Latest Technology News

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing -- which utilizes quantum mechanics to solve complex problems faster than conventional computers -- could potentially turn data security on its head.

IBM, Microsoft and Google have already turned their attention to quantum computing and, as a result, commercially viable quantum computers are not too far from becoming a reality. In fact the global quantum computing market size in terms of revenue was estimated to be USD 866 Million in 2023 and is poised to reach USD 4,375 Million by 2028, growing at a CAGR of 38.3 percent from 2023 to 2028. This is raising concerns that these computers might pose a threat to current public-key cryptography algorithms and potentially expose sensitive data. As such, data security needs to be a step ahead, with more advanced cryptographic algorithms that minimise potential risks and ensure the safeguarding of data in a quantum computing world.

Continue reading

X (Twitter) alternative BlueSky opens sign-ups for everyone

Bluesky butterfly logo

If you always wanted to sign-up for the X (Twitter) alternative BlueSky but never managed to get your hands on an invite code, you will be glad to hear that these codes are no longer required to create an account.

The social media service, which managed to grow to over 3 million users already, is now available for everyone. The number of users pales in comparison to the 130 million that Meta's Threads managed to accumulate, but it is more than Mastadon's 1.8 million.

Continue reading

Tech businesses turn to AI to improve revenues and compliance

Process efficiency and cost-saving are top priorities for life sciences and high-tech executives, with greater emphasis placed on advanced analytics and artificial intelligence (AI) to achieve these priorities according to a new report.

The study from Model N shows three-quarters of executives say their current approach to revenue optimization needs improvement, and survey responses show plans to bolster revenue operations by incorporating advanced analytics (68 percent), AI (59 percent), and robotic process automation (46 percent).

Continue reading

As-a-Service tools dominate the cyber threat landscape

malware alert

Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools now make up the majority of malicious tools in use by attackers, according to a new study.

The report from Darktrace shows malware loaders (77 percent of investigated threats) are the most common tool, followed by cryptominers (52 percent), and botnets (39 percent).

Continue reading

Plugable launches USBC-HDMI8K USB-C to HDMI 8K adapter

Plugable has launched its new USB-C to HDMI 8K Adapter. Dubbed "USBC-HDMI8K," this latest model is an advancement from its predecessor, featuring HDMI 2.1 compatibility, which allows for improved video and audio performance.

The USBC-HDMI8K adapter is targeted at a diverse user base, including gamers, video editors, and 3D enthusiasts, promising to deliver high-definition visuals with its support for 8K 60Hz, 4K 144Hz, HDR, Dolby Vision, and Dolby Atmos. The adapter's capabilities are aimed at providing a premium viewing and gaming experience, with its support for HDMI 2.1's 48Gbps throughput.

Continue reading

Cisco adds new AI and security innovations

Security and networking specialist Cisco is announcing changes to its Cisco Security Cloud as part of its mission to simplify security.

Cisco Identity Intelligence -- available from July this year -- will run on top of customers' existing identity stores and provides unified visibility, as well as AI-driven analytics.

Continue reading

TEAMGROUP unveils PD20M Magnetic External SSD with Apple MagSafe compatibility for iPhone

TEAMGROUP has announced the PD20M Magnetic External SSD, which is compatible with Apple’s MagSafe technology. In other words, the SSD can magnetically attach to the rear of any iPhone that features MagSafe (iPhone 12 and newer).

The PD20M is equipped with a USB Type-C interface, supporting a wide range of devices, including the latest Apple iPhone 15 Pro and Pro Max smartphones. The drive features a weight of just 40 grams and a thinness of 0.82 cm. The PD20M boasts a magnetic strength of over 0.8 kg, ensuring a secure and instant attachment.

Continue reading

Enterprises hang onto mainframes as migration strategies shift

Black and white mainframe

A new report suggests that faced with mounting competition and economic uncertainty, 92 percent of global enterprises are changing course to retain mainframes as part of pragmatic hybrid strategies, rather than pursuing wholesale cloud shifts.

The latest Mainframe Modernization Business Barometer Report from Advanced, based on a survey of 400 IT leaders worldwide, reveals hybrid infrastructure strategies taking hold to balance workloads across cloud and mainframe. In fact, only six percent expect outright mainframe replacement anytime soon.

Continue reading

IBM makes hybrid cloud easier for smaller businesses with a new version of LinuxONE

IBM logo

IBM is launching a new version of its LinuxONE system, engineered to deliver cybersecurity, resiliency, scalability and AI inferencing for hybrid cloud environments, and making the technology more accessible for smaller and medium businesses.

IBM LinuxONE 4 Express is a pre-configured rack mount system designed to extend IBM LinuxONE to startups and small and medium sized businesses and within new data center environments.

Continue reading

Four reasons your agency's security infrastructure isn't agile enough

Part 1. In an ever-changing world, today’s organizations must have the technology in place to evolve along with it. In the government, agencies need to remain adaptive to achieve their missions in the face of policy changes, geopolitical conflict, and private sector advancements.

For years, enterprise teams have implemented agile software development methodologies to improve their ability to service their users rapidly and reliably; government agencies must follow suit. However, for organizations using or considering agile software development methodologies -- private or public sector -- the security architecture that protects their assets must be equally adaptable. 

Continue reading

The ERP challenges that are keeping security teams up at night [Q&A]

Data is the lifeblood of modern business and enterprise resource planning (ERP) systems are where it's likely to live. ERP software integrates data and business functions across departments like finance, manufacturing, marketing, sales and more, and of course this makes it an attractive target for cyber criminals.

So what threats do ERP systems face and what can enterprises do to defend against them? We spoke to Kellie Synder, CCO of Onapsis, to find out.

Continue reading

Transform Windows 10 or 11 into Windows 7 or Vista with a single command

If you’re currently using Windows 10 or Windows 11, but hanker after the days of Windows 7, then there is a very clever, but simple way to transform your newer OS into the older one. This method can be used to turn Windows 8 or above into Windows 7, or Vista.

This process takes a while to complete, but all you have to do is type a command into the Run box and most things will be handled automatically for you, although you can add extra features (such as Windows Media Player 11) if you wish.

Continue reading

The EU Cyber-Resilience Act's approach to open source must be reconsidered

The draft EU Cyber-Resilience Act (CRA), backed by MEPs in July, is intended to reduce the risk of European citizens experiencing data breaches and malicious attacks on their devices. The CRA aims to achieve this by mandating security best practices across Europe’s tech industry. As part of this, it will enforce minimum security standards for end-user tech products sold across the EU, such as IoT devices, desktop computers, and smartphones. 

To realise its goals, the CRA also needs to apply these standards to the software and hardware that make up the supply chains behind end-user products. However, along with commercial solutions within the software supply chain, the CRA is looking to apply these strict security standards to non-commercial open source projects and communities. This could place tens of thousands of volunteers at risk of legal action and do significant harm to the continent’s tech sector. The legislators behind the CRA need to urgently revisit how they treat open source software.

Continue reading

Qualcomm says the 'next version of Windows' will launch in mid-2024... but is it Windows 12?

Purple Windows 12 logo

Confusion surrounds Microsoft's plans for Windows 12, with conflicting rumors suggesting different launch dates. Development is clearly well underway at Microsoft, and Qualcomm has just added strength to idea that Windows 12 could launch later this year.

While we've heard that Microsoft only plans to release the Windows 11 24H2 update this year, holding off releasing Windows 12 until 2025, Qualcomm's suggestion of a mid-2024 launch for Windows 12 is not the first time this release window has been suggested.

Continue reading

Who will protect us from AI-generated disinformation?

Fake/genuine

Generative AI has gone from zero to a hundred in under a year. While early, it’s shown its potential to transform business. That we can all agree on. Where we diverge is on how to contain the dangers it poses. To be clear, I am pro innovation, and far from a fearmonger. But the recent uptick in misinformation -- largely aimed at polarization around controversial issues of the moment -- has made it clear that, if left unchecked, gen AI could wreak havoc on societies.

We’ve seen this movie before with social media, but it took years and hard lessons for us to wake up to its flaws. We’ve (presumably) learned something. The question today is who will help stem the tide of reality distortion from gen AI, and how? 

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.