Latest Technology News

Get 'Learning Spring Boot 3.0 -- Third Edition' (worth $35.99) for FREE

Spring Boot 3 brings more than just the powerful ability to build secure web apps on top of a rock-solid database.

It delivers new options for testing, deployment, Docker support, and native images for GraalVM, along with ways to squeeze out more efficient usage of existing resources. This third edition of the bestseller starts off by helping you build a simple app, and then shows you how to secure, test, bundle, and deploy it to production.

Continue reading

AI-driven search helps uncover cloud risks

Cloud data protection

It's crucial for organizations to have a complete and comprehensive view of all their cloud assets, but the process of discovery can be a difficult one, especially if multiple platforms are involved.

Cloud security platform Orca Security is launching a new AI-powered cloud asset search that is aimed at making the process more intuitive and available not only to security practitioners, but also developers, DevOps, cloud architects, and risk governance and compliance teams.

Continue reading

Guardians of privacy: The promise of fully homomorphic encryption in the AI and blockchain era

The rise of AI has been nothing short of meteoric, especially with the advent of extensive language models like ChatGPT. We're witnessing a technological tide that might not only match, but even eclipse the transformative power of the internet. Every corner of our world, from the intricate complexities of finance to the foundational elements of education, is currently in the throes of a radical transformation catalyzed by artificial intelligence.

Yet, as we march forward in this brave new world of machine learning and digital cognition, there's an ever-looming shadow: the challenge of data privacy. Every digital query, every command we voice, and every interaction we have with these advanced systems invariably deposits bits of our personal information into vast databases. These repositories, managed by the service providers, become de facto vaults of our digital identities. The gravity of this concern hasn't been lost on the world's decision-makers. Countries not yet willing to take the blind leap have started sounding the alarm, and corporate behemoths have begun implementing restrictions on the use of such AI-driven tools.

Continue reading

Hiding undetected: Why security teams can no longer overlook HTTPS decryption

Decrypting HTTPS (TLS/SSL) traffic at the network perimeter is a vital step in protecting against malware and other online threats. Most of today’s web traffic is encrypted and presents an obvious hiding place for threat actors to deliver cyberattacks, since many network security controls aren’t set to inspect encrypted traffic. Consider recent findings from WatchGuard’s Threat Lab in its Q4 2022 Internet Security Report (ISR). While the report showed an apparent decline in overall malware volume, the Threat Lab analysts found a much higher prevalence of malware being delivered over encrypted connections when they looked closer at decrypted HTTPS traffic. These results came from a mere 20 percent of devices decrypting TLS and indicate the other 80 percent would also show malware volume is up, but hidden -- which mirrors findings from previous quarters.

Despite this trend, it’s common for teams not to enable decryption at the firewall due to the complications it can present. The process requires resources to decrypt and then re-encrypt traffic passing through a gateway device, as well as next-gen firewalls (NGFW) or unified threat management (UTM) appliances that use significant computing horsepower, all which impact network performance. Then, introducing decryption while managing the performance of other security tools and their varying uses could be difficult. Today, however, tabletop UTM/NGFW solutions can perform this process at the speed of the incoming WAN connection. So now, users’ main objection is the initial configuration of TLS/SSL decryption, and the need for exceptions for certain applications.

Continue reading

How to speed up File Explorer in Windows 11

Snail on a rocket

The vast majority of software bugs are, almost by definition, a problem. A bug can cause unexpected behavior, reduce performance, and cause endless other issues. But there is a bug in Windows 11's File Explorer that actually makes it better.

If you've ever thought that File Explorer would benefit from a speed boost, there's some good news. A strange bug can be exploited to noticeably improve performance in a split second.

Continue reading

Fix the UNSUPPORTED_PROCESSOR error in Windows with a BIOS update from MSI

MSI Blue Screen of Death

It is now a couple of weeks since a Windows 11 update resulted in a large number of people suddenly seeing UNSUPPORTED_PROCESSOR error messages.

At the time, the finger of blame was pointed at Microsoft, although the company was quick to suggest that the fault may be elsewhere. With the issue affecting MSI motherboards, the hardware manufacturer offered up a workaround. Now MSI has released a BIOS update that properly fixes the problem for Intel 700 and 600 series boards.

Continue reading

Samsung announces 4TB variant of its popular 990 PRO SSD

Let's face it, when it comes to solid state drives, Samsung’s offerings are some of the most reliable. That is why many people trust that company’s SSDs to store their important data. Today, Samsung unveils a new 4TB version of its wildly popular PCIe 4.0 990 PRO SSD.

The heart of this new 4TB offering is the eighth-generation Samsung V-NAND (V8) technology. Paired with an enhanced proprietary controller, this SSD is designed to handle almost anything you throw at it, from 3D/4K graphics work to data analytics.

Continue reading

AI chatbot simplifies Kubernetes management

Kubernetes management platform company D2iQ is launching new updates to its D2iQ Kubernetes Platform (DKP) that include DKP AI Navigator, an AI assistant that enables enterprise organizations to overcome the skills gap they face in adopting cloud-native technology.

DKP AI Navigator enables organizations to harness more than a decade of the D2iQ team’s experience. It's been trained on D2iQ's internal knowledge base, enabling customers to ask questions and receive real-time responses in a natural, intuitive way. This can reduce the duration and cost of system misconfigurations and downtime while helping organizations overcome the Kubernetes skills gap.

Continue reading

Lack of cybersecurity staff affects over 70 percent of organizations

Vacant chair

The cybersecurity skills crisis has impacted 71 percent of organizations and left two-thirds of cybersecurity professionals saying that the job itself has become more difficult over the past two years.

New research carried out by Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) finds 66 percent of respondents believe that working as a cybersecurity professional has become more difficult over the past two years, with close to a third (27 percent) stating that it is much more difficult.

Continue reading

Get 'Excel All-in-One For Dummies' (worth $27) for FREE

Excel-erate your productivity with the only guide you'll need to the latest versions of Microsoft Excel.

Microsoft Excel offers unsurpassed functionality and accessibility for data exploration and analysis to millions of users around the world. And learning to unlock its full potential is easier than you can imagine with help from Excel All-in-One For Dummies.

Continue reading

As the cookie crumbles, ID resolution reignites customer experience

In today's digital world, one customer can have multiple identifiers. These identifiers track customer information, transactions, and interactions as they engage with a  business through its web browser, mobile app, and in-store. Each of these touchpoints might capture different data about the customer, creating different identifiers. This can lead to customer data ending up in disconnected silos throughout the organization, impacting the company’s ability to target marketing and advertising efforts.

Without a comprehensive view of a customer's journey, brands struggle to understand consumers’ needs, creating a bad customer experience (CX). In fact, CX quality fell for 19 percent of brands last year, with 49 percent of customers stating they left a brand they had originally been loyal to in the last 12 months due to poor CX. With customer loyalty at stake, it’s more important than ever that brands use identity resolution (ID) resolution to improve CX, increase retention, and drive revenue.

Continue reading

Boards show confidence in their cybersecurity but still think they're at risk of attack

A new survey reveals that board members tend to feel good about their company's cybersecurity policy, but that many are still unprepared to face a cyberattack.

The study from Proofpoint surveyed over 650 board members across 12 countries and finds that 73 percent believe cybersecurity is a high priority for their board, 72 percent feel their boards understand the threats they face, and 70 percent agree they have adequately invested in resources.

Continue reading

Why vulnerability management needs a refresh [Q&A]

Adversaries are exploiting new vulnerabilities much faster than organizations are remediating them. As a result, prioritizing the wrong vulnerabilities will squander security teams' most critical resource -- time.

So, how can organizations prioritize the right threats? We spoke with Anthony Bettini, founder and CEO of VulnCheck, to find out.

Continue reading

Ultimate Ears launches EPICBOOM Bluetooth speaker

Ultimate Ears, the high-fidelity offspring of Logitech, is giving us yet another reason to jam out wherever we please with its newest release—the EPICBOOM portable Bluetooth speaker.

It's no secret that we're in the midst of an environmental crisis, and guess what? Ultimate Ears knows it too. The EPICBOOM isn't just about belting out crisp tunes; it's also about being good to Mother Earth. The speaker is crafted from 100 percent post-consumer recycled polyester fabric and a minimum of 59 percent post-consumer recycled plastic. "We design our products with our customers and their lifestyles in mind," says Jonah Staw, the General Manager of Ultimate Ears. Clearly, part of that lifestyle includes caring for the planet we call home.

Continue reading

Logitech Pebble 2 Combo blends style, functionality, and sustainability

Today, Logitech unveils the Pebble 2 Combo keyboard and mouse that seamlessly blends form and function. Not only is this combination beautiful, but it is quite affordable too.

This combo is available in five colors: Tonal Graphite, Tonal White, Tonal Rose, Tonal Sand, and Tonal Blue. With a minimalist design, both the Pebble Keys 2 K380s keyboard and the Pebble Mouse 2 M350s make a subtle yet strong style statement. Plus, they are crafted from recycled plastic.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.