Search Results for: surface pro

Embracing the digital workplace: IT's new role in driving productivity

Britain is plagued by sluggish productivity, with the Office of National Statistics (ONS) reporting UK productivity growth as 'anaemic' for the past 15 years. And things are getting worse, not better.

In London -- the country's largest and richest regional economy -- output per hour worked has fallen by 2.7 percent between 2019 and 2022. But what is the root cause of this underwhelming growth?

Continue reading

It's time to get proactive about vulnerability remediation

Traditionally, the main concern security teams used to have about vulnerabilities was finding them. In the chaotic pre-cloud security years, identifying security issues on time was challenging, leading to gaps, blind spots, poor security hygiene and a growing attack surface. The introduction of cloud security posture management solutions that provide visibility and detection capabilities resolved these gaps but created new challenges -- an avalanche of alerts that overwhelmed security teams, frustrated engineers and created friction and noise, making remediation a costly, time-consuming task. Still today, many companies rely on these security posture management tools to indicate the existence of a vulnerability but react to these indications with a 'first come-first served' approach. Completely reactive, this approach means that teams are led by the events and alerts instead of controlling, managing and remediating them. Having a reactive approach means possibly missing the most critical alerts, lacking a proper organizational workflow to ensure the right people are addressing the right things, and ultimately negatively impacting your organization's security posture. It's time to get proactive about vulnerability remediation.

From following to leading

Continue reading

Source code: The source of truth for securing the API attack surface 

Most organizations find themselves in the midst of their API security journey, racing to keep pace with expanding API ecosystems in a colossal threat landscape. As a core enabler of modern applications, facilitating seamless connectivity and powering mobile and web applications, APIs are everywhere. The DevOps revolution has completely transformed the pace at which developers can design and build APIs faster than a security team can match. 

Large enterprises are operating with tens of thousands of APIs, and even small organizations have a surprising number, both internal and external. With applications and API portfolios becoming increasingly complex, maintaining a comprehensive understanding of all existing APIs has emerged as a significant hurdle. As APIs can quickly become obscured or forgotten, many organizations lack accurate context into the sheer scale and volume of APIs that persist across their infrastructure -- subsequently resulting in the absence of a full picture of their attack surface. As one cannot secure what they cannot see, the absence of discovery mechanisms opens organizations to a host of security risks.  That is why API discovery is now a crucial process for security teams, designed to identify, catalog, and assess APIs. 

Continue reading

STM Goods unveils new range of cases for Apple iPad and Microsoft Surface

STM Goods has introduced a fresh lineup of protective cases tailored for the latest iPad Air and iPad Pro models, along with a special case for Surface Pro users. The new offerings include the Opp Case, Dux Plus, Studio, and Dux Shell, each designed with specific features to enhance user experience while ensuring robust protection.

The Opp Case, priced between $29.95 and $34.95, is crafted for the iPad Air 11” M2/5th/4th gen and iPad Air 13” M2. This ultra-slim case boasts an integrated Apple Pencil holder, allowing for wireless or cable charging depending on the Pencil model. Its clear back design highlights the iPad's elegant aesthetics, and its innovative folding cover supports both portrait and landscape viewing.

Continue reading

Canonical expands Ubuntu Pro with new distroless Docker image service offering 12-year support

Canonical has introduced a new service enabling the creation of custom distroless Docker images under its "Everything LTS" program. This initiative allows customers to include any open-source software in their Docker images, regardless of whether it is packaged in Ubuntu, with a security maintenance commitment of up to 12 years.

Mark Shuttleworth, CEO of Canonical, said: "Everything LTS means CVE maintenance for your entire open source dependency tree, including open source that is not already packaged as a deb in Ubuntu. We deliver distroless or Ubuntu-based Docker images to your spec, which we will support on RHEL, VMware, Ubuntu, or major public cloud K8s."

Continue reading

Critical vulnerabilities rise but remediation times improve

A new report from security testing platform Synack shows a rise in critical-severity vulnerabilities in 2023 compared to 2022.

On a positive note though, despite mounting pressures on security teams, organizations have reduced their mean time to remediation for critical-severity vulnerabilities by 24 days and high-severity vulnerabilities by 18 days, down to 56 and 74 days, respectively.

Continue reading

Detectify launches new features for control over attack surfaces

Attack surfaces keep expanding, making it increasingly challenging for organizations to obtain and make sense of the most relevant insights from their attack surface data.

Attack surface management platform Detectify says its users see an average of 300 breaches per set policy, with over 70 percent of active policies focusing on spotting risky open ports.

Continue reading

Why a zero trust approach is essential to mitigate the threat of unsecured APIs 

With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, combined with the ongoing drive to modernize and transform IT operations, the attack surface of every organization has -- and continues to -- expand.  

Traditional boundaries have been blurred between businesses, suppliers, partners, customers, workers, and even home-life, with this ecosystem continuing to grow. Here, APIs are providing the connective tissue for modern applications and legacy infrastructure to co-exist.  

Continue reading

Protecting sensitive data in the cloud [Q&A]

Cloud data security

The use of sensitive data for business is crucial. The growing amount of sensitive data stored in cloud infrastructure and applications creates an increasing and constantly evolving data risk landscape for organizations.

The main cause of risk is how broadly this data is shared within and outside the organization, and how it is being used by users, services, or other applications. We spoke to Liat Hayun at Eureka Security about how this risk can be addressed while still allowing safe use and storage of data.

Continue reading

Raycon Magic Mat Pro: A sleek solution for wireless charging and workspace organization

Raycon, a company known for its innovative tech solutions, has recently expanded its portfolio of charging accessories with the introduction of the Magic Mat Pro. This new addition is designed to streamline your workspace, combining functionality with style.

The Magic Mat Pro features a 15W wireless charging spot, allowing you to power up your compatible devices without the hassle of tangled cables. It’s not just about charging, though. The 32.15” X 15.25” mat is crafted from water-resistant PU leather, offering a durable and easy-to-clean surface that can handle the occasional spill.

Continue reading

Which comes first? The pentest or the bug bounty program? [Q&A]

Software testing

Bug bounty and penetration testing programs are often grouped as interchangeable, but they perform distinct functions.

To determine whether both deserve a place within a cybersecurity strategy, it is important to understand their specific qualities and how they have matured over recent years. We spoke to Chris Campbell, lead solutions engineer at HackerOne, to learn more.

Continue reading

Microsoft means business with new Surface devices

Whilst Microsoft's Surface devices have been around for a few years and have many features that make them attractive for business users, there's never been a version aimed specifically at businesses… Until now.

With the launch of Surface Pro 10 for Business and Surface Laptop 6 for Business the company is targeting the business market with features including improved performance and battery life, more ports, better security and custom, durable anti-reflective displays.

Continue reading

Get 'Learn Java with Projects' (worth $44.99) for FREE

Learn Java with Projects stands out in the world of Java guides; while some books skim the surface and others get lost in too much detail, this one finds a nice middle ground.

You’ll begin by exploring the fundamentals of Java, from its primitive data types through to loops and arrays. Next, you’ll move on to object-oriented programming (OOP), where you’ll get to grips with key topics such as classes, objects, encapsulation, inheritance, polymorphism, interfaces, and more.

Continue reading

TikTok under investigation for failing to protect minors and using algorithms that promote addiction

TikTok on phone

The latest online service to find itself facing scrutiny from the European Commission is TikTok. The Chinese-owned, video-based social media platform faces a probe from the Commission after an initial investigation into whether the company had breached the Digital Services Act (DSA).

Particular areas interest are TikTok's use of algorithms to surface content, with investigators worried about whether they create a "rabbit hole effect" and encourage addictive behavior. TikTok also faces criticisms for various failures to protect younger users, but there are concerns about the overall transparency of the platform, but especially in relation to advertising.

Continue reading

Satechi updates Thunderbolt 4 Slim Hub Pro and Stand & Hub for Mac mini

Satechi has just rolled out refreshed versions of two popular devices -- the Stand & Hub for Mac mini (and Mac Studio) and the Thunderbolt 4 Slim Hub Pro. These upgraded gadgets, being showcased at CES 2024, are already up for grabs.

The revamped Stand & Hub for Mac mini and Mac Studio now boasts an NVMe SSD enclosure -- it is no longer limited to SATA M.2 drives. This feature could be a game-changer for users looking for swift data transfer speeds and additional storage -- all streamlined through a single cable.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.