Latest Technology News

Getting up close and personal: How hyper-personalization is driving the next generation of digital applications

As technology continues to converge with our everyday lives, demand for more intuitive digital services is rising. Consumers now expect brands to provide them with more convenience and relevance than ever before.

Personalization within their digital offerings is a key way for businesses to do this, as McKinsey reports that almost three quarters of buyers now expect personalized interactions. However, personalization is just the beginning. To truly meet customer expectations, organizations must go one step further and aim for hyper-personalization.

Continue reading

The importance of security training in the zero trust era

Momentum for zero trust migration is accelerating across the cybersecurity community. It was a fundamental component of the Biden Administration’s 2023 National Security Strategy. Nearly 90% of global organizations have already started implementing basic aspects of a zero trust security model. And in Forrester’s 2024 predictions report, analysts forecast that dedicated roles with “zero trust” in the title are expected to double over the next year.

This is because the need for zero trust authentication has never been clearer. Conventional network security approaches are increasingly vulnerable in today's cloud enterprise environment, where post-pandemic digital transformations, software supply chains, remote work models and bring-your-own-device policies have widened the attack surface. Cloud-based cyberattacks increased by nearly 50 percent in 2022. Meanwhile, more than 10 million people were impacted by supply chain attacks over the same year.

Continue reading

Get 'Enterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ChatGPT Solutions' (worth $48.99) for FREE

Enterprise AI in the Cloud is an indispensable resource for professionals and companies who want to bring new AI technologies like generative AI, ChatGPT, and machine learning (ML) into their suite of cloud-based solutions.

If you want to set up AI platforms in the cloud quickly and confidently and drive your business forward with the power of AI, this book is the ultimate go-to guide.

Continue reading

Lexar launches Professional SL600 USB 3.2 Gen 2x2 portable SSD

Today, Lexar launches the Professional SL600. This portable solid state drive is designed to meet the needs of photographers, videographers, content creators, and business professionals. The new USB-C SSD boasts USB 3.2 Gen 2x2 technology, delivering impressive read and write speeds of up to 2000MB/s.

The Lexar Professional SL600 portable SSD is not only fast but also built to withstand the rigors of travel and on-location work. Its durable aluminum enclosure provides protection against bumps and drops, while its shock- and vibration-resistance ensures the safety of saved files. Additionally, the drive comes equipped with Lexar DataShield, a 256-bit AES encryption software, offering an extra layer of security for sensitive files.

Continue reading

Over half of gen AI inputs contain PII and sensitive data

In a new report on the impact of generative AI on security posture, Menlo Security looks at employee usage of gen AI and the subsequent security risks these behaviors pose to organizations.

It finds that 55 percent of data loss prevention events detected by Menlo Security in the last thirty days included attempts to input personally identifiable information. The next most common type of data that triggered DLP detections included confidential documents, which represented 40 percent of input attempts.

Continue reading

42 percent of applications suffer from 'security debt'

A new report from Veracode shows that software security debt -- flaws that have gone unfixed for over a year -- is found in 42 percent of applications.

Although the number of high-severity flaws has reduced 70.8 percent of organizations still suffer from security debt. 45.9 percent have critical security debt, that is high-severity flaws that have been unfixed for 12 months or more.

Continue reading

CMS challenges prevent organizations unlocking their data

New research finds that 84 percent of organizations believe their existing content management system (CMS) is preventing them from unlocking full value from their data and content.

The study, from headless CMS company Hygraph, surveyed 400 professionals in product and engineering roles across the US, UK, and Germany, and finds 92 percent of organizations say their content and data sources are currently siloed, with 38 percent describing it as 'very siloed'. This means the work required to integrate all these sources is both time-consuming and expensive.

Continue reading

Microsoft releases KB5034765 update for Windows 11, moving the Copilot button and fixing the Start menu

Copilot

If you've been irritated by the positioning of the Copilot button in Windows 11, the newly released KB5034765 update is for you.

This month’s patch for Windows 11 not only boosts security and fixes numerous bugs, it also sees the button for accessing Microsoft's AI-powered assistant moving. It effectively replaces the "show desktop" button in the taskbar.

Continue reading

Ways to keep your information safe when gaming online

Keeping your information safe when gaming online reduces the risks of cyberbullying, privacy invasion, and identity theft. The online gaming world is rife with cases of data and information loss due to reasons like shady downloads and virus attacks. However, by implementing some online gaming best practices, avid online gamers can avoid being victims of these situations.

Here are some tested and proven ways to keep your information safe when gaming online.

Continue reading

What enterprises need to know about cybersecurity compliance [Q&A]

Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.

Cam Roberson, VP at Beachhead Solutions, a provider of cloud-managed PC and mobile device encryption, security, and data access control, sat down with us to discuss what enterprises need to know about the current state of cybersecurity compliance.

Continue reading

1Password launches global partner program

1Password has launched its new global partner program today, aiming to enhance its suite of security solutions through strategic partnerships and support tools. This initiative is part of a multi-year strategy designed to provide partners with comprehensive access to 1Password’s security solutions and a toolkit of sales, marketing, and enablement resources.

The program is launching with key partners including Amazon Web Services (AWS), Arrow Electronics, Insight Enterprises, Microsoft, SVA, and many others. 1Password aims to grow its partner ecosystem further by adding more partners across North America, EMEA, and APAC regions.

Continue reading

Authy desktop apps for Windows, macOS, and Linux reach end-of-life: Here's what you need to know

There is some shocking and sad news that will impact Authy users globally. You see, Twilio has announced the end-of-life for its desktop applications on Windows, macOS, and Linux platforms, slated for March 19, 2024. This move highlights a change in the company's strategy, emphasizing the transition towards mobile-centric security solutions.

Authy has been a staple for users seeking an extra layer of security beyond traditional passwords. The desktop applications have provided a convenient way for users to manage their authentication tokens directly from their computers. However, with the upcoming discontinuation, Authy is urging its user base to migrate to its mobile applications.

Continue reading

Enterprises need to adapt security measures to cope with changing threats

Cybersecurity-blocks

With cyber threats becoming increasingly sophisticated, organizations face new challenges in safeguarding their digital assets. A new report from Info-Tech Research Group looks at the issues IT and security leaders must prioritize over the coming year.

It highlights the need to take account of the cybersecurity talent shortage, the rise of AI-driven threats, the integration of security risks with business risks, the adoption of zero-trust frameworks, and the increasing significance of automating security operations.

Continue reading

SwiftKey: After Bing Chat AI comes Copilot

Less than a year after adding Bing Chat AI to SwiftKey, Microsoft is now in the process of replacing the implementation with Copilot. SwiftKey is a popular virtual keyboard solution for Android and iOS.

Microsoft acquired SwiftKey more than eight years ago. The third-party keyboard solution had over 300 million users on Android and iOS at the time.

Continue reading

'Hunter-killer' malware able to neutralize advanced defenses

A new report from Picus Security looks at real-world malware samples and identifies the most common techniques leveraged by attackers.

It identifies a surge in 'hunter-killer' demonstrating a shift in adversaries' ability to identify and neutralize advanced enterprise defenses such as next-gen firewalls, antivirus, and EDR. According to the report, there has been a 333 percent increase in malware that can actively target defensive systems in an attempt to disable them.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.