Latest Technology News

Ways to keep your information safe when gaming online

Keeping your information safe when gaming online reduces the risks of cyberbullying, privacy invasion, and identity theft. The online gaming world is rife with cases of data and information loss due to reasons like shady downloads and virus attacks. However, by implementing some online gaming best practices, avid online gamers can avoid being victims of these situations.

Here are some tested and proven ways to keep your information safe when gaming online.

Continue reading

What enterprises need to know about cybersecurity compliance [Q&A]

Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.

Cam Roberson, VP at Beachhead Solutions, a provider of cloud-managed PC and mobile device encryption, security, and data access control, sat down with us to discuss what enterprises need to know about the current state of cybersecurity compliance.

Continue reading

1Password launches global partner program

1Password has launched its new global partner program today, aiming to enhance its suite of security solutions through strategic partnerships and support tools. This initiative is part of a multi-year strategy designed to provide partners with comprehensive access to 1Password’s security solutions and a toolkit of sales, marketing, and enablement resources.

The program is launching with key partners including Amazon Web Services (AWS), Arrow Electronics, Insight Enterprises, Microsoft, SVA, and many others. 1Password aims to grow its partner ecosystem further by adding more partners across North America, EMEA, and APAC regions.

Continue reading

Authy desktop apps for Windows, macOS, and Linux reach end-of-life: Here's what you need to know

There is some shocking and sad news that will impact Authy users globally. You see, Twilio has announced the end-of-life for its desktop applications on Windows, macOS, and Linux platforms, slated for March 19, 2024. This move highlights a change in the company's strategy, emphasizing the transition towards mobile-centric security solutions.

Authy has been a staple for users seeking an extra layer of security beyond traditional passwords. The desktop applications have provided a convenient way for users to manage their authentication tokens directly from their computers. However, with the upcoming discontinuation, Authy is urging its user base to migrate to its mobile applications.

Continue reading

Enterprises need to adapt security measures to cope with changing threats

Cybersecurity-blocks

With cyber threats becoming increasingly sophisticated, organizations face new challenges in safeguarding their digital assets. A new report from Info-Tech Research Group looks at the issues IT and security leaders must prioritize over the coming year.

It highlights the need to take account of the cybersecurity talent shortage, the rise of AI-driven threats, the integration of security risks with business risks, the adoption of zero-trust frameworks, and the increasing significance of automating security operations.

Continue reading

SwiftKey: After Bing Chat AI comes Copilot

Less than a year after adding Bing Chat AI to SwiftKey, Microsoft is now in the process of replacing the implementation with Copilot. SwiftKey is a popular virtual keyboard solution for Android and iOS.

Microsoft acquired SwiftKey more than eight years ago. The third-party keyboard solution had over 300 million users on Android and iOS at the time.

Continue reading

'Hunter-killer' malware able to neutralize advanced defenses

A new report from Picus Security looks at real-world malware samples and identifies the most common techniques leveraged by attackers.

It identifies a surge in 'hunter-killer' demonstrating a shift in adversaries' ability to identify and neutralize advanced enterprise defenses such as next-gen firewalls, antivirus, and EDR. According to the report, there has been a 333 percent increase in malware that can actively target defensive systems in an attempt to disable them.

Continue reading

Six ways your government agency can establish a safer agile ecosystem

Capitol building

Part 2: An organization’s agility is synonymous with its resilience in the face of change. Agility allows enterprises to face industry-spanning challenges without experiencing catastrophic disruption in their operations, and agile software development makes this concept a reality. Beyond that, it ensures organizations can service external and internal stakeholders rapidly and reliably -- and for government agencies, it ensures continuity of mission services. 

But in agile organizations, there are unique security risks -- outlined in part one of this series -- such as compromising security processes in the name of speed and differing security practices across cross-functional teams. To safeguard these projects, professionals must create a cybersecurity architecture as unique as the agile environments they’re protecting.

Continue reading

What's the best option for businesses -- open-source or commercial AI services?

In the past year, Generative AI (GenAI) availability for businesses has swept the market, offering significant boosts in productivity. To successfully seize this opportunity, however, businesses will need to ensure they invest in the right solutions.

Faced with options like commercial AI services and customizable open-source Large Language Models (LLMs), business leaders must navigate a complex landscape of risks and benefits. This choice, influenced by factors like speed to market and data security, is crucial for companies looking to strategically invest in GenAI.

Continue reading

AI's challenge to internet freedom

Artificial-intelligence, AI

In October 2020, observing International Internet Day, I spoke about the threats to Internet freedom. A lot has happened in less than four years, and a lot has changed. But the threats did not go away. On the contrary, Internet users and their freedoms are in more danger now than ever.

In February 2024, as we observe Safer Internet Day, it is necessary to reiterate that there is no safety without freedom, online or offline. Especially as the enemies of both are now equipped with the most powerful tool for cyber oppression yet -- Artificial Intelligence (AI).

Continue reading

SparkyLinux 2024.02 gets many significant improvements, including enhanced file system support

SparkyLinux has just released its latest update to the semi-rolling ISO images derived from the Debian testing line. The update addresses a variety of features and issues, including the resolution of the CLI Installer problem related to the btrfs and xfs file systems. Notably, there is an update to the Sparky Tray to provide quick access to essential system tools, improving the overall user experience.

The 2024.02 update offers a comprehensive upgrade of all packages from the Debian and Sparky testing repositories, ensuring that the software is up to the minute. It also introduces a range of kernel updates, with Linux kernel version 6.6.13 being the primary version, while also making available versions 6.7.4, 6.6.16-LTS, 6.1.77-LTS, and 5.15.148-LTS within Sparky repositories for users seeking different levels of stability and support.

Continue reading

Birdfont, for Windows, macOS, and Linux, unveils a faster, more responsive user interface and snap-to-guides for point-editing tools

Johan Mattsson has released BirdFont 6.0.1, a major new release of his cross-platform tool for creating fonts. Free for personal use (users must release fonts under the SIL Open Font License), the tool provides users with a means of creating and editing fonts.

Version 6 unveils what it describes as a 'new' (but visually similar) interface, accompanied by performance improvements and a handful of changes.

Continue reading

91 percent of organizations experience software supply chain incidents

supply chain

The overwhelming majority of organizations (91 percent) have experienced a software supply chain incident in the past 12 months, according to a new report.

The study from Data Theorem and the Enterprise Strategy Group surveyed over 350 respondents from private- and public-sector organizations in the US and Canada across cybersecurity professionals, application developers and IT professionals.

Continue reading

Microsoft is improving the look of gaming with AI Super Resolution in Windows 11 24H2

Super resolution

The latest use Microsoft has found for artificial intelligence is to boost graphics and performance in games in Windows 11. As can be seen in the latest preview builds of the operating system, the company is preparing to unleash an AI-powered feature called “super resolution”.

Also known as AI SR and Auto SR, super resolution can be applied on an app-by-app basis. In order to take advantage of the feature, users will have to have a PC with an AI NPU -- a requirement that is likely to become increasingly common.

Continue reading

Why cyber risk assessment is critical to staying ahead of threats [Q&A]

Risk dial

The cybersecurity landscape is changing all the time and security teams are constantly searching for anything that can give them an edge in defending their systems.

We spoke to Rajeev Gupta, co-founder and chief product officer at insurance specialist Cowbell Cyber, about cyber risk assessment and how it can help businesses understand their level of risk and improve it to stay ahead of bad actors and threats like phishing attempts.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.