From application to zero trust: Identity security fundamentals to stay ahead of the threat landscape


Cybercriminals are not new, and often neither are their tactics. Despite this, phishing attacks, which incorporate social engineering in emails and messages to persuade people to perform an action that puts organizations at risk, continue to be highly successful. New technologies, such as GenAI, are improving these tactics further and companies must implement a strategic approach built on a solid foundation of identity security to minimize risks.
The most glaring vulnerability within an organization stems from human error. Mistakes such as using weak passwords, reusing credentials across multiple platforms, or falling victim to phishing attacks, can provide malicious actors with an easy gateway into secure systems. Social engineering exploits the natural human inclination to trust, deceive employees into divulging sensitive information or unwittingly granting access. Despite widespread awareness campaigns, these tactics continue to succeed, highlighting the gap between knowledge and practice, which presents a major risk to organizations.
Get 'The Self-Taught Computer Scientist' (worth $19.99) for FREE


Fresh out of college and with just a year of self-study behind him, Cory Althoff was offered a dream first job as a software engineer for a well-known tech company, but he quickly found himself overwhelmed by the amount of things he needed to know, but hadn’t learned yet. This experience combined with his personal journey learning to program inspired his widely praised guide, The Self-Taught Programmer.
Now Cory's back with another guide for the self-taught community of learners focusing on the foundations of computer science.
Apple relaunches Beats Pill with new design and enhanced audio for $149.99


Apple has reintroduced the iconic Beats Pill, a portable Bluetooth speaker that merges classic design with modern upgrades, available for $149.99 here. Offered in Matte Black, Statement Red, and Champagne Gold, the speaker comes fully equipped with improved sound quality, enhanced durability, and increased portability.
Oliver Schusser, Vice President of Apple Music and Beats, expressed his enthusiasm about the reintroduction, stating, "The Beats Pill is back and better than ever -- now packed with outstanding sound, all-day battery life, and convenient features."
Businesses regularly face AI-driven fraud


A new report finds that 76 percent of fraud and risk professionals believe their business has been targeted by AI-driven fraud, with over half reporting this type of fraud happening daily or weekly.
The study, from anti-fraud platform Sift, finds the emergence and increased adoption of AI tools, including publicly available chatbots, enables cybercriminals to conduct scalable fraud attacks against both individuals and businesses.
Forget Microsoft Windows 11 Copilot+ PCs: This TUXEDO InfinityBook Pro 15 is the Linux laptop you really need


As the tech world buzzes about Windows 11 and its Copilot+ PCs, those in the know might want to turn their attention to something running open-source software instead. Enter the TUXEDO InfinityBook Pro 15 -- a Linux laptop that combines sleek design with powerful performance, making it the smart choice for anyone looking to step beyond mainstream closed-source offerings. With its robust features and superior portability, this is the laptop you may want.
The newly refreshed TUXEDO InfinityBook Pro 15 has been designed to combine the functionality of a large, bright 15.3-inch screen and high-performance CPU options with the portability of an ultra-thin, lightweight aluminum body. Despite being less than 20 mm thick and weighing just 1.6 kg, the device doesn't compromise on functionality, making it ideal for both business and personal use.
WatchGuard makes enterprise-grade threat detection available for all organizations


Smaller businesses are often more at risk of cyberattack simply because they lack the resources of their larger counterparts.
WatchGuard Technologies is looking to change that with the launch of an open XDR solution that delivers levels of visibility into east/west and north/south network traffic previously only available to large enterprises with the resources to manage their own security operations center.
DORA: A blueprint for cyber resilience in the U.S.


In today’s post-pandemic world, businesses are looking to shift back into the office while leveraging the learnings from the pandemic. Digital operations are going to be the new normal. With business innovations increasingly helping enterprises provide faster and easier-to-consume services to customers, the digital way of business is continuously creating a much larger digital footprint than ever before.
However, continuously increasing digital footprint also means possible targets of cyberattacks are also increasing equally rapidly. What is interesting to note is while investments in cybersecurity are increasing, so have the cyberattacks. According to CrowdStrike, attackers are moving faster within enterprises after an initial breach, with the average time it takes to hit patient 1 after patient 0 (the typical indicator of lateral movement) falling from 84 minutes to 62 minutes in the last year. Unfortunately, while many enterprises are continuing to invest in cyber security, far few invest in cyber defense, yet everyone wants the assurance of cyber resilience.
Office workers not worried about losing out to AI


Although many people fear that artificial intelligence could put their jobs at risk, a new study from Jitterbit shows that many see AI as offering new skills and personal growth opportunities.
Based on a survey by Censuswide of 1,022 full-time office workers in the UK and US, the study looks at how workers really feel about AI and the findings reveal a positive views of working with AI technology in professional settings.
Land of hope, glory and e-waste: Brits are set to become the biggest contributors to electronic waste this year, but why?


As technology evolves and becomes more accessible, providing new and exciting ways to make our lives easier, it’s easy to ignore the elephant in the room -- the huge amount of e-waste our appetite for consumption is causing. Ignorance has been bliss, but with research suggesting this year the UK could become the world’s biggest contributor to e-waste per head, transformative action is long overdue.
While our drive to have the latest technology is natural, we need to consider what happens to old devices when we upgrade.
A technical overview of Cisco IoT part 2: Hardware


The following article continues the Cisco IoT series, shifting focus to the essential networking hardware that powers IoT solutions. Part one of the series explored the foundational elements of IoT routing and switching, emphasizing the critical role these components play in ensuring seamless connectivity and robust data flow. Building on that discussion, this piece will outline the significant opportunities in IoT networking and security that Cisco supports through its innovative hardware offerings.
IoT is a rapidly expanding area of networking with increasing use cases. It impacts various sectors, including healthcare and retail, by providing valuable security or cost-saving benefits through new forms of sensors. These sensors enable new capabilities such as better inventory management and improved products.
Beyerdynamic launches VERIO 200 open-ear true wireless earphones


Beyerdynamic has officially launched its first open-ear true wireless earphones, the VERIO 200. Designed for active lifestyles, these earphones combine high-quality sound with an open-ear design, allowing users to remain aware of their surroundings. They are constructed with premium materials, including a metal hinge in the charging case for durability.
The VERIO 200 features a 16.22mm high-performance graphene neodymium driver, which delivers precise sound and robust bass. This design minimizes sound leakage, enhancing the listening experience while ensuring users are aware of their environment, making these earphones suitable for commuting, workouts, and outdoor activities.
Google unveils savvy shopping tools to help you save big this summer


Summer has officially arrived in the U.S., and it's not just the temperature that's rising -- so is the anticipation for massive summer sales. It seems everyone's gearing up to grab those hot deals that make summer shopping sizzle. In fact, recent data shows that 44 percent of shoppers are more likely to make purchases during deal days, reflecting a major shift in seasonal spending patterns.
Recognizing this trend, Google has launched new and enhanced shopping tools designed to help you score the best deals without breaking a sweat. With the introduction of an updated deals destination, you no longer have to juggle a hundred browser tabs. Google's Shopping Graph, boasting over 45 billion product listings, offers a streamlined shopping experience, ensuring you find the lowest prices in one convenient spot.
Kingston launches FURY DDR5 RGB Limited Edition memory


Kingston has launched its latest product, the FURY Renegade DDR5 RGB Limited Edition. This memory kit is specifically designed for high-performance computing applications, making it ideal for gamers, video editors, and content creators.
The kit features a striking design with a red and black heat spreader that is inspired by automotive styling. It offers enhanced performance with a speed of 8000MT/s, designed to reduce bottlenecks during intensive computing tasks. The memory also includes 12 LEDs that provide a wide range of customizable lighting effects, managed through the Kingston FURY CTRL software.
UK companies plan to increase AI spending


According to a new report, UK companies are prioritizing AI, with larger expected budget increases than in the US and Germany, and 90 percent considering AI a critical topic.
The report, from analytics database company Exasol, finds UK organizations expect to prioritize AI implementation through larger data and analytics budget increases over the next two to three years in the retail (+48 percent) and healthcare sectors (+100 percent).
European Commission says Apple breaks competition rules and charges too much


Apple's practices with its App Store and the policies relating to it means that the company is in breach of European Union laws. The European Commission says that Apple fails to comply with the Digital Markets Act (DMA).
The iPhone-maker has been criticized following an investigation by the Commission, and the findings say that App Store rules "prevent app developers from freely steering consumers to alternatives channels for offers and content".
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.