Search Results for: surface pro

Tackling the problems of the future with today's data: What the Government can do to prepare itself

How can we best use data to reach our goals? This is a question that every business and public sector organization often asks themselves. Data is an incredible asset, and Government has some of the richest data sets available. The potential of data to drive efficiencies, improve policy making and, ultimately, drive better outcomes for citizens, is well documented.

The UK Government’s National Data Strategy shows its commitment to placing data at the heart of a concerted national effort to improve citizen services. There are numerous Initiatives focused on helping improve the use of data across government. One such example is the collaboration between the Global Government Forum, the Office for National Statistics, NTT DATA UK, and the Cabinet Office, to produce the Civil Service Data Challenge (CSDC), which pushes data innovation a step further.

Continue reading

Critical steps to ransomware protection in the cloud

The ransomware threat is very real with attacks growing in size and frequency, in part, because of the acceleration of digital transformation initiatives and the move to embrace digital services as well as the rapid implementation of hybrid ways of working.

As new digital systems required multiple access points for customers, partners, and employees, this has created a vastly expanded attack surface. This has hastened the rise in ransomware attacks, as attackers quickly took advantage of the increased number of possible attack vectors. 

Continue reading

Cybersecurity takes a back seat to other digital projects

Digital transformation

A new study reveals that 79 percent of cybersecurity professionals think that their organization prioritized maintaining business operations over ensuring robust cybersecurity in the last 12 months.

The CyberArk 2022 Identity Security Threat Landscape Report also points up how the rise of human and machine identities -- often running into the hundreds of thousands per organization -- has driven a build-up of identity-related cybersecurity 'debt', exposing organizations to greater risk.

Continue reading

Cloud application delivery: Still a work in progress for many

cloud misconfiguration

It’s hard to overstate the key role of application reliability and performance for today’s organizations. To compete effectively and grow in modern digital markets, businesses must meet high customer expectations for a great experience. Hybrid workplace strategies and work-from-home policies make it all the more critical to deliver a consistent high-quality experience wherever people work. Rising cyberthreats and an expanding attack surface call for a heightened focus on security. And agility is a must to support innovation and keep pace with fast-moving markets.

To address these needs, organizations increasingly host their applications in hybrid cloud and multi-cloud environments. In a recent survey, A10 Networks and Gatepoint Research asked senior technology decision-makers about their experiences delivering applications in the cloud, and what today’s organizations need to achieve the digital resiliency on which their businesses depend.

Continue reading

Microsoft Defender for Cloud now protects Google Cloud Platform

Microsoft building logo

Windows users are familiar with Microsoft Defender running on their computers offering local protection, but there is also a cloud-based version of the security tool. Microsoft Defender for Cloud is the result of the unification of Azure Security Center and Azure Defender.

Having already added support for Amazon Web Services (AWS), Microsoft has now added protection for Google Cloud Platform. The latest addition comes as Microsoft recognizes the fact that 92 percent of organizations now embrace a multi-cloud strategy.

Continue reading

Monster Blaster 3.0 Bluetooth boombox would make Radio Raheem proud

Back in the 1980s and 1990s, when you wanted to play your music publicly, you had to lug around a huge boombox powered by C or D batteries. It was a costly and tiring ordeal, but it was well worth the effort; it allowed friends to simultaneously enjoy music on the street, at the beach, or in the park. The boombox became a big part of Hip-Hop culture too and was immortalized by fictional character Radio Raheem in the classic Spike Lee film Do the Right Thing.

These days though, kids don't really need a big boombox anymore. Smartphone speakers can get pretty loud, and if you need some extra volume, a small Bluetooth speaker can often get the job done. But what if you really want to blast your music? Like, maybe you want to play some Hip-Hop music at a basketball court or crank some rock and roll loudly at a party. Well, the all-new "Blaster 3.0" Bluetooth boombox from Monster should hit the mark.

Continue reading

Microsoft launches matte black Surface Go 3 with optional LTE

Is Microsoft's Surface Go line of tablets designed for hardcore computer users? Absolutely not. That is OK though. Not everybody is a gamer or enthusiast. Look, some of us just need to get basic work done. And so, an affordable computer with meager specifications, such as the Surface Go, can be a wise purchase. After all, you can turn it into a laptop by purchasing the optional keyboard cover or a desktop by connecting it to a monitor, keyboard, and mouse.

If you have been on the fence about purchasing a Surface Go 3 -- the latest model -- I have some great news. Beginning today, Microsoft is selling a beautiful new version. No, the specifications are not different, but the body is... sort of. You see, the little tablet is now being offered in a beautiful matte black color.

Continue reading

Enterprises believe large cloud providers charge too much

Cloud money

The majority of businesses believe that large 'hyperscale cloud' providers are overcharging while also pursuing a narrative that their cloud offerings are low cost.

New research from cloud native provider Civo, based on responses from over 1,000 businesses, finds that 82 percent believe large public cloud providers like Amazon AWS, Google Cloud, and Microsoft Azure overcharge their customers.

Continue reading

IT pros see zero trust as a key element of security strategy

A new survey of over 1,000 IT security professionals finds that 75 percent of organizations recognize zero trust as being important to bolstering their overall cybersecurity posture.

However, the study conducted by Dimensional Research for One Identity also shows only 14 percent have fully implemented a zero trust solution. Another 39 percent of organizations have begun to address this need, and an additional 22 percent say they plan to implement zero trust over the course of the next year.

Continue reading

The challenges of protecting industrial control systems [Q&A]

refinery industry

Industrial control systems are often critical to things like power and water supplies. In theory they should have the strongest protection available.

In practice, however, this isn't always the case. It's estimated that 91 percent of industrial companies are vulnerable to cyberattacks. So what can businesses do to protect themselves and to recover quickly if they do get attacked?

Continue reading

5 cybersecurity myths that are compromising your data

As the importance of cybersecurity has increased, so has our awareness of it. Poor cybersecurity has been identified as the most pressing threat to businesses today. Issues with cybersecurity often stem from a lack of cybersecurity awareness. In fact, according to the 2020 Cyberthreat Defense Report, a lack of cybersecurity awareness was identified as the biggest detriment to an organization's cyber-defences.

The reasons for this lack of awareness include no training on cybersecurity and persistent misinformation. Despite more media attention than ever, there are still some common misconceptions about cybersecurity that put businesses at risk. Here, we bust the top myths around cybersecurity and how you can address them.

Continue reading

Why remote workforces need better strategies for security and data protection [Q&A]

The last couple of years have seen businesses undergo a major shift to remote and hybrid working, largely driven by the pandemic. But this same period has also seen record numbers of data breaches.

Often these attacks begin with phishing to get hold of credentials which can then put both in-house and cloud systems at risk.

Continue reading

How businesses can improve their third-party security [Q&A]

Risk dial

In recent years many of the most high-profile cyberattacks have come through the supply chain, involving third-party suppliers and partners.

It's historically been difficult for businesses to assess third-party risks, often involving time consuming manual processes in order to do so.

Continue reading

The importance of a modern approach to information management [Q&A]

folder stack

Information is now a critical asset for businesses, but it's only of real value if you can manage and access it efficiently.

More and more data now is in an unstructured form too, so has the way we manage information changed, and what do businesses need to do to make the most of it to inform their day-to-day decisions? We spoke to Antti Nivala, founder and CEO of M-Files to find out.

Continue reading

Protecting your business' legacy systems from ransomware attacks

Ransomware eye

Despite the significant shift and adoption of new technologies over the past few years, many businesses still rely on legacy infrastructure. Legacy servers are often still in operation because they are far too critical, complex, and expensive to replace. Famous examples include Oracle databases running on Solaris servers, applications using Linux RHEL4, or other industry-specific legacy technology. 

Although critical to the business, these legacy systems can increase a company's risk -- gaining access to just one unpatched legacy device can be relatively simple for cybercriminals. Once inside, said criminals will move laterally to gain a deeper foothold inside the network and deploy more significant attacks.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.