Which comes first? The pentest or the bug bounty program? [Q&A]


Bug bounty and penetration testing programs are often grouped as interchangeable, but they perform distinct functions.
To determine whether both deserve a place within a cybersecurity strategy, it is important to understand their specific qualities and how they have matured over recent years. We spoke to Chris Campbell, lead solutions engineer at HackerOne, to learn more.
Microsoft means business with new Surface devices


Whilst Microsoft's Surface devices have been around for a few years and have many features that make them attractive for business users, there's never been a version aimed specifically at businesses… Until now.
With the launch of Surface Pro 10 for Business and Surface Laptop 6 for Business the company is targeting the business market with features including improved performance and battery life, more ports, better security and custom, durable anti-reflective displays.
Get 'Learn Java with Projects' (worth $44.99) for FREE


Learn Java with Projects stands out in the world of Java guides; while some books skim the surface and others get lost in too much detail, this one finds a nice middle ground.
You’ll begin by exploring the fundamentals of Java, from its primitive data types through to loops and arrays. Next, you’ll move on to object-oriented programming (OOP), where you’ll get to grips with key topics such as classes, objects, encapsulation, inheritance, polymorphism, interfaces, and more.
TikTok under investigation for failing to protect minors and using algorithms that promote addiction


The latest online service to find itself facing scrutiny from the European Commission is TikTok. The Chinese-owned, video-based social media platform faces a probe from the Commission after an initial investigation into whether the company had breached the Digital Services Act (DSA).
Particular areas interest are TikTok's use of algorithms to surface content, with investigators worried about whether they create a "rabbit hole effect" and encourage addictive behavior. TikTok also faces criticisms for various failures to protect younger users, but there are concerns about the overall transparency of the platform, but especially in relation to advertising.
Satechi updates Thunderbolt 4 Slim Hub Pro and Stand & Hub for Mac mini


Satechi has just rolled out refreshed versions of two popular devices -- the Stand & Hub for Mac mini (and Mac Studio) and the Thunderbolt 4 Slim Hub Pro. These upgraded gadgets, being showcased at CES 2024, are already up for grabs.
The revamped Stand & Hub for Mac mini and Mac Studio now boasts an NVMe SSD enclosure -- it is no longer limited to SATA M.2 drives. This feature could be a game-changer for users looking for swift data transfer speeds and additional storage -- all streamlined through a single cable.
eufy X10 Pro Omni is a revolutionary robotic vacuum and mop


Today at CES, eufy announced the X10 Pro Omni, a state-of-the-art robotic vacuum and mop This new flagship device blends the robust suction and self-emptying capabilities of the X8 Pro with the advanced mopping and self-cleaning functions of the X9 Pro, further enhanced by AI technology.
The eufy X10 Pro Omni stands out with its 8,000Pa suction power, effectively tackling common household messes like pet fur, mud, and various spills. This performance is paired with the MopMaster System 2.0, offering features like auto-lift mopping for seamless surface transition, dynamic dual rotating mops for thorough cleaning, and edge-hugging capabilities for comprehensive coverage.
External attack surface management [Q&A]


The external attack surface -- those assets which face the internet -- is attracting a lot of attention at the moment, with Gartner naming it as a top security risk.
To find out more about external attack surface management (EASM) and why organizations need to take it seriously, we spoke to Rickard Carlsson, CEO of Detectify.
Cybersecurity for SMEs: Seven steps to a Zero Trust approach


Never trust, verify everything! This is the premise on which the "Zero Trust" approach was founded. This model of cybersecurity involves implementing controls designed to ensure that only verified users can access company resources, and from similarly approved devices.
This strategy is increasingly being adopted in response to the challenges faced by small and medium-sized enterprises (SMEs), such as the continued evolution of hybrid working, the use of Bring Your Own Device (BYOD) and the increase and sophistication in cyber-attacks. Whereas previously SMEs thought they weren’t a target, now they are seen as the weaker link from a hackers’ perspective and increasingly they are falling victims to cyber attacks.
Three methods to improve organizational data quality today


Our modern business landscape transforms constantly, yet the value of data endures. However, thriving companies don’t merely amass data -- they cultivate meaningful data.
Leaders must have trustworthy data to unlock organizational insights, but inaccurate data is still rampant in most organizations. This data costs leaders far more than missed opportunities. According to industry research, bad data costs U.S. enterprises $3.1 trillion annually. Still need convincing about the benefits of data quality? Let’s discuss the benefits of high-quality data and explain how leaders can adopt a leading data management strategy today.
How to protect your organization against SEO poisoning and malvertising


Alongside traditional approaches like software vulnerabilities and misconfigurations in applications, hackers are constantly looking for new ways to get into devices and corporate networks. Two of the biggest growing threats are Search Engine Optimization (SEO) poisoning and Malvertising.
SEO Poisoning is where hackers lure victims to legitimate websites by populating them with content on topics of interest to potential victims. For example, Gootloader, an Initial-Access-as-a-Service operation, targets law professionals because they handle sensitive business data that can be extremely valuable. Hackers use Gootloader to get a foothold into an organization’s IT environment and then spread laterally through the entity’s IT network to implant ransomware or exfiltrate data.
The dark estate: Reclaiming productivity and millions


The modern workforce is more distributed and dependent on devices than ever before. In this hybrid work environment, digital employee experiences are siloed. IT teams are on the hook to ensure end-user productivity despite strained financial resources and the IT talent war.
Despite their technical expertise, IT service teams are limited in their ability to be in multiple locations at once. Distributed workforces further cause significant blind spots and open up businesses to vulnerabilities hiding in the dark estate. That’s where hidden issues live, yet IT teams can’t see them. The potential for unknown risks is nothing new in IT. So why should businesses care about the dark estate, especially now when IT departments are already burdened by lengthy lists of service requests, putting out fires, and keeping up with security challenges?
Panos Panay's shift to Amazon could signal the death of Microsoft Surface


In a startling development, Panos Panay, the mind behind Microsoft’s Windows and Devices division, has officially jumped ship to Amazon. Yes, folks, the rumors were true. Amazon CEO Andy Jassy announced today that Panay will, in fact, be helming the Devices and Services business, replacing Dave Limp later this year.
While on the surface this seems like a significant win for Amazon, it might be worth pondering the implications of Panay’s exit from Microsoft. With nearly two decades at Microsoft, Panay’s sudden move raises eyebrows and stirs concerns regarding the internal dynamics at Microsoft.
The rise in mobile device security threats and the growing attack surface [Q&A]


Both government agencies and corporations are being tasked with developing strategies for protecting mobile devices from an increasing wave of attacks. CISOs and business leaders are asking themselves not only how they can use mobile devices to make employees more productive, but also how to realize the full potential of a mobile-powered business.
As leaders execute their mobile-powered businesses, they will also need to parallel these initiatives with mobile-first security strategies to address the fast-growing attack surfaces that bad actors are increasingly jumping on. We spoke to Shridhar Mittal, CEO of Zimperium to discover more.
Microsoft unveils four new Surface devices


Today, at its hardware event, Microsoft took the wraps off four brand-new Surface devices aimed at end users and IT professionals.
According to Nancie Gaskill, General Manager, Surface, these new products "have been redesigned to reflect our longstanding commitment to integrating the voice of commercial customers" while also "supporting the needs of IT professionals to deploy, manage and support these devices at scale." These are the four new devices that were announced:
Is banning the right solution to dealing with problem apps? [Q&A]


Lots of apps are potentially transmitting and saving user data without express permission and this has led some administrations to consider bans.
In May, Montana passed the first bill to ban TikTok statewide due to data concerns, and India has banned 60 apps, including TikTok, claiming they were transmitting user data back to China.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.