Latest Technology News

Plugable launches PS-EPR-140C1 140W USB-C GaN power adapter

Ladies and gentlemen, it's time to break up with your slow and outdated laptop charger, because Plugable has just released a new 140W USB-C power adapter that should be faster and more efficient than your current one!

The Plugable USB-C Power Adapter (PS-EPR-140C1) is a powerhouse, featuring GaN and Extended Power Range (EPR) technology that will blow your mind. Not literally, of course, because safety is a top priority for Plugable. But it will definitely blow your previous charger out of the water.

Continue reading

Safety in the metaverse: What are the risks for businesses?

Businessman-in-metaverse

Like any new innovation, the metaverse is currently at the center of a 'risk versus reward' debate. Unsurprisingly, the 3D virtual world has received a lot of attention, with McKinsey confirming that more than $120 billion was invested in building out metaverse technology and infrastructure in the first five months of 2022.

Promises of extraordinary use cases, from teaching virtualized university lectures to performing surgeries for patients in other countries -- not to mention the potential cost saving and accessibility benefits -- have garnered curiosity. But while it could be some time until we see mass adoption of the metaverse, the security community is already apprehensive of the evolving security risks.

Continue reading

Freespire closes the gap between Linux and Windows 10

If you've been using Windows for a while, you'll be very comfortable with how Microsoft's operating system looks and works. Although Windows 11 sports a centered taskbar, that OS isn't hugely different to its predecessor, Windows 10.

Familiarity with Windows makes it very difficult for users to switch to a non-Microsoft operating system, but Freespire's latest update aims to make users of Windows 10 or Windows 11 feel more at home using Linux.

Continue reading

Is the NHS cybersecurity strategy to 2030 enough to protect healthcare?

Healthcare data

With the rise in cyberattacks on the healthcare sector, boosting cyber resilience has become critical.

The UK government recently introduced the Cyber Security Strategy to 2030 for health and social care to protect the functions and services citizens depend upon. The policy outlines five pillars to achieve cyber resilience by 2030, which include focusing on more significant risks and harm, defending against threats as a single team, including all people and cultures, building a secure system for the future, and aiming for exemplary response and recovery times. 

Continue reading

Firefox 113 unveils search and picture-in-picture improvements alongside tighter security

Firefox-on-laptop-screen

The Mozilla Foundation has unveiled Firefox 113.0 alongside Firefox ESR 102.11.0, the latest version of its open-source, cross-platform browser.

It’s a relatively big release, with numerous security enhancements and UI improvements, particularly when searching the web through the URL bar and making use of Firefox’s picture-in-picture video player.

Continue reading

Network edge technologies fail to cut it for modern businesses

Networked computers

New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.

Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.

Continue reading

Windows 10 is going to be the most stable version of Windows until October 2025

Microsoft announced last week that it won’t release new feature updates for its Windows 10 operating system anymore. Windows 10 version 22H2, released in late 2022, is therefor the last major version of Windows 10.

The operating system won’t receive new (major) features anymore and Microsoft will focus its engineering energy on Windows 11 and potential successors. It is unclear whether smaller changes will still find their way into the operating system. Many of these, if they happens, may introduce changes that most users may not want.

Continue reading

Business leaders don't understand cybersecurity

A new survey from Delinea of over 2,000 IT security decision makers (ITSDMs) reveals that only 39 percent of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler.

In addition, over a third (36 percent) believe that it is considered important only in terms of compliance and regulatory demands, while 17 percent say it isn't seen as a business priority.

Continue reading

Technology sector suffers most from poor cyber hygiene

security flaw

Analysis of exposed dark web assets from SpyCloud finds that the technology sector has the highest number of malware-infected employees and consumers, the highest number of exposed corporate credentials, and the most exposed malware cookie records.

In the analysis of the darknet exposure of employees of Fortune 1000 enterprises across 21 industry sectors, researchers uncovered 27.48 million pairs of credentials with corporate email addresses and plain text passwords, with over 223,000 exfiltrated by malware.

Continue reading

Cybersecurity awareness education: The beginnings of change

Cybersecurity-awareness

More than eight in 10 data breaches globally can be attributed to human error.

People are the weakest link in cybersecurity. And this weakness comes from a lack of awareness about our cyber risk and the behaviors that influence it. Many people see cybersecurity as an IT concern. In truth, cybersecurity concerns everyone. When our hospitals get infected with ransomware, we can’t receive care. When our organizations experience a cyberattack, we lose our jobs. Still, we tend to underestimate the importance of cybersecurity to our society and economy.

Continue reading

Kingston launches DC600M Enterprise SSD

Today, we have some exciting news from Kingston Digital, Inc. The company just announced its latest offering in the world of data storage — the DC600M Enterprise SSD.

This new product has been optimized for mixed-use workloads, with excellent Quality of Service (QoS) to ensure latency and IOPS consistency. With 6Gbps SATA 3.0 storage and 3D TLC NAND, the DC600M is perfectly suited for high-volume rack-mount servers. Plus, it includes hardware-based on-board power loss protection via power loss capacitors, reducing the risk of data loss in the event of an unexpected power failure.

Continue reading

Should IT chiefs be wary of vendor lock-in when moving to the cloud? [Q&A]

In the dash to move systems to the cloud it's easy to become dependent on the services of a specific vendor, making it time-consuming or costly to move to an alternative at a later date.

We spoke to Cooper Lutz, chief architect, digital solutions at AHEAD, to get his advice for IT teams making their way to the cloud on the best practices to mitigate vendor lock-in.

Continue reading

Twitter admits a 'security incident' allowed private Circles messages to be seen by anyone

Twitter logo and Elon Musk account

Following numerous complaints from users concerned that the Circles feature of Twitter was broken, the company has conceded that tweets that were supposed to be visible to only a select number of people were in fact accessible by anyone.

The idea of Twitter Circles is that messages can be seen only by people who have been added to a Circle. But Twitter has now revealed "a security incident that occurred earlier this year" that ignored privacy settings.

Continue reading

Automation: How law firms can reach new heights in recruitment and profitability

The legal profession is filled with a number of repeatable tasks that are rife for automation, such as estate planning, bankruptcy filing, IP filings, real estate transactions, and M&A filings. In fact, it’s estimated that nearly a quarter (23 percent) of a lawyer’s daily work could be automated.

The amount of time involved in doing manual tasks can put an immense amount of pressure on legal professionals. In a Gartner survey, 68 percent of corporate lawyers said they struggled to manage their workloads. And over half reported some degree of exhaustion.

Continue reading

From details to big picture: Five approaches to improve security

Security padlock

Improving your organization’s cyber security posture is essential to maintain brand trust. The challenge for the C-suite is to look at both the big picture and the finite details, translating your overall strategy for managing risk into actionable processes and priorities that will, over time, lower your risk exposure.

Qualys’ Threat Research Unit (TRU) looked at trillions of anonymized data points gathered from across our customer base to analyze where the biggest risk areas were for businesses. Based on this data, we can see specific areas where you can help your team increase their performance effectiveness, as well as how these changes add up to a significant improvement in security results overall. Building on these details will  improve how you manage risk, reduce your attack surface and maintain trust with your customers.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.