Latest Technology News

Cyber insurers play harder to get as claims increase

insurance key

A new survey of over 300 organizations in the US finds that the time and effort to obtain cyber insurance is increasing significantly.

The survey, conducted by Censuswide on behalf of privileged access platform Delinea, looked to uncover new trends and evolving patterns since a similar report last year and finds that the numer of companies using their cyber insurance more than once increased to 47 percent.

Continue reading

7 cost benefits of cloud computing

Cloud dollars

Both aspects of a list of cloud computing costs and benefits could be summed up with just two words: "Lots, potentially."

While hosting your application in the cloud does come with a tangible price tag, leveraging the power of the cloud can have a profound positive impact on your business. Fortunately, there are many ways in which cloud computing reduces costs. With careful planning, most companies, especially start-ups and small businesses, can scale their operations and continue building products much faster and more cost-effectively than with on premises hosting.

Continue reading

3 ways automation can enhance organizational security to overcome the cybersecurity skills shortage

plugging a gap

In the race towards the Fourth Industrial Revolution, organizations are embracing technologies that enhance connectivity and streamline processes. While rapid digitalization has helped businesses thrive and stay afloat during a turbulent last few years, it has also opened the door to increased vulnerabilities that malicious actors can exploit.

This increased exposure comes at a time when cybersecurity threats worldwide continue to increase at an alarming rate. According to the latest Blackberry Global Threat Intelligence Report, the number of unique attacks using new malware samples skyrocketed by 50 percent from December 2022 to February 2023, with up to 12 attacks per-minute observed. In the UK, where cybersecurity has been identified as a Tier 1 threat alongside terrorism, war and natural disasters, 32 percent of businesses have reported a breach or attack during the last 12 months.

Continue reading

Microsoft is testing OS-level plugins for Windows Copilot in Windows 11

Windows 11 logo on a laptop

Windows Copilot -- Microsoft's latest AI tool -- may not seem groundbreakingly useful yet, but all of this is set to change. Microsoft is currently testing a series of plugins for the artificial intelligence-powered assistant that will make it a valuable asset for getting things done at OS-level in Windows 11.

Rather than simply being a glorified version of the new AI-driven Bing, Windows Copilot's plugins allow for tight integration with Windows 11. This means that users will be able to call on Copilot to change settings, interact with the operating system and apps, and much more. Importantly, by taking a plugin-based, modular approach, Microsoft is helping to ensure that Windows Copilot does not become a bloated behemoth.

Continue reading

Yahoo Mail reinvents Inbox with new AI tools and Shopping Saver feature

Yahoo logo

Today marks a significant leap in email innovation as Yahoo introduces advanced AI tools to its Yahoo Mail. Not just enhancing the existing AI beta experience, the tech giant also unveils its brand-new feature, Shopping Saver, aimed at saving users both time and money. With this, Yahoo is not just updating an inbox; they're reimagining it.

Distinctive to Yahoo Mail, Shopping Saver is the beacon that illuminates those lost treasures in user inboxes -- forgotten gift cards, elusive discount codes, and untouched store credits. In an imprsssive move, it not only uncovers these but also crafts messages to vendors, proposing the application of these savings post-purchase.

Continue reading

Securing applications: 4 common cyber attack types WAAP can prevent

DevSecOps

Cyber threats are rapidly changing. And businesses need security solutions that can keep up. With traditional cybersecurity solutions, APIs and applications that are accessible to the public are often left vulnerable -- exposed to hackers.

Web Application and API Protection (or WAAP), on the other hand, uses machine learning and automation to close the gap in security that old tools have left behind. It protects the company from versatile cyber attacks that exploit flaws within applications. What are some of the common kinds of cyber threats that the WAAP solution can help you prevent?

Continue reading

Cooler Master Dyn X is the future of virtual racing and flying simulators


Earlier today, Cooler Master pulled back the curtains on the Dyn X. And trust me, calling the Dyn X just a "simulator" doesn't do it justice. Think of it more as your passport to countless virtual adventures. Jimmy Sha, the big boss at Cooler Master, gushed about how the Dyn X offers an insane level of customization, comfort, and immersion, whether you're burning rubber on the asphalt or gliding among the clouds.

Now, let's chat about the cockpit, the true soul of the Dyn X. Designed with hardcore virtual racers in mind, it's incredibly versatile. A small tweak here and there, and you've got 14 different driving positions, from the sleek Formula to the rugged Rally. And if you're thinking assembly might be a chore, fear not! It's a breeze to put together and is compatible with a ton of racing gear. Built like a tank with tubular steel, this cockpit's durability is a standout. Plus, its modular design means you can keep adding cool stuff like monitors and motion systems.

Continue reading

Building customer communities to accelerate innovation and growth

Increasing customer loyalty in today’s difficult economic times might seem impossible, but the rewards are well worth the extra effort and commitment. According to Forbes, customer-centric companies are 60 percent more profitable than companies that don't focus on their customers. This statistic on its own is probably enough to bring customer satisfaction and retention to the forefront of most C-suite agendas, if it wasn’t a priority already. However, there’s much more value that happy customers can bring to a business than profit alone.

By creating an engaged customer community, companies can also become more innovative and competitive, speed up new product development, and grow their customer base through referrals. Building such a community requires planning and patience, and is a balancing act between efficiency and resources. Its success relies on defining the best communication channels, at the right cost, to connect with customers.

Continue reading

Guarding the digital generation: Enhancing online safety through age verification

Age verification

With the influx of next-gen technologies like generative AI coupled with the rapid proliferation of interactive platforms and digital media, it’s becoming increasingly challenging to protect minors from harmful and explicit content. The sheer volume of information and digital functions today makes it extremely difficult to ensure children and young adults are only consuming age-appropriate content.

Regulating this colossal mass of internet content is a herculean task, which is often deemed impossible. Rather, the most effective and simple solution for creating a safe online landscape is age verification.

Continue reading

Countering the rise of AI criminals

Artificial-Intelligence-threat

As generative AI tools continue to expand, new doors are being opened for fraudsters to exploit weaknesses. Have you experimented with generative AI tools like ChatGPT yet? From beating writer’s block to composing ad copy, creating travel itineraries, and kickstarting code snippets, there’s something for everyone. Unfortunately, "everyone" includes criminals.

Cybercriminals are early adopters. If there’s a shiny new technology to try, you can bet that crooks will explore how to use it to commit crimes. The earlier they can exploit this technology, the better -- this will give them a head start on defenses being put in place to block their nefarious activities. If tech helps boost the scale or sophistication of criminal attacks, it’s extra attractive. It’s no wonder cybercriminals have been loving tools like ChatGPT.

Continue reading

How document automation can take the pressure off IT teams [Q&A]

The shift to remote work, the Great Resignation and high staff turnover have meant that many IT teams have seen a big increase in their workloads over the last few years.

Automation is often seen as a way of addressing the problem, but can it really help to reduce workloads and get IT departments back on track? We spoke to Shawn Herring, CMO of document workflow specialist airSlate, to find out.

Continue reading

Microsoft reveals how to mitigate the Downfall vulnerability affecting Intel processors running Windows 10 and Windows 11

Downfall vulnerability logo

Following on from the Meltdown flaw and other related vulnerabilities, a more recent security issue was discovered in the form of Downfall. Tracked as CVE-2022-40982, exploitation of the flaw is known as a transient execution attack and it affects Intel CPUs.

Microsoft has not only acknowledged that the problem exists, but has now provided details of mitigation techniques that can be used. In security advisory KB5029778, the company gives instructions for users of Windows 10, Windows 11 and Windows Server.

Continue reading

TEAMGROUP T-FORCE DARK AirFlow I is an active cooler for PCIe 5.0 M.2 SSDs

TEAMGROUP has unveiled an innovative new product -- the T-FORCE DARK AirFlow I M.2 SSD cooler. This announcement comes at a pivotal moment, given the accelerating shift from PCIe Gen 4 SSDs to their Gen 5 counterparts. The latest Gen 5 SSDs, known for their scorching speeds, also tend to run hotter. Addressing this challenge head-on, TEAMGROUP's new cooler promises not just to tame these temperatures but to ensure the SSDs operate at peak performance over prolonged durations.

A noteworthy aspect of the T-FORCE DARK AirFlow I SSD Cooler is its Taiwan Utility Model Patent (number M644665) received earlier this year. The cooler's design integrates a graphene patented dual-layer structure, combined with two pure copper heat pipes of 5mm diameter each. These heat pipes work in tandem with multilayered aluminum alloy cooling fins, essentially amplifying the cooling surface and expediting the heat dissipation process.

Continue reading

Evolution of cloud data protection: Why your business needs a Data Command Center

Businesses face increasing hurdles when protecting sensitive data in today's complex digital, hybrid, and multi-cloud environments. The truth is that historically, data security has been the core challenge that enterprises have been aiming to tackle given the fact that data breaches have become increasingly common as attackers deploy more sophisticated techniques to cause extensive damage to companies, including monetary losses, reputational harm, and legal penalties.

In this context, deep and proactive data insights are required -- knowing where sensitive data resides or who has access to it is no longer a ‘nice-to-have,’ but a must. However, steps adopted to mitigate these challenges still have a lot to do with data security as a silo, while not necessarily as part of a broader understanding of how data is being used or how it needs to adhere to regulations across the entire organization, which usually comes as an afterthought.

Continue reading

Mageia 9 offers a fresh Linux alternative for Microsoft Windows 11 users

Today, Mageia 9 (which comes with Linux kernel 6.4) is finally released. The operating system stands as a comprehensive update, catering to both the everyday user and the technically savvy. Whether you're into productivity, creativity, or just exploring, Mageia 9 has something for you. In fact, this Linux distribution should be an excellent choice for those wanting to switch from Microsoft’s Windows 11.

Firstly, Mageia has poured meticulous care into the installation process. Those upgrading from Mageia 8 will appreciate the seamless transition, with the RPM database shifting from Berkeley DB to SQLite. Installation geeks might appreciate being able to utilize different ports with an HTTP server and the myriad of bug fixes.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.