Latest Technology News

IT decision-makers under pressure to demonstrate public cloud adoption cost savings

Unless you’re an Olympic athlete, you probably don’t want a stopwatch tracking your performance -- pushing you to work harder and move faster. But, according to Six Degrees’ newly published independent research, one in five IT decision-makers at SMEs feel that the clock is on them when implementing public cloud migration projects.

Six Degrees’ UK SME Cloud Intelligence Report 2024 found that the extent to which IT decision-makers feel rushed varies considerably between sectors. Finance and insurance (57 percent), blue light (55 percent) and education (42 percent) are impacted the most compared to those working in government (33 percent), healthcare (32 percent) and manufacturing (29 percent).

Continue reading

Google helps voters find polling locations and track Kamala Harris vs Donald Trump election results

As the 2024 U.S. general election approaches, many Americans are looking for straightforward ways to find reliable voting information. Fortunately, Google is offering helpful tools to make this process easier, allowing you to quickly locate key voting details, whether you’re voting in person or by mail.

With Google Search and Maps, you can now find the nearest voting locations and ballot dropboxes. By simply typing queries like “where to vote” or “ballot dropboxes,” Google will guide you to a prompt where you enter your registered address. From there, you’ll be able to see nearby voting locations tailored to your specific needs. Google Maps can even provide extra details, such as voting hours and the types of voting options available at each location.

Continue reading

Manufacturing businesses most likely to be hit by cyberattacks

The manufacturing industry is the most affected by cyber attacks, accounting for over 25 percent of all incidents, across the top 10 industries, of which 45 percent are malware attacks.

According to a new report from security awareness training company KnowBe4 the industry has become increasingly attractive to cybercriminals in recent years due to its interconnected nature, having a low tolerance for downtime, and valuable intellectual property stored in its databases, which could save competitors millions if obtained.

Continue reading

Why it's critical to secure your APIs [Q&A]

APIs are essential to the smooth running of the internet, allowing the seamless transfer of information between applications and services.

Of course all of this happens behind the scenes but that's not to say that APIs should be ‘out of sight out of mind'. We spoke to Mayur Upadhyaya, CEO at APIContext, to learn more about API Security and the importance of APIs in general.

Continue reading

PorteuX Linux 1.7 released with smaller ISOs and performance optimizations

PorteuX 1.7 has been released, bringing various updates and optimizations to the lightweight Linux distribution. One of the key highlights of this release is the reduced size of the ISOs compared to previous versions, thanks to numerous optimizations that aim to enhance overall performance and stability.

Several fixes have been made, including addressing issues with the run-pipewire and gui-cheatcode-loader scripts, which previously ran indefinitely in the background. The release also resolves problems with LXDE freezing when dragging files from Engrampa over the file manager’s side panel and fixes a notification bug related to ‘sticky keys’ in Xfce 4.18.

Continue reading

Western Digital celebrates 20 years of My Passport with a special edition drive

Western Digital has been helping people store their digital lives on the go for two decades. To mark the 20th anniversary of its popular My Passport drive, the company has released a special edition - the My Passport Ultra, 20th Emerald Anniversary Edition. First launched in 2004, the My Passport drive now boasts capacities as large as 6TB, a massive increase from the original 40GB model.

This special edition drive sports a beautiful emerald color, which Western Digital says symbolizes loyalty, peace, and security. It’s not just about looks, though. The My Passport Ultra continues the company’s tradition of durability and reliability, offering a sleek anodized metal enclosure for extra protection. It works right out of the box with Windows, Mac, and even mobile devices, making it a versatile choice for today’s tech-savvy users.

Continue reading

Are we starting to give up on cyber hygiene?

A new survey of over 7,000 individuals suggests a growing wave of pessimism among workers regarding cybersecurity practices.

The study from CybSafe and the National Cybersecurity Alliance shows 53 percent believe staying safe online is possible, down by five percent from last year, while only 60 percent think online safety is worth the effort, marking a nine percent drop.

Continue reading

Cyber resilience vs. cybersecurity: Which is more critical?

Today, it’s not ‘if’ but ‘when’ any organization will be compromised. So, while it’s essential to strengthen cybersecurity across the entire organization, it’s also imperative to plan for a significant cyber-attack and the worst-case scenario. No business can be 100 percent secure but they can be resilient. Resilience is about continuing to thrive amidst adversity. This is why cyber resilience can be more important than cybersecurity. Every organization can take positive actions to improve their cyber resilience today, ensuring they can continue to win even if they are affected by an incident. They can start by having the right mindset and instilling a culture of cyber security and cyber resilience.   

Strong cyber resilience will enable an organization to continue to operate key business processes, even when they are under attack. This means keeping people safe, guaranteeing data security, and protecting their reputation with their customers, partners, suppliers, industry and government regulators and other key stakeholders. Having a strong cyber resilience will save stress, time and money -- it will give you a return on your investment -- and you’ll be better prepared for uncertainty in the future.  

Continue reading

Maximizing Microsoft Copilot's potential: The critical role of tenant consolidation

Windows Copilot on a laptop

Microsoft recently reported that tens of thousands of working professionals are using Microsoft Copilot in their everyday operations. Experts expect this number to grow significantly as the tool integrates more seamlessly into workplace environments, driving productivity and efficiency. However, many companies may not realize that to get the most benefit from Copilot, they should consolidate tenants.

Let’s take a closer look at the benefits of tenant consolidation and how working professionals can leverage Microsoft Copilot to the fullest. With tenant consolidation, companies can transform operations and future-proof their organization amid remote workforces, economic pressures and security concerns, among other developing industry factors.

Continue reading

Save $25.99! Get 'Artificial Intelligence and Machine Learning Fundamentals' for FREE

Machine learning and neural networks are pillars on which you can build intelligent applications. Artificial Intelligence and Machine Learning Fundamentals begins by introducing you to Python and discussing AI search algorithms.

The book covers in-depth mathematical topics, such as regression and classification, illustrated by Python examples. As you make your way through the book, you will progress to advanced AI techniques and concepts, and work on real-life datasets to form decision trees and clusters.

Continue reading

Microsoft Office 2024 unveils new Fluent design, updates apps to match latest Microsoft 365 release

Subscription-based software isn’t everyone’s cup of tea. Some of us would prefer to pay a one-off fee upfront for a software package we know will last us years without any significant changes. Thankfully, Microsoft caters to both types of user, both with the subscription-based Microsoft 365 range of products and now with a brand new version of its flagship product, Microsoft Office 2024.

Office 2024, which starts from $149.99 for its Home edition, replaces Microsoft Office 2021 and brings the feature set bang up to date. It’s also joined by a new Office LTSC 2024 release aimed firmly at larger organizations who want an on-premises edition for a disconnected or restricted environment.

Continue reading

Best Windows apps this week

Six-hundred-seventeen in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft ended support for Windows 11 version 22H2 Home and Pro this month. No more updates for the version, but updates are available to newer versions. There are bypasses available for devices that do not meet the official system requirements.

Continue reading

Cyberrisk quantification and how to measure it [Q&A]

Enterprises face an increasing range of cybersecurity risk, but quantifying and managing those risks can be a difficult task.

Recent Gartner research shows that more companies are trying to roll out cyber risk quantification (CRQ) in order to get a greater understanding of their risk profile.

Continue reading

Hanging on the telephone set to be replaced by messaging services

It was 175 years ago that Italian inventor Antonio Meucci came up with the technology that would later be improved and popularized by Alexander Graham Bell to become the telephone.

New research from cloud communications company Sinch finds that newer technologies are starting to change how we communicate -- particularly with businesses -- offering richer, more interactive, and personalized experiences.

Continue reading

Ransomware still a major threat despite disruption to RaaS groups

Ransomware Malware Cyber Attack

Ransomware remains a formidable threat facing organizations, with 49 active groups impacting more than 1,000 publicly posted victims in the third quarter 2024, according to a new report.

The report from GuidePoint Security's Research and Intelligence Team (GRIT) shows threat actors are increasingly leveraging legitimate services and platforms to deliver targeted phishing messages. While the abuse of trusted notification services is not a new approach to delivering malware, the research team has recently observed novel -- and progressively sophisticated -- delivery techniques.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.