How companies can respond better to security risks [Q&A]
One of the biggest issues when dealing with security risks is the time that it takes to address problems when they come to light.
We spoke to Yoran Sirkis, CEO of remediation operations specialist Seemplicity, to discuss why there's an issue and how workflow problems around responding to risks can be improved.
Generative AI is forcing enterprises -- and policymakers -- to rewrite the rules of cybersecurity
Following a year full of excitement and uncertainty, and more opinions about the future of AI than anyone could count, AI providers, enterprises, and policymakers are now rallying around one thing: AI security.
The White House recently followed in the European Union’s footsteps to introduce a new set of standards for the secure development and deployment of AI models. But while regulators triangulate their policies and AI companies work to comply, the real responsibility to proceed safely will remain with enterprises.
How many times are you going to think about ransomware in 2024?
In 2023, we saw the popular trend of asking "how many times a week do you think about the Roman Empire?", and as an avid Roman Empire fan, my answer was a lot. In fact, the fall of the Roman Empire can be easily compared to ransomware breaches.
In 410 AD, the impenetrable walls of Rome were breached by the Visigoths, signaling an end to the once-mighty empire. The reason for the defeat of the Romans was complacency -- the walls and other defenses were in a state of disrepair, and Rome lacked a substantial military presence.
What to look out for when it comes to cybersecurity regulations in 2024
It’s been another busy year for cybersecurity regulations. We saw a new National Cybersecurity Strategy by the White House in March, and throughout the year, we’ve seen the National Cybersecurity Center (NCSC) launch several new initiatives to increase cyber resilience.
As mentioned by Joseph Carson, Chief Security Scientist & Advisory CISO at Delinea, the landscape of cybersecurity compliance is expected to "evolve significantly, driven by emerging technologies, evolving threat landscapes, and changing regulatory frameworks."
Enlightenment 0.26.0 Linux desktop environment released -- enhanced stability and new features
The latest version of Enlightenment, 0.26.0, has arrived, bringing a slew of improvements and new features to this popular Linux desktop environment. This release emphasizes on squashing numerous minor bugs, enhancing user experience, and introducing some experimental features.
A key highlight of this update is the extensive list of minor bug fixes, which can be viewed in the detailed git log. Developers have focused on ensuring a more stable and reliable experience for users, addressing various glitches and issues reported in previous versions.
You can now access X alternative Bluesky without an account
Elon Musk's impact at X -- or Twitter as it was when he bought the company -- has broadly been seen as negative. While some have welcomed his maverick approach to managing the social platform, it left many others seeking a new home. Bluesky and Mastodon quickly emerged as viable alternatives, although Meta has attempted to muscle in on the action with Threads.
Each platform has its own set of pros and cons, but a major obstacle for Bluesky is that it remains invite-only. On top of this, it has not been possible for anyone without an account to view posts made by others -- but this is now changing, as is the platform's logo.
WOLFBOX launches Level 2 Electric Vehicle (EV) Charger with Wi-Fi
WOLFBOX has launched its new Level 2 Electric Vehicle (EV) Charger. This new charger looks to be an excellent solution to the fragmented charging landscape in the US, characterized by varied plugs and connectors across different manufacturers and networks. WOLFBOX even provides dedicated customer support for Tesla owners, assisting them in acquiring the required adapter to ensure smooth compatibility.
This charger stands out with its sophisticated features, such as the ability to schedule charging sessions, remotely monitor charging status, and support for RFID cards. With both Wi-Fi and Bluetooth support, it is clearly a very comprehensive package.
The CISO's next priority isn't technology, it's building a great employee experience
In security, we are very used to talking about features and functions in the tools we use. When it comes to measuring the positive impact of what we spend on cyber, in terms of both people and equipment costs, we tend to be equally abstract -- for years, 'mean time to detection' and 'mean time to resolution' have probably been the two most widely-used metrics for cybersecurity progress, and measuring the number of security incidents handled is still probably how the CISO tracks his team’s contribution to the organization.
But no longer. Today we need to start thinking about measuring cyber’s impact in completely new ways -- or to be more accurate, concepts new to us in IT security but already very familiar to our colleagues in HR; with terms that seem very far from threat intelligence, such as wellbeing, inclusion and creating psychologically safe spaces.
ASRock beta firmware makes its motherboards the first to support Windows 11 Dynamic Lighting RGB controls
For anyone who is a fan of the bright and shiny, they can kit out their PC with a range of RGB lighting. Controlling RGB mice, keyboard and other device has long meant battling with a bewildering selection of third-party software, and this is something Microsoft aimed to simplify with the introduction of Dynamic Lighting in Windows 11.
The feature has been available since the release of Windows 11 23H2, and now ASRock has launched new beta firmware that adds Dynamic Lighting support to its motherboards.
AI-powered attacks, AI potential and tailored cloud -- healthcare tech predictions for 2024
Technologies like AI are set to impact on many industries but perhaps more than most on healthcare. This is also an industry that's uniquely attractive to hackers thanks to the mix of personal and scientific information that it holds.
So how will healthcare benefit -- or suffer -- from technology in 2024? here's what some experts with their fingers on the pulse think.
Authenticated content, improved technology and secretless access -- identity predictions for 2024
Despite moves towards other means of authentication passwords are still widely used, making protecting digital identities a problem.
But identity affects other areas too, such as being able to verify content and devices, things which are likely to come more more into focus as we approach significant elections in the US and UK. Here are some expert views on the identity landscape for 2024.
The future of legal roles in an AI-driven world
The advent of artificial intelligence (AI) and large language models (LLMs) marks a significant turning point for the legal sector. Recent studies suggest a dramatic change is on the horizon, with up to 44 percent of tasks in law firms potentially being automated by AI. This impending transformation necessitates a re-evaluation of legal roles, requiring professionals to adapt and collaborate with AI while also preparing for the emergence of new positions.
AI promises to greatly enhance the efficiency and effectiveness of legal services, from streamlining the creation of legal documents, contracts, and agreements to automating repetitive tasks, to ensure accuracy and uniformity. AI's capability extends beyond mere data extraction; it can rapidly summarize complex documents like depositions and complaints and transform text into actionable insights. This will empower legal professionals to better understand and manage legal obligations, which will significantly enhance client services.
Facing a riskier world: Get ahead of cyberattacks, rather than responding after the fact
Today’s complicated threat landscape leaves security teams grappling with new challenges on a scale never seen. Threat actors are more organized and efficient, leveraging a vast ecosystem of tools and services that cater to experts and beginners alike. In early March, the Cybersecurity and Infrastructure Security Agency (CISA) released an advisory warning of the resurgence of Royal ransomware with new compromise and encryption tactics used to target specific industries, including critical infrastructure, healthcare and education.
Cyberattacks are only increasing and growing more destructive, targeting supply chains, third-party software, and operational technology (OT). Gartner predicts that by 2025, threat actors will weaponize OT environments successfully to cause human casualties. This is happening at a time of increased technology adoption led by accelerated digital transformation efforts, hybrid work and the Industrial Internet of Things (IoT) boom, leaving security teams to manage an evolving and growing attack surface and multiplying vulnerabilities.
Best Windows apps this week
Five-hundred-and-seventy-four in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Microsoft released a troubleshooting tool to fix a printing issue that identified non-HP printers as HP printers. The tool corrects the issue when run.
Sophisticated attacks, changing authentication and quantum threats -- cybersecurity predictions for 2024
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.