Latest Technology News

Get 'The AI Product Manager's Handbook' (worth $35.99) for FREE

The AI Product Manager's Handbook is for people that aspire to be AI product managers, AI technologists, and entrepreneurs, or for people that are casually interested in the considerations of bringing AI products to life.

It should serve you if you’re already working in product management and you have a curiosity about building AI products.

Continue reading

AlmaLinux 9.3 is a new milestone in open-source enterprise Linux

The AlmaLinux OS Foundation, a key player in the open-source enterprise Linux arena, has today announced a significant milestone with the release of AlmaLinux 9.3. This latest version marks a notable shift in the development process of the CentOS alternative, being the first release constructed entirely from upstream sources, independent of Red Hat Enterprise Linux (RHEL) source code.

This strategic move aligns with the Foundation’s vision for AlmaLinux, aiming to provide a stable and predictable platform for enterprise Linux users, without compromising on compatibility. Jonathan Wright, CTO at Knownhost, LLC, adds a personal touch, “This release includes code that I committed upstream to CentOS Stream, which makes it even more special to me,” highlighting the collaborative spirit at the core of AlmaLinux’s development.

Continue reading

TP-Link launches affordable Tapo C120 2K QHD home security camera

In a world where security is becoming a paramount concern, consumers are constantly on the lookout for cost-effective solutions to protect their homes. Stepping up to the plate is Tapo, a brand under the well-regarded TP-Link umbrella, that’s making waves in the smart home products arena. Today, it introduces the Indoor/Outdoor Home Security Camera dubbed Tapo C120, a device that promises not to burn a hole in your pocket.

The highlight of Tapo C120 is its 2K QHD video clarity, a significant notch above the conventional FullHD 1080p resolution. This ensures users can view images and videos with an astonishing level of detail, making it easier to identify faces or other crucial details, an aspect that’s indispensable in a security apparatus.

Continue reading

The blurring lines between data protection and security [Q&A]

The threat landscape has evolved a lot over the past few years as cybercriminals become more and more sophisticated. This has forced change within the industry and blurred the lines between the previous separate data protection and security strategies.

We spoke to Jason Gerrard, senior director of international systems engineering at Commvault, to find out more about why this is happening and what it means for the future of the data protection and cybersecurity industries.

Continue reading

Navigating the complex role of the CISO under SEC disclosure rules

CISO

I’ve led security functions and established cybersecurity board reporting processes for over 25 years. The relationship between CEOs and CISOs has always held contradictions and the decisions around when to disclose a breach have always been hard. But the recent developments involving the SEC and SolarWinds is a regulatory game-changer for the CISO community. Still, I think we’ll all ultimately come out OK from this if we behave ethically.

New ethical lines are being drawn very quickly and publicly as teams figure out the lines between good judgment and fraud. I have no intention of moralizing here about the SEC’s allegations against SolarWinds and their CISO. Rather, I’d like to shine a light on the underlying principles of disclosure that have served as my own ethical compass, and which I think remain unchanged.

Continue reading

Fedora Slimbook 14 Linux laptop now available

About a month ago, Fedora announced their collaboration with Slimbook, launching the Fedora Slimbook 16 laptop. This partnership marked a significant step towards bringing Fedora Linux preinstalled on more devices. The response from the Linux community was overwhelmingly positive. Building on this success, the two parties are expanding their partnership.

Recognizing the demand for a more compact option, Fedora and Slimbook are now introducing the Fedora Slimbook 14 (available here now). This new model addresses feedback from users who found the 16-inch model a bit too large or had reservations about the Nvidia card. The 14-inch model maintains the distinct Fedora branding, ensuring that your love for Fedora is prominently displayed.

Continue reading

Evolving change management to software value realization

Most digital transformations fail. As a global entrepreneur and former software implementation consultant for Fortune 500 companies, I know that a digital initiative doesn’t end after a platform goes live. Digital change has a huge impact on our employees, who interact with about 13 applications 30 times per day to be successful in their jobs.

When trying to get employees to embrace new technology and tools, leaders say their biggest challenge is hard-to-use applications with a high learning curve (68 percent). It is, therefore, not surprising that many employees’ responses to digital transformation follow a process similar to the Kubler-Ross Stages of Grief. In the context of software adoption, we can think of this in terms of the associated Kubler-Ross Change Curve.

Continue reading

GenAI and its hallucinations: A guide for developers and security teams

Artificial-intelligence

With the rapid proliferation of Generative AI (GenAI), developers are increasingly integrating tools like ChatGPT, Copilot, Bard, and Claude into their workflows. According to OpenAI, over 80 percent of Fortune 500 companies are already using GenAI tools to some extent, whilst a separate report shows that 83 percent of developers are using AI-tools to speed up coding.

However, this enthusiasm for GenAI needs to be balanced with a note of caution as it also brings a wave of security challenges that are easily overlooked. For many organizations, the rapid adoption of these tools has outpaced the enterprise's understanding of their inherent security vulnerabilities. This would yield a set of blocking policies for example, Italy had at one point this year completely blocked usage of GPT, which is never the answer.

This misalignment could not only compromise an organization’s data integrity but also impact its overall cyber resilience. So, how should AppSec teams, developers, and business leaders respond to the security challenges that accompany the widespread use of GenAI?

Continue reading

TUXEDO Pulse 14 is an ultraportable Linux workstation powered by AMD Ryzen 7 7840HS

In a market where the word "ultraportable" often means compromising on power, the Pulse 14 emerges as a welcome paradox. This latest offering from TUXEDO is not just another addition to the mobile workstation pantheon; it redefines efficiency and performance in a form factor that challenges the status quo.

True to TUXEDO's roots, the Pulse 14 is a Linux-lover's dream, shipping with full support, pre-installed drivers, and custom-developed software packages. And for those who walk the line between Linux and Windows, the Pulse 14 offers the flexibility of Windows 11 as well.

Continue reading

Microsoft gives admins an extra three years of Extended Security Updates for Windows Server 2012

Microsoft logo

There is some good news for anyone who wants or needs to stick with Windows Server 2012 for a little longer.

Just a month after Windows Server 2012, Windows Server 2012 R2, and Windows Embedded Server 2012 R2 reached end of support, Microsoft has announced that administrators are able to get three additional years of Extended Security Updates (ESUs).

Continue reading

eufy launches Video Smart Lock E330 with 2K camera and fingerprint access

eufy, a subsidiary of Anker, has recently expanded its home security offerings with the launch of the Video Smart Lock E330. This new product combines several features: a 2K resolution camera, fingerprint access, and a video doorbell, all integrated into a single device.

A notable aspect of the E330 is its 8GB of local storage capacity, which comes without the need for additional subscription fees. This feature could appeal to users looking for a one-time purchase without ongoing costs.

Continue reading

Get 'Cloud Security Automation' (worth $39.99) for FREE

For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms.

Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy.

Continue reading

To fix BI, build it into your applications

Business intelligence (BI) was once heralded as a technology that would democratize data, enabling everyone to become more productive and make better decisions. Today, though, analysts in the BI space like to share the same (and possibly apocryphal) statistic: The global business intelligence adoption rate is only 26 percent.

If only 26 percent of potential users ever access BI, something is broken. Why is access so poor? What can developers and engineers do to make BI achieve its full potential?

Continue reading

The evolving challenge of insider threats

web threats

Modern security teams need a 360-degree perspective if they are to successfully deal with all the risks they face. As well as protecting networks and data from external threat actors, organizations must also look at the risks posed by insiders -- a major security problem that brings a unique set of challenges.

Indeed, the issues associated with insider threats are growing to near ubiquitous levels. According to recent industry research, three-quarters of organizations say insider attacks have become more frequent, with more than half experiencing an insider threat in the last year. A major part of the challenge is identifying where the threats are coming from, given that employees and contractors already have varying levels of permitted access to systems. While the motivation for insiders can be malicious, employee errors can also result in hugely damaging security breaches.

Continue reading

Why ChatGPT won't solve your real-time translation needs

New technologies debut almost every day. This constant barrage of novel tools creates a perpetual cycle of overshadowing -- someone is always introducing a new technology that eclipses the previous innovation, and then something even newer comes out, and the cycle repeats itself. However, OpenAI’s ChatGPT broke that cycle.

Since ChatGPT’s debut in late 2022, the generative AI tool has exploded in popularity. It took just two months for the platform to reach 100 million users, a speed that shattered the previous record for fastest-growing app. The creators of ChatGPT expect the tool to generate $200 million this year and project that number will grow to $1 billion next year. Other businesses, like Google and Grammarly, are taking note. Both of these organizations have developed their own generative AI tool to enhance their business operations.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.