Latest Technology News

New Windows 11 build lets you immediately access new photos and screenshots from your mobile device

Microsoft is continually adding new features to Windows 11, and today the software giant introduces the ability to access and edit your most recent photos and screenshots from an Android mobile device via Snipping Tool on your PC.

Included in Windows 11 Build 23619 for Insiders in the Dev Channel, the new feature displays notifications on your PC whenever a new photo or screenshot is captured on your Android phone.

Continue reading

Three-quarters of CISOs considering a job change

A new report from IANS Research and recruitment firm Artico Search shows that although 64 percent of CISOs say they are satisfied in their job, 75 percent are open to a change.

More than 660 chief information security officers (CISOs) provided data for the report. Additionally, research team members held conversations with over 100 CISOs to better understand the challenges they face today and the future opportunities.

Continue reading

The future is now: Advancements in biometric security 

Originating in the late 19th century, biometrics has come far from its forensic beginnings to become a key player in today's tech landscape. What started as a tool for crime scene investigation now unlocks our phones and customizes our digital interactions.

This article zeroes in on the latest strides in biometric technology, exploring how these innovations shape various industries and our daily lives, while also addressing privacy and accuracy concerns.

Continue reading

Get 'Machine Learning Engineering with Python -- Second Edition' (worth $39.99) for FREE

The Second Edition of Machine Learning Engineering with Python is the practical guide that MLOps and ML engineers need to build solutions to real-world problems.

It will provide you with the skills you need to stay ahead in this rapidly evolving field. The book takes an examples-based approach to help you develop your skills and covers the technical concepts, implementation patterns, and development methodologies you need.

Continue reading

Facebook stalwart Sheryl Sandberg to leave Meta's board of directors but will continue to serve as an adviser

Sheryl Sandberg

Meta's former COO, Sheryl Sandberg, is stepping down from the company's board of directors later in the year. She has played a major role at the firm since joining Facebook when it was merely a startup, having previously spent time at Google.

Widely respected and seen as one of the most influential women in the world of technology, Sandberg served as Facebook's and Meta's COO for over 14 years and has agreed to remain a board member to help with the transition when she leaves the position. In a message posted to her Facebook page she says that "this feels like the right time to step away".

Continue reading

Apple Hongdae set to open in Seoul, South Korea -- the 100th Apple Store in the Asia-Pacific region

Apple is set to inaugurate its latest store, Apple Hongdae, in Seoul this Saturday, January 20, marking a significant milestone as the 100th Apple Store in the Asia-Pacific region. The store, staffed with nearly 100 experts, offers an extensive range of products including the latest iPhone 15 lineup, new Macs with M3 chips, the Apple Watch series, and the Lunar New Year special-edition AirPods Pro.

Deirdre O’Brien, Apple’s senior vice president of Retail, explains, “Combining the latest in Apple technology with the creative passion of the local community, this new store will build on the extraordinary connection we have with our customers in Korea. Our team members are excited to welcome in customers and help them discover the latest in our products and services, including the iPhone 15 lineup.”

Continue reading

The tension between the CDO and the CISO: The balancing act of data exploitation versus protection

Data is the most valuable resource for the global enterprise. For any company wanting to remain relevant in today’s competitive business landscape, data needs to be at the center of every business decision, allowing the C-suite to review initiatives, make real-time decisions and if necessary reverse actions. A quick response fueled by real data insights will power and improve the customer experience and product offerings while driving lower prices through better efficiency. Ultimately, this will improve the bottom line and deliver successful outcomes for many organizations.

However, to unlock the true value of data, it is equally important that organizations ensure that confidential data is always secure. To achieve this, the Chief Information Security Officer (CISO), who acts as the gatekeeper to data to ensure it is compliant and secure, and the Chief Data Officer (CDO), who aims to unlock and exploit data, have different and competing priorities, yet they must be able to work together towards a common goal to achieve the strategic objectives of the organization and deliver great customer and business outcomes. There are significant benefits to be had when these two role holders work together and huge drawbacks when they don’t. 

Continue reading

Samsung unveils Galaxy S24 Android smartphones with innovative Galaxy AI -- pre-order yours today!

Samsung today announced its latest flagship smartphones, the Galaxy S24 Ultra, Galaxy S24+, and Galaxy S24. These devices are notable for utilizing the company's innovative Galaxy AI technology. This development signals the beginning of a new era in mobile experiences, where AI is expected to revolutionize user interactions with their devices.

The Galaxy S24 series introduces advanced features for enhancing communication. The series offers barrier-free communication with intelligent text and call translations. The 'Live Translate' feature provides two-way, real-time voice and text translations within the native app, eliminating the need for third-party applications. This feature ensures privacy as it is powered by on-device AI. Additionally, the 'Interpreter' feature facilitates instant translation of live conversations on a split-screen view, functioning even without cellular data or Wi-Fi.

Continue reading

Emerging technology is creating new fraud risks, but consumer distrust in AI protection grows

ComplyAdvantage has released its annual report, "The State of Financial Crime 2024," focusing on the rising trend of artificial intelligence being exploited for fraudulent activities. The report also reveals that, despite consumer apprehension about AI, many financial institutions are investing in technology to tackle this emerging threat.

According to the report, 66 percent of financial industry respondents view the criminal use of AI as a growing cybersecurity threat, with risks ranging from deepfakes to advanced cyber hacks and AI-generated malware. In response, 86 percent of respondents reported that their companies are investing in new technologies. However, only 53 percent prioritized explaining their AI usage to customers.

Continue reading

Over 90 percent of organizations set to increase data protection spending

data protection jigsaw

The latest Data Protection Trends report from Veeam Software shows 92 percent of organizations will increase their 2024 data protection spend, to achieve cyber resilience amid continued threats of ransomware and cyber-attacks.

However, while companies say they will spend more trying to fend off cyberattacks, the report finds IT leaders are feeling even less protected and more concerned about their ability to recover and restore mission-critical data.

Continue reading

Keeping AI data and workloads secure and accessible

AI is already revolutionizing whole industries and professions. New applications and projects appear regularly across every sector, limited only it seems by the boundary of our own inspiration. That means that AI workloads will be critical to organizations across the board; the question is: how can we ensure AI applications are stable, secure and accessible?

Many companies depend on the trusted backup to ensure fail-safety and security against data loss and outages. From a data protection perspective this makes sense, however, backups aren’t best suited to business continuity and disaster recovery (DR), particularly for the most important data and workloads, such as AI.

Continue reading

Universities not delivering the right skills for cybersecurity

Over three quarters of cybersecurity professionals in the UK and US don't believe university courses are preparing graduates adequately for the working world, according to new research.

The study of 3,000 IT and cybersecurity professionals in the UK and the US, from cybersecurity upskilling, certification, and talent assessment platform Hack The Box, shows 78 percent of cybersecurity and IT professionals believe a traditional university education in cybersecurity is not doing enough to prepare graduates for the modern workforce.

Continue reading

Financial services businesses see spike in vendor email compromise

A new report from Abnormal Security shows that vendor email compromise (VEC) attacks against financial services organizations increased by 137 percent in 2023.

This is an industry that handles a wide array of sensitive personal and financial information of the type hackers love to get their hands on. This makes organizations within the financial services sector particularly susceptible to cyberattacks, including socially-engineered email attacks.

Continue reading

The EU's AI Act: Good regulation, bad regulation or somewhere in between?

History is littered with knee-jerk legislation, enacted with good intentions and often in response to genuine public fear. If you have ever traveled to the USA, you may be familiar with the I-94W Nonimmigrant Visa Waiver form that must be completed before entry. Among a number of questions asked, one is ‘Have you ever been or are you now involved in espionage or sabotage; or in terrorist activities -- Yes or No’. I’m sure many have often wondered whether those actually involved in such activities would be inclined to tick the ‘Yes’ box. This example effectively illustrates the challenges that all regulators and legislators should ask themselves at the outset, namely:

Are we doing this to address the problem or is it just a knee-jerk reaction to placate journalists and voters? (Remember that line from BBC political comedy Yes Minister -- “He’s suffering from Politician’s Logic. Something must be done, this is something, therefore we must do it.”)

Continue reading

What is a vCISO and why would you want to hire one? [Q&A]

CISO

As the profile of cybersecurity has increased within enterprises, so has the challenge of finding people to fill senior roles and then hanging on to them.

Recent research suggests that CISOs don't stay in the job for more than three years on average. One answer is to use a virtual CISO (vCISO) to advise on current issues and relieve the strain on the in-house team.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.