Latest Technology News

The evolution of open source in the enterprise [Q&A]

Open source software has been around for decades, it's thriving, effective and disrupting in the enterprise more than ever.

We talked to, Cédric Gégout, VP product management at Canonical, to discuss the evolution of open source in the enterprise and protecting its fundamentals for continued success.

Continue reading

More integration of LLMs, a switch to private clouds and more emphasis on machine identity -- enterprise IT predictions for 2024

Enterprises are major users of technology and it impacts on most areas of their operation. The big challenges in recent years have come from the switch to remote and hybrid working, and new technologies like generative AI.

So what can we expect enterprise IT to face in 2024? Here are some expert views.

Continue reading

What are the top cybersecurity trends to look out for in 2024?

As 2024 fast approaches, organizations are looking back on the past year to try and gain some insight into what the next 12 months could hold. This past year has been particularly interesting in the world of cyber security, with ransomware and data breaches dominating the headlines, the rise to prominence of AI strengthening cybercrime’s arsenal, and the shift of focus to cyber resilience causing businesses to question what comes next for the industry.

For security professionals across organizations of all sizes we anticipate the following issues will be a key focus for the year ahead:

Continue reading

Kubernetes monitoring: 5 essential strategies for DevOps success

Monitoring Kubernetes clusters is a critical aspect of managing cloud-native applications. Kubernetes, a favored tool among giants like Spotify and Major League Baseball, empowers developers to create and operate at scale. However, the complexity of Kubernetes with its multitude of nodes and containers demands a robust monitoring strategy.

In this article, we share five key practices to enhance your Kubernetes monitoring approach. Let's dive in...

Continue reading

How companies can respond better to security risks [Q&A]

Risk dial

One of the biggest issues when dealing with security risks is the time that it takes to address problems when they come to light.

We spoke to Yoran Sirkis, CEO of remediation operations specialist Seemplicity, to discuss why there's an issue and how workflow problems around responding to risks can be improved.

Continue reading

Generative AI is forcing enterprises -- and policymakers -- to rewrite the rules of cybersecurity

Following a year full of excitement and uncertainty, and more opinions about the future of AI than anyone could count, AI providers, enterprises, and policymakers are now rallying around one thing: AI security. 

The White House recently followed in the European Union’s footsteps to introduce a new set of standards for the secure development and deployment of AI models. But while regulators triangulate their policies and AI companies work to comply, the real responsibility to proceed safely will remain with enterprises. 

Continue reading

How many times are you going to think about ransomware in 2024?

ransomware laptop

In 2023, we saw the popular trend of asking "how many times a week do you think about the Roman Empire?", and as an avid Roman Empire fan, my answer was a lot. In fact, the fall of the Roman Empire can be easily compared to ransomware breaches.

In 410 AD, the impenetrable walls of Rome were breached by the Visigoths, signaling an end to the once-mighty empire. The reason for the defeat of the Romans was complacency -- the walls and other defenses were in a state of disrepair, and Rome lacked a substantial military presence.

Continue reading

What to look out for when it comes to cybersecurity regulations in 2024

cybersecurity

It’s been another busy year for cybersecurity regulations. We saw a new National Cybersecurity Strategy by the White House in March, and throughout the year, we’ve seen the National Cybersecurity Center (NCSC) launch several new initiatives to increase cyber resilience.

As mentioned by Joseph Carson, Chief Security Scientist & Advisory CISO at Delinea, the landscape of cybersecurity compliance is expected to "evolve significantly, driven by emerging technologies, evolving threat landscapes, and changing regulatory frameworks."

Continue reading

Enlightenment 0.26.0 Linux desktop environment released -- enhanced stability and new features

The latest version of Enlightenment, 0.26.0, has arrived, bringing a slew of improvements and new features to this popular Linux desktop environment. This release emphasizes on squashing numerous minor bugs, enhancing user experience, and introducing some experimental features.

A key highlight of this update is the extensive list of minor bug fixes, which can be viewed in the detailed git log. Developers have focused on ensuring a more stable and reliable experience for users, addressing various glitches and issues reported in previous versions.

Continue reading

You can now access X alternative Bluesky without an account

Bluesky butterfly logo

Elon Musk's impact at X -- or Twitter as it was when he bought the company -- has broadly been seen as negative. While some have welcomed his maverick approach to managing the social platform, it left many others seeking a new home. Bluesky and Mastodon quickly emerged as viable alternatives, although Meta has attempted to muscle in on the action with Threads.

Each platform has its own set of pros and cons, but a major obstacle for Bluesky is that it remains invite-only. On top of this, it has not been possible for anyone without an account to view posts made by others -- but this is now changing, as is the platform's logo.

Continue reading

WOLFBOX launches Level 2 Electric Vehicle (EV) Charger with Wi-Fi

WOLFBOX has launched its new Level 2 Electric Vehicle (EV) Charger. This new charger looks to be an excellent solution to the fragmented charging landscape in the US, characterized by varied plugs and connectors across different manufacturers and networks. WOLFBOX even provides dedicated customer support for Tesla owners, assisting them in acquiring the required adapter to ensure smooth compatibility.

This charger stands out with its sophisticated features, such as the ability to schedule charging sessions, remotely monitor charging status, and support for RFID cards. With both Wi-Fi and Bluetooth support, it is clearly a very comprehensive package.

Continue reading

The CISO's next priority isn't technology, it's building a great employee experience

CISO

In security, we are very used to talking about features and functions in the tools we use. When it comes to measuring the positive impact of what we spend on cyber, in terms of both people and equipment costs, we tend to be equally abstract -- for years, 'mean time to detection' and 'mean time to resolution' have probably been the two most widely-used metrics for cybersecurity progress, and measuring the number of security incidents handled is still probably how the CISO tracks his team’s contribution to the organization.

But no longer. Today we need to start thinking about measuring cyber’s impact in completely new ways -- or to be more accurate, concepts new to us in IT security but already very familiar to our colleagues in HR; with terms that seem very far from threat intelligence, such as wellbeing, inclusion and creating psychologically safe spaces.

Continue reading

ASRock beta firmware makes its motherboards the first to support Windows 11 Dynamic Lighting RGB controls

ASRock RGB lighting support

For anyone who is a fan of the bright and shiny, they can kit out their PC with a range of RGB lighting. Controlling RGB mice, keyboard and other device has long meant battling with a bewildering selection of third-party software, and this is something Microsoft aimed to simplify with the introduction of Dynamic Lighting in Windows 11.

The feature has been available since the release of Windows 11 23H2, and now ASRock has launched new beta firmware that adds Dynamic Lighting support to its motherboards.

Continue reading

AI-powered attacks, AI potential and tailored cloud -- healthcare tech predictions for 2024

telemedicine

Technologies like AI are set to impact on many industries but perhaps more than most on healthcare. This is also an industry that's uniquely attractive to hackers thanks to the mix of personal and scientific information that it holds.

So how will healthcare benefit -- or suffer -- from technology in 2024? here's what some experts with their fingers on the pulse think.

Continue reading

Authenticated content, improved technology and secretless access -- identity predictions for 2024

Despite moves towards other means of authentication passwords are still widely used, making protecting digital identities a problem.

But identity affects other areas too, such as being able to verify content and devices, things which are likely to come more more into focus as we approach significant elections in the US and UK. Here are some expert views on the identity landscape for 2024.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.