takepoint Research surveyed over 250 cybersecurity senior leaders across critical infrastructure organizations, energy, utilities, transportation, oil and gas and manufacturing to gauge the current state of zero trust implementation.

Continue reading

Google may lock AI search results behind a paywall

AI search

Aa a company synonymous with search and a love of AI, it is little surprise that Google is combining the two. But people familiar with the company’s plans suggest that AI-powered search features could have a price tag attached to them.

The move would be a first for Google as the company has never charged for any search product, and it could be a sign that ads are simply not bringing in enough money. It is something that has been described as a big change to its business model, but it is not clear if this is a sign of further search-related charges to come.

Continue reading

Google finally starts rolling out Find My Device for Android to rival Find My from Apple

Woman with phone and magnifying glass

Almost a year after it was first announced, Google is finally rolling out its offline Find My Device service for Android devices.

All but identical to Apple's Find My network, Google's offering not only makes it possible to track the location of Android handsets, but also includes support for third-party AirTag-style trackers. While the rollout appears to have started, for now it is only a beta; a full launch is imminent, however.

Continue reading

Opera One web browser enhances AI capabilities: Adds local Large Language Models (LLMs) in developer stream

Opera has announced a huge AI update to its Opera One web browser in the developer stream. The company is introducing experimental support for 150 local Large Language Models (LLMs) across approximately 50 different model families. This innovative feature allows users to easily access and manage local AI models directly from the browser, a first in the industry.

The supported local LLMs include notable names such as Llama from Meta, Vicuna, Gemma from Google, Mixtral from Mistral AI, among others. The inclusion of local LLMs means that users can now leverage generative AI capabilities without the need to send data to external servers. This ensures that user data remains on the device, enhancing privacy and security.

Continue reading

Outrageous: Microsoft to charge $61 for Windows 10 updates -- consider switching to Linux!

Hold on to your hats, folks, because Microsoft is at it again. In a move that’s sure to ruffle some feathers, the tech giant has announced* that starting October 2024, just one year before Windows 10 reaches its end of support, the company will charge a whopping $61 per device for the first year of Extended Security Updates (ESU). And get this – the price will double every consecutive year for a maximum of three years! If you’re late to the party and join in Year Two, you’ll have to cough up the cash for Year One as well since these updates are cumulative. Talk about a slap in the face!

Now, let’s be clear: these Extended Security Updates are meant to be a temporary bridge for organizations that need more time to transition to Windows 11. They’re not intended to be a long-term solution. But let’s face it, for many businesses and individuals, upgrading to Windows 11 isn’t as simple as flipping a switch. There are compatibility issues, hardware requirements, and not to mention the hassle of migrating entire systems. So, this move by Microsoft feels like it's holding users hostage -- pay up or risk being left vulnerable to security threats.

Continue reading

Security vendor consolidation or best of breed? Why you must do both

Trends in cybersecurity (like many areas of technology and life) tend to make pendulum-like swings over time. One such shifting debate is around security tool philosophy: is it best to use an array of best-in-class tools or consolidate to a single, “do it all” security platform?

I argue that it is essential to planfully and strategically implement a hybrid approach. By combining some best-of-class tools with integrated platforms, you can eliminate the chaos of countless single tools and embrace the advanced benefits of today’s platforms, while still having some high-value, niche solutions to provide the necessary layers of protection for the security armor. It’s important to avoid dependence on a single vendor to also avoid implementing that vendor’s weaknesses/blind spots across the enterprise; yet these solutions offer many advantages.

Continue reading

Shielding the lifelines: Protecting energy and infrastructure from cyber threats

The energy and infrastructure sectors serve as the backbone of global stability and economic health, underpinning nearly all facets of modern society. As such, the integrity and reliability of these systems are paramount, and failure to maintain their uptime could lead to unprecedented disruptions in daily life. This reality underscores the pressing need to safeguard these sectors from evolving cybersecurity threats.

However, the very importance of energy and infrastructure makes them prime targets for cybercriminals. The surge in sophisticated email-based attacks, such as business email compromise (BEC) and vendor email compromise (VEC), poses a significant risk. These cyber tactics, often characterized by deceptive social engineering and the absence of traditional threat indicators, allow attackers to bypass conventional security measures easily. Understanding these attacks is the first step towards developing robust defenses against them.

Continue reading

fwupd abandons xz compression for zstd amid security concerns

Following the discovery of malicious code, fwupd, the popular firmware update utility, has decided to transition from xz to zstd compression for its metadata. Richard Hughes, the lead developer behind fwupd, outlined the rationale behind this decision in a recent blog post.

For years, fwupd has relied on compressed metadata to facilitate firmware updates for a wide array of hardware. This metadata, essentially a large XML file, was initially compressed using gzip, resulting in a 1.6MB download for end-users. However, in 2021, the fwupd team switched to xz compression, further reducing the file size to 1.1MB and saving significant bandwidth.

Continue reading

Microsoft is great, but not enough for email security

Microsoft-Email

Microsoft 365 is the default software in SMEs, and understandably. The software offers a comprehensive set of productivity tools; flexible, scalable, and affordable licensing options, and compliance and security capabilities. However, given the ever-growing and persistent threat of cyberattacks, for email security, the standard security safeguards offered are insufficient.

Analysis of over 1 billion emails worldwide shows that emails are the preferred vehicle of cybercriminals. Email-delivered malware remains a favorite, increasing by 276 percent between January and December of last year. Additionally, attachments are growing as a threat. In Q4 of 2023, EML attachments increased 10-fold. Criminals are sending malicious payloads via EML files because they get overlooked when attached to the actual phishing email, which comes out clean.

Continue reading

TEAMGROUP unveils 2TB T-CREATE EXPERT S.M.A.R.T. microSDXC card

TEAMGROUP has unveiled its latest offering for the creative community -- the T-CREATE EXPERT S.M.A.R.T. microSDXC memory card, now available in a substantial 2TB capacity. It is compliant with the UHS speed class U3, video speed class V30, and application performance class A2.

When used with a compatible professional card reader, the memory card boasts impressive read and write speeds of up to 170 MB/s and 160 MB/s, respectively. These speeds are essential for seamless 4K Ultra HD and 1080p Full HD video recording, as well as continuous photo shooting.

Continue reading

21 percent of S&P 500 companies reported breaches in 2023

According to the latest threat research from SecurityScorecard, 21 percent of S&P 500 companies experienced breaches in 2023.

The report shows that 25 percent of these breaches impacted financial services and insurance companies. Financial institutions have some of the most robust security programs because they have substantial money and assets. But the interconnected nature of the financial sector means that compromising one institution or commonly used product can lead to broader impacts across the entire industry.

Continue reading

Get 'Microsoft Office 365 All-in-One For Dummies, 2nd Edition' (worth $24) for FREE

Multiply your productivity with the world's most straightforward guide to the world's most popular office software.

Microsoft Office 365 contains straightforward tools for virtually every office task you could possibly think of. And learning how to use this powerful software is much easier than you might expect. With the latest edition of Office 365 All-in-One For Dummies, you'll get a grip on some of the most popular and effective office software on the planet, including Word, Excel, PowerPoint, Outlook, Access, Publisher, and Teams.

Continue reading

79 percent of security pros don't think their company has adequate protection

Half of security professionals say it's almost impossible to find the right balance between security and employee productivity, and 79 percent don't think their security protections are adequate.

A new study from 1Password, based on a survey of 1,500 North American workers, including 500 IT security professionals, finds 69 percent of security pros admit they're at least partly reactive when it comes to security. While 61 percent believe they're being pulled in too many conflicting directions.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.