Latest Technology News

A house of divided brands: Uncovering SASE and SSE

SASE, Secure Access Service Edge

The underlying technologies behind SASE and SSE must be made to work together if they are to secure the enterprise.

While alphabet soup is a staple of cybersecurity, if each acronym is tied to a clear use case the resulting thesaurus can actually be helpful. It gets tricky when vendors try to combine technologies that don’t really work together.

Continue reading

Is the most cost-effective move in the cost of living crisis investing in cyber security solutions?

In the midst of the biggest cost-of-living crisis in decades, the looming threat of recession, and an unprecedented energy crisis, organizations of all sizes are trying to find ways of cutting costs and saving money. While there are any number of measures organizations can take on that front -- from relatively small ones such as asking people to work from home to save on energy to more drastic measures such as layoffs -- the impact they have is variable at best. One measure that consistently saves organizations money, however, is investing in a proper cybersecurity solution.

In some ways, that might seem counterintuitive. After all, it’s an additional cost that the organization might not otherwise have to deal with. But it really is an investment that can pay off in a big way. That’s because the best cybersecurity solutions not only protect organizations from the threat of cyber attacks but also help mitigate their damage when they do occur.

Continue reading

How to start your data modernization journey

Data Stream

Getting value from data is not something that can be done in a (data) snap. The journey is often long and tumultuous. According to a recent survey, 99 percent of companies recognize that data is crucial for success; however, 97 percent face challenges in using data effectively.

The spread of data sources, volume, and too few resources prevent organizations effectively managing the growing demand for trusted data at the speed required by businesses. And that means little data -- if any -- can be relied upon to make critical business decisions. But there are simple key steps that every company can make to help them ensure a sustainable data management practice that will enable them to accelerate time to value.

Continue reading

This isn't Windows XP -- it's a new version of Windows 10, and you can install it now for free

If you want to run a modern operating system like Windows 10, but miss the simplicity and aesthetics of Windows XP, then we have some great news for you.

Windows EXPERIENCE Freestyle Update is a free Windows 10 mod that does a fantastic -- and virtually flawless -- job of mimicking Windows XP, and you can download and install it now directly from the Internet Archive.

Continue reading

Free scanning service helps companies build an up-to-date SBOM

As developers increasingly rely on open source components in their projects, knowing which have been used is a key part of being able to identify updates and potential threats. This is where a software bill of materials (SBOM) is essential.

Application security testing and software research services company GrammaTech is launching a no cost SBOM service, alongside a new version of its CodeSentry software composition analysis (SCA) tool.

Continue reading

Financial services is the most impersonated industry in phishing attacks

phishing hook

Threat protection company Vade has released its latest Phishers' Favorites report for 2022 which finds that financial services is the most impersonated industry, accounting for 34 percent of phishing pages as attackers continue to follow the money.

There are also seven finance brands in the top 20, with PayPal, MTB, Crédit Agricole, and La Banaque Postale all securing a spot in the top 10.

Continue reading

Social engineering remains the top threat for enterprises

Social Engineering

The latest Annual Trends Report from Jamf, based on a sample of 500,000 devices protected by the company's technology, looks at the threats impacting devices used in the modern workplace and finds social engineering tops the list.

The combination of an increasingly distributed workforce with the relative ease with which bad actors can carry out phishing campaigns, leads to the leakage of user credentials. In 2022, 31 percent of organizations had at least one user fall victim to a phishing attack.

Continue reading

Apple iPhone 14 and iPhone 14 Plus now available in bright yellow

It’s nearly Spring, and if you’ve been thinking of buying a new iPhone and want one that will match the season you got it in, then Apple has some great news for you.

The iPhone 14 and iPhone 14 Plus models are now available in yellow.

Continue reading

Forget all the talk about Windows 12, could Windows 11.1 Pro win you over?

Although Windows 11 hasn’t been out that long -- it was only released towards the end of 2021 -- there is already a lot of talk about its successor, presumed to be called Windows 12 (although you never know with Microsoft). If you want to find out what to expect from that OS, you can read about it here.

But even if Microsoft is planning Windows 12, it won’t be out for at least a year or two, and that leaves plenty of time for the company to turn Windows 11 into a raging success. Could Windows 11.1 be the answer?

Continue reading

Forget Notepad! The far superior Notepad++ now integrates with Windows 11

Notepad++

It may be old and it may be simple, but Notepad remains a firm favorite for many Windows users, particularly when it comes to coding. And while Microsoft has taken steps to improve the app with the addition of tabs, there are better options out there -- such as Notepad++.

With the release of Notepad++ 8.5, there is an important update that that will make life much easier for Windows 11 users: a context menu entry.

Continue reading

Microsoft is launching a new Canary Channel for exceptionally experimental builds of Windows 11 (and Windows 12?) in a major Windows Insider Program overhaul

Canary 11

Microsoft has detailed some of what it has planned for Windows 11 over the coming year, including big changes to the Windows Insider Program. As well as "rebooting the Dev Channel from the ground up", the company is also launching a new Canary Channel where we could see the first signs of Windows 12.

The idea of Canary builds will be familiar to many web browser users who like to be on the cutting edge. The likes of Google Chrome and Microsoft Edge have Beta, Dev and Canary builds offering varying degrees of stability and experimentation. Now Microsoft is updating the Windows Insider Program so it will have four channels -- Release Preview, Beta (22000 series), Dev (23000 series), and Canary (25000 series).

Continue reading

Microsoft Outlook for Apple macOS now free

Free

The stock Mail application that comes with macOS is pretty damn good. While there may be better email clients for Mac, you can't argue with the price of Apple's official offering -- FREE. And now, there is yet another gratis email client for Mac, and it is one you should already be familiar with -- Outlook!

Yes, folks, Microsoft's wildly popular email program is now totally free to use on macOS. As of today, the Apple Silicon-optimized app no longer requires a license or subscription to Microsoft 365. The now-free Mac app even supports a useful Hand-off feature, allowing you to easily move between Outlook on iOS and macOS. How cool is that?

Continue reading

Your patch management solution needs help

Updating Upgrade Software Program

Proper patch management is an important component of cybersecurity hygiene. If organizations don’t apply fixes to software bugs in a timely manner, they risk exposing themselves to a variety of threats. But scrambling to fix bugs identified by the Common Vulnerabilities and Exposures (CVE) program is not a complete solution. Organizations need to be doing much more.

The CVE and CVSS programs are essential components of information security management systems (ISMS) at most organizations, but they clearly have issues. The CVE program offers a reference for publicly known vulnerabilities and exposures. CVSS provides a way to capture the main characteristics of a vulnerability and produce a numerical score that reflects its severity. Among the many challenges with these programs, CVSS is not a true indication of the risk a CVE represents to an organization. That’s because it attempts to take the environment into consideration but only has limited success doing so.

Continue reading

It is time to move away from text-based two-factor authentication methods

Two-factor authentication is a solid security feature to protect accounts from unauthorized access. The security feature makes accounts by no means unbreakable, but it is a barrier against many common forms of attacks, including brute force attacks.

The main idea behind two-factor authentication is to require a second authentication code that is generated on the fly. Common options include generation in authentication apps that run on user devices and codes sent as text messages or in emails.

Continue reading

LibreELEC 11 Linux distro arrives, now with Kodi 20 'Nexus'

Kodi

Two months ago, the Kodi Foundation released Kodi 20.0 'Nexus', the latest incarnation of its hugely popular home theater software. The new release comes with a wealth of changes, fixes and new features, including support for multiple instances of binary add-ons, AV1 Video support, and a massive rework of the subtitle system.

Today sees the arrival of the latest version of LibreELEC, a lightweight Linux distro that is designed to run Kodi on a variety of platforms including Raspberry Pi and Orange Pi. LibreELEC 11's big new change is it now runs Kodi 20.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.