NIS2 could prevent cybersecurity incidents but many businesses aren't ready
The EU's latest Network and Information Security Directive (NIS2) comes into effect on October 18, but new research finds that although nearly 80 percent of businesses are confident in their ability to eventually comply with NIS2 guidelines, up to two-thirds say they will miss this imminent deadline.
The survey from Veeam Software, of over 500 IT decision-makers from Belgium, France, Germany, the Netherlands and the UK, shows 90 percent of respondents reporting at least one security incident that the NIS2 directive could have prevented in the past 12 months.
Why finance teams need 'ambient intelligence' [Q&A]
The world is changing faster than ever, putting pressure on CFOs to create more value and be more strategic and collaborative.
Finance leaders are not only expected to understand the entire business, but they are also bogged down by the administrative work of backward-looking reporting and controls.
qBittorrent 5.0.0 now available
The latest version of qBittorrent, version 5.0.0, has been released, featuring new capabilities and improvements. A full list of changes can be found here.
This release introduces the ability to create .torrent files with larger piece sizes and has upgraded the handling of tracker entries. Users also gain the option to segregate unwanted files into a separate folder, which helps in managing downloads more efficiently.
Sony and Raspberry Pi launch powerful new AI camera for developers
Sony Semiconductor Solutions (SSS) and Raspberry Pi Ltd have teamed up to introduce a new product for AI enthusiasts. The Raspberry Pi AI Camera, compatible with all Raspberry Pi single-board computers, is designed to streamline the development of AI solutions by processing visual data directly at the edge. The AI Camera is available today for $70.
This collaboration is a result of SSS’s minority investment in Raspberry Pi Ltd back in April 2023. Since then, the companies have worked together to create an edge AI platform tailored to Raspberry Pi’s developer community. The key feature of the AI Camera is its use of SSS’s IMX500 intelligent vision sensor. This innovative sensor allows AI processing to happen directly on the chip, eliminating the need for additional hardware like GPUs or accelerators, which are traditionally required for handling large-scale visual data.
A technical overview of Cisco IoT part 5: Exploring Cisco's competition in the expanding IoT landscape
The fifth and final article in the Cisco IoT series explores how Cisco’s competitors are navigating the rapidly expanding Internet of Things (IoT) landscape. Building on the previous installment, which covered Cisco Meraki, training resources, and certification pathways, this article shifts focus to examine how other key players in the networking industry are positioning themselves to capitalize on the IoT revolution.
IoT is transforming industries, with use cases expanding across healthcare, retail, manufacturing and beyond. It’s reshaping how organizations operate, offering enhanced security, cost savings and new capabilities through advanced sensor technologies. As this sector evolves, Cisco and its competitors are racing to offer innovative solutions. But how do Cisco’s competitors stack up when it comes to IoT? This article takes a closer look at Juniper, Aruba, Arista and other vendors to assess differing IoT strategies and where each stands in comparison.
KT and Microsoft announce five-year AI partnership aimed at transforming Korean industries
KT Corporation and Microsoft have entered into a five-year partnership focusing on artificial intelligence (AI), cloud technologies, and IT business development. The collaboration includes both a financial investment from KT and resource support from Microsoft, with the aim of advancing AI services and innovation in South Korea.
As part of the partnership, the two companies will focus on five key areas, including the development of customized AI solutions for Korea. This effort will involve creating tailored versions of Microsoft’s GPT-4 and small language models using KT’s data. These AI models will be used in a variety of applications, including customer service chatbots and industry-specific solutions for businesses.
SIEM is the shortcut for implementing threat detection best practices
The recent release of “Best Practices for Event Logging and Threat Detection” by CISA and its international partners is a testament to the growing importance of effective event logging in today’s cybersecurity landscape. With the increasing sophistication and proliferation of cyber attacks, organizations must constantly adapt their security strategies to address these advanced threats. CISA’s best practices underscore how a modern SIEM (Security Information and Event Management) solution, especially one equipped with UEBA (User and Entity Behavior Analytics) capabilities, is critical for organizations trying to adopt the best practices in this domain.
A modern SIEM with UEBA can help organizations streamline their event logging policies. It automates the collection and standardization of logs across diverse environments, from cloud to on-premise systems, ensuring that relevant events are captured consistently. This aligns with CISA’s recommendation for a consistent, enterprise-wide logging policy, which enhances visibility and early detection of threats. We've seen a rise in detection and response technologies, from Cloud Detection and Response (CDR) to Extended Detection and Response (XDR) being positioned as alternatives to SIEM. However, when it comes to consistently capturing and utilizing events across diverse environments, SIEM remains the preferred solution for large organizations facing these complex challenges.
Microsoft updates Recall feature to address privacy concerns but Linux remains a safer choice for some
Microsoft has provided an important update to its upcoming Recall feature, exclusive to Copilot+ PCs, which aims to balance productivity with privacy and security. Recall allows users to retrieve information by capturing snapshots of their activity, such as documents, websites, or apps. This latest update emphasizes Microsoft’s renewed focus on user control and privacy, addressing some of the concerns users have voiced since the feature was first announced.
Recall is designed to enhance productivity by enabling users to quickly find things they’ve seen on their PC. The feature’s AI-driven capabilities take snapshots of user activity, making it easier to return to projects without having to remember where files or webpages were previously accessed. Microsoft stresses that this updated version of Recall processes and stores data locally, which not only improves performance but also allows users to continue using the feature without an internet connection. By keeping data on the device, Recall also aims to reduce latency and improve battery life.
Winlator 8 lets you play Windows PC games on your Android phone for free -- download it now!
Running Android games on a PC is straightforward with emulators like Bluestacks or NoxPlayer. If you want to play popular AAA Windows PC games on an Android device, things get a bit trickier.
This is where Winlator comes in. Winlator is a free Android app that allows users to run Windows (x86_64) games using Wine 9.2 (custom) and Box64 (0.3.0), and it has just received an update to version 8.0 which includes a lot of new features and improvements.
Best Windows apps this week
Six-hundred-fourteen in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Many Windows PCs will include a dedicated Copilot key in the future. Microsoft is integrating an option into Windows 11 to remap the key. Useful if you have no need for the Copilot key or AI.
Nation-states and cybercriminals work together to cause more damage
A new report from OpenText finds that collaboration and coordination taking place between nation-states and cybercrime rings to target global supply chains and further geopolitical motives has become a signature trend in the threat landscape.
Russia has been seen to collaborate with malware-as-a-service gangs including Killnet, Lokibot, Ponyloader and Amadey, while China has entered into similar relationships with the Storm0558, Red Relay, and Volt Typhoon cybercrime rings, typically to support its geopolitical agenda in the South China Sea.
From classical to quantum: A new era in computing
Data is a business’s most critical asset, and companies today have more data than ever before. IDC projects that by 2025, the collective sum of the world’s data will reach 175 zettabytes. This data has immense potential to be leveraged for informed decision making, but across industries, organizations struggle to harness the power of their data effectively due to the limitations of traditional computing technologies. These systems are often lacking in speed, accuracy, and energy efficiency, making it increasingly difficult for businesses to harness valuable insights. The need for more powerful computing solutions is becoming urgent as businesses grapple with the ever-growing complexity and volume of data.
Enter quantum computing, which addresses these limitations by providing a powerful alternative. Representing a significant leap forward from classical computing, quantum computing offers unprecedented speed and problem-solving capabilities. Traditional computers process information using bits, which can only be in a state of one or zero. In contrast, quantum computing uses quantum bits, or qubits, which leverage the principles of superposition and entanglement. Qubits can exist in multiple states simultaneously -- both one and zero and everything in between -- allowing quantum computers to perform operations much faster than classical systems.
Software architecture in the age of AI [Q&A]
Does AI impact software architecture? Or does software architecture impact AI? The answer of course is both, but how much of an overlap is there between the two?
To find out we spoke to Mike Loukides, vice president of emerging tech content at O'Reilly, about how software architects can work with AI and avoid its more negative effects.
Tor Project and Tails Linux distribution merge to enhance online privacy tools
The Tor Project, a global organization known for developing privacy and anonymity tools, has merged with Tails, a portable operating system focused on protecting users from digital surveillance. By bringing Tails under its operational structure, the Tor Project aims to improve collaboration, simplify operations, and expand outreach efforts.
Both Tor and Tails play crucial roles in countering growing surveillance and censorship on the internet. The merger is intended to better serve individuals seeking online protection, including activists, journalists, and everyday users. Tails, which had been operating independently for 15 years, faced challenges in managing administrative functions such as fundraising and HR. The merger is expected to alleviate these burdens, allowing Tails developers to focus more on maintaining and improving the OS.
Samsung unveils Galaxy Tab S10 Ultra and S10+ Android tablets with AI integration and AMOLED displays
Samsung has unveiled its highly anticipated Galaxy Tab S10 Ultra and Galaxy Tab S10+. Both devices feature stunning Dynamic AMOLED 2X displays, with the Tab S10 Ultra offering a massive 14.6-inch screen and the Tab S10+ boasting a 12.4-inch screen. These displays provide rich, vibrant visuals and an enhanced viewing experience, even outdoors, thanks to advanced anti-reflective technology that reduces glare.
Performance-wise, the Tab S10 Ultra delivers a significant upgrade compared to the Galaxy Tab S9 Ultra. It boasts an 18 percent improvement in CPU, a 28 percent boost in GPU, and a 14 percent enhancement in NPU. This extra processing power is specifically designed to handle the device’s advanced AI features, making it ideal for both productivity and creativity.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.