Latest Technology News

Get 'Machine Learning Techniques and Analytics for Cloud Security' (worth $194) for FREE

Machine Learning Techniques and Analytics for Cloud Security covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions.

The aim of this book is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud environment.

Continue reading

80 percent of organizations not ready for CISA rules on security practices

The US Cybersecurity and Infrastructure Agency's (CISA) Secure Software Development Attestation Form rules come into force on June 11, 2024.

This requires software producers who work with the US government to adhere to and confirm the deployment of key security practices. But new research from Lineaje reveals that 80 percent of companies are not ready.

Continue reading

Lexar launches ARMOR 700 portable SSD


Lexar has unveiled its latest addition to the portable storage scene, the ARMOR 700 Portable SSD. This device caters to the needs of professional photographers, videographers, content creators, and gamers, providing a significant boost in speed and resilience.

The ARMOR 700 is engineered for extreme conditions, boasting an IP66 rating for dust and water resistance and a rugged design capable of enduring drops up to 3 meters. It offers top speeds of 2000MB/s for both reading and writing, ensuring that performance remains high even under stress.

Continue reading

Shokz expands open-ear true wireless earbud line with OpenFit Air

Shokz has announced the expansion of its open-ear true wireless earbud line with the launch of OpenFit Air. These earbuds feature Shokz's signature open-ear design, an adaptable ear hook for improved comfort, and crystal-clear audio.

Vincent Xiong, Chief Executive Officer at Shokz, said, "The evolution of our headphones has led us directly to OpenFit Air, open-ear earbuds that are ideal for working out, commuting, working or studying, and leisure. The team is proud of the excellent engineering to design a secure yet ergonomic earbud with natural audio. The lightweight design and case make OpenFit Air the perfect everyday earbud."

Continue reading

More testing needed to ensure security of web applications

A new report from CyCognito looks at the challenges faced by cybersecurity professionals in protecting web applications, which have become prime targets for cyberattacks.

Organizations maintain dozens, often hundreds, of custom web apps, developed in-house and by third-party partners. What's more over 60 percent update web applications weekly or more often.

Continue reading

Dexcom G7 continuous glucose monitoring system now connects directly to Apple Watch

DexCom has announced that its Dexcom G7 Continuous Glucose Monitoring (CGM) System now connects directly to Apple Watch in the United States. The Dexcom G7 is the first and only CGM system offering real-time glucose readings on the Apple Watch, providing users with freedom and convenience even when their iPhone isn’t with them.

Jake Leach, executive vice president and chief operating officer at Dexcom, stated, “At Dexcom, our users are at the heart of everything we do. Direct to Apple Watch has been one of our most requested features, and we’re thrilled to roll it out to Dexcom G7 users in the U.S. and around the world. We’ve long believed that people with diabetes should be able to view their CGM data where and how they choose. Direct to Apple Watch is a testament to that, allowing people with diabetes flexibility and choice in how they manage their health.”

Continue reading

Generative AI: Productivity dream or security nightmare?

The field of AI has been around for decades, but its current surge is rewriting the rules at an accelerated rate. Fueled by increased computational power and data availability, this AI boom brings with it opportunities and challenges.

AI tools fuel innovation and growth by enabling businesses to analyze data, improve customer experiences, automate processes, and innovate products -- at speed. Yet, as AI becomes more commonplace, concerns about misinformation and misuse arise. With businesses relying more on AI, the risk of unintentional data leaks by employees also goes up. For many though, the benefits outweigh any risks. So, how can companies empower employees to harness the power of AI without risking data security?

Continue reading

Biometrics explained: Breaking down the technology's controversy and contributions to security

Advancements in technology within the last decade have sparked the increased use of digital biometric verification. The technology’s modern verification capabilities have outpaced traditional cybersecurity attack methods geared toward credentials theft -- making the technology an attractive enhancement for corporations seeking to provide a more secure, seamless experience for users to verify their identities. Now, users can leverage biometric technology for secure access to critical information, such as applications in financial and healthcare sectors.

However, recent pushback from the Federal Trade Commission (FTC) on the use of biometrics for identity verification, particularly age verification, highlights compliance concerns surrounding enterprises’ data collection and storage practices -- especially the collection of minors’ biometric information.

Continue reading

The critical role of load balancing [Q&A]

When the internet first emerged, the need for load balancers was mainly to optimize the growing use of PC servers and to support the surge in Web traffic. Their basic functionality was designed to pool server resources to meet this demand.

Load balancers have come a long way since, becoming broadly accepted as essential for evolving IT infrastructure and the exponential growth of apps.

Continue reading

Microsoft officially deprecates NTLM and promotes Kerberos authentication

Microsoft building

Several months after announcing its intention to do so, Microsoft has official deprecated the NTLM (NT LAN Manager) authentication protocol in Windows and Windows Server.

NTLM is now a very old protocol which has been superseded by the more secure and feature-rich Kerberos. It will still be possible to use NTLM until the next release of Windows and Windows Server, but Microsoft is keen for users to take action now.

Continue reading

Windows 10 may be in its death throes, but Microsoft has reopened beta testing

Embossed Windows 10 logo

In something of an odd twist, Microsoft has announced that there will soon be a new beta version of Windows 10. Yes, Windows 10, not Windows 11.

There is a little over a year until Microsoft brings Windows 10 to end of service, meaning it will receive no more updates of any description. Despite this looming deadline, the reopening of the Windows 10 beta channel means that the first beta build of the operating system in three years is just weeks away. So what is going on?

Continue reading

Cooler Master unveils MasterHub Stream Kit at Computex 2024 with modular design for content creators

Cooler Master, known for its extensive range of PC components and gaming peripherals, has introduced the MasterHub Stream Kit at Computex 2024. This upcoming product is specifically designed to cater to the diverse and evolving needs of content creators, including video editors, sound designers, and streamers. The MasterHub Stream Kit stands out as the first of its kind to feature modular components, which users can easily swap and rearrange according to their specific requirements.

The core of the MasterHub Stream Kit is its base module, equipped with pogo pins that facilitate quick attachment and removal of components, along with built-in magnets to ensure each piece remains securely attached. One of the key elements of this modular system is a customizable 15-key IPS display module, which allows users to fully tailor their control setup with macros, scenes, and other commands.

Continue reading

TRIBIT launches StormBox 2 Bluetooth speaker with 24-hour playtime

TRIBIT has launched the StormBox 2 Portable Bluetooth Speaker, an enhanced version of its popular predecessor. Featuring advanced Bluetooth 5.3 technology, the StormBox 2 offers a stable and extended 30-meter range, catering to a wide array of audio needs with its impressive 24-hour playtime and versatile app compatibility.

The newly upgraded speaker boasts a powerful 360° audio experience with two embedded 48mm full-range drivers, ensuring crystal-clear sound quality at a peak power of 34W. Whether you're looking to enjoy music at home or on the go, the StormBox 2's 360° surround sound offers complete audio immersion.

Continue reading

Executives keen to adopt AI coding tools -- developers less so

A new report reveals a disconnect between those in the C-suite and their eagerness to adopt AI coding tools compared to those actually using them who are cautious of AI.

The research from Snyk shows CTOs and CISOs are five times more likely than developers to believe AI coding tools pose no risk and twice as likely than developers to believe they are 'extremely ready' to adopt AI coding tools.

Continue reading

70 percent of enterprises have dedicated SaaS security teams

SaaS

Organizations have prioritized investment in SaaS security, with 70 percent establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions.

A new report from the Cloud Security Alliance (CSA), commissioned by cloud security specialist Adaptive Shield, also finds 39 percent of organizations are increasing their SaaS cybersecurity budgets compared to last year.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.