Latest Technology News

How does adopting cloud and hybrid environments drive change in managing identities?

Businesses of all sizes have had to accelerate digitization across the entire business in recent years, as the adoption of hybrid working practices forces them to make changes to ensure operational continuity. By digitizing processes and embracing the cloud, businesses have delivered faster, more flexible, and more resilient services for employees and customers.

The rate of cloud adoption shows no signs of relenting. Gartner forecasts worldwide public cloud end-user spending to reach nearly $600 billion in 2023. This growth presents a multitude of opportunities, but the compounded cyber risk that comes with a widening digital footprint presents IT and security teams with an immense challenge.

Continue reading

SMEs underestimate the cost of cyber incidents

A new report from cyber insurance provider Cowbell shows that 90 percent of small business leaders underestimate the cost of a cyber incident.

The study of 500 SME leaders across the US shows that 50 percent of SMEs have experienced a significant cyber incident in the past 12 months and, of those, 90 percent say the attack cost more than they anticipated.

Continue reading

Google brings AI collaboration to work

Google used yesterday's Google I/O to announce new services and capabilities across Google Cloud and Workspace.

Among these is Duet AI, an AI-powered collaborator, to enable more users and developers to start seeing the impact AI can have on their organization and help solve day-to-day work challenges.

Continue reading

Bad bot threats present a growing risk to organizations

A global analysis of automated bot traffic across the internet finds that in 2022, almost half (47.4 percent) of all internet traffic came from bots, a 5.1 percent increase over the previous year. At the same time the proportion of human traffic (52.6 percent) decreased to its lowest level in eight years.

The report from Imperva shows the volume of bad bot traffic has grown for the fourth year in a row, presenting a significant risk for businesses. The level of activity in 2022 is the highest since Imperva produced its first Bad Bot Report in 2013.

Continue reading

Consumers remain hesitant about using biometrics

A new survey of 1,000 global consumers shows that 54 percent think digital authentication methods such as biometrics are revolutionizing the customer experience when it comes to online transactions and payments.

However, the study from Incode Technologies, also reveals that 48 percent of respondents do not see digital authentication as contributing to trust in the online world. This is due to concerns about fraud protections, privacy, and security.

Continue reading

Get 'GPT-3' (worth $27.99) for FREE

GPT-3, by Sandra Kublik and Shubham Saboo, provides a comprehensive guide on how to utilize the OpenAI API with ease. It explores imaginative methods of utilizing this tool for your specific needs and showcases successful businesses that have been established through its use.

The book is divided into two sections, with the first focusing on the fundamentals of the OpenAI API. The second part examines the dynamic and thriving environment that has arisen around GPT-3.

Continue reading

Three lesser-known endpoint vulnerability strategies you might be missing

endpoint protection

Modern IT environments continue to become more and more distributed, driving the growth of endpoints across the enterprise. Some research estimates that enterprises now manage more than 135,000 endpoints and Enterprise Strategy Group estimates that more than 70 percent of employees use more than four devices daily for work. That’s a lot of endpoints. And when you combine this endpoint growth with the fact that 560,000 new pieces of malware are detected every day, how can you not wonder if your organizations is the next target for a ransomware or phishing attack.

Security pros are overwhelmed by endpoints and struggle to find the right mix of solutions and strategies that can effectively secure their organizations. The more diverse they are, the more difficult they are to manage and secure (especially with mobile and IoT device proliferation). Just look at recent attacks against Twitter, Slack, Taco Bell, and more. For many organizations, endpoint security is really hard. This is why their security teams need to constantly assess and adjust their endpoint security strategies.

Continue reading

Compliance professionals want no-code platform solutions

Among governance, risk, and compliance (GRC) professionals responding to a new survey, 69 percent say that deploying a GRC platform that doesn't need developer support would improve their role.

The study from Onspring finds that a worrying 73 percent of respondents still needed a developer to update and administer their GRC programs, indicating a clear need for technologies that don't require developer input.

Continue reading

NETGEAR launches Nighthawk M6 Pro Mobile Hotspot (MR6550)

NETGEAR has done it again, folks! The company has unleashed their latest creation, the Nighthawk M6 Pro Mobile Hotspot (MR6550), upon the world. Equipped with the Qualcomm Snapdragon SDX65 chipset, this little powerhouse is armed with advanced 5G mmWave and Wi-Fi 6E capabilities, delivering lightning-fast internet speeds and enhanced connectivity. It's like having a supercharged internet engine in the palm of your hand, ready to rev up your online experience to new heights!

Now, I know what you're thinking. How can a mobile router be so powerful and yet so portable? Well, my friend, the M6 Pro is a technological marvel. It's compact enough to fit in your pocket, making it the perfect companion for your daily commute or your wildest adventures. Whether you're working from a remote business site or simply enjoying a leisurely vacation, this router has got your back.

Continue reading

Exploring the potential of cloud PCs for strategic cost rationalization

Cloud-PC

The introduction of advanced technologies has opened a world of possibilities for global corporate growth. The problem is that IT department budgets continue to be constrained, limiting the scope of technology investments at large.

This means that business leaders need to innovate to be prepared for changing business conditions. Advancing their digital transformation roadmaps should take priority as this will likely provide the greatest return on IT investment since the technology choices they make today will have a major impact on future success.

Continue reading

Combating phishing and social engineering threats [Q&A]

Social Engineering

The majority of cyberattacks are made possible by some degree of human error. Phishing emails and social engineering continue to dominate as the most common delivery systems for an attack.

We spoke to Mika Aalto, CEO and co-founder at Hoxhunt, about why a human-focused cyber-strategy is the key to success in combating attacks, about the initiatives that organizations can implement to establish this and how he expects human-related cyber-attacks to evolve.

Continue reading

Microsoft releases KB5026372 update for Windows 11 with security fixes and faster update option

Windows 11 keyboard

It is that time of the month again; Microsoft has released a new update for Windows 11, not only addressing security issues, but adding new options.

With the release of the KB5026372 update for Windows 11, Microsoft has addressed an issue with Windows Local Administrator Password Solution (LAPS) as well as fixing numerous other security flaws, including three zero days. The update also adds the option for Windows 11 users to receive non-security updates faster in future.

Continue reading

Shell Frosting is a free tweaking tool to unlock hidden features of the Windows 11 taskbar

Shell Frosting

Complaints about Windows 11 center on various changes Microsoft has made to the Windows 10 successor, but the taskbar is something that crops up time and time again.

While there is some good news in that Microsoft is listening to feedback and working to implement some of the missing features users want, the bad news is that it is taking time. If you are impatient to see the return of taskbar labels and the option to never combine buttons, Shell Frosting is the tweaking tool you need.

Continue reading

Plugable launches PS-EPR-140C1 140W USB-C GaN power adapter

Ladies and gentlemen, it's time to break up with your slow and outdated laptop charger, because Plugable has just released a new 140W USB-C power adapter that should be faster and more efficient than your current one!

The Plugable USB-C Power Adapter (PS-EPR-140C1) is a powerhouse, featuring GaN and Extended Power Range (EPR) technology that will blow your mind. Not literally, of course, because safety is a top priority for Plugable. But it will definitely blow your previous charger out of the water.

Continue reading

Safety in the metaverse: What are the risks for businesses?

Businessman-in-metaverse

Like any new innovation, the metaverse is currently at the center of a 'risk versus reward' debate. Unsurprisingly, the 3D virtual world has received a lot of attention, with McKinsey confirming that more than $120 billion was invested in building out metaverse technology and infrastructure in the first five months of 2022.

Promises of extraordinary use cases, from teaching virtualized university lectures to performing surgeries for patients in other countries -- not to mention the potential cost saving and accessibility benefits -- have garnered curiosity. But while it could be some time until we see mass adoption of the metaverse, the security community is already apprehensive of the evolving security risks.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.