Latest Technology News

Businesses forced to cut software spend due to economic downturn

Financial pressures have forced businesses to cut their software spend by between 10 and 30 percent, according to a new report from SaaS procurement and management platform CloudEagle.

The EagleEye SaaS Spend report analyzed $400M in transactions via the CloudEagle platform and shows that spending on software is now the third-biggest expense for organizations, right after employee and office costs.

Continue reading

The battle for control of cloud environments [Q&A]

Cloud

Lack of control has long been a pain point for developers in cloud computing, especially with the market dominated -- and controlled -- by a few large providers.

What's likely to happen as developers' desire for control meets the hyperscalers' desire to keep companies locked into their platforms? We spoke to Billy Thompson, solutions engineering manager at Akamai, to find out.

Continue reading

Facebook now allows you to create multiple personal profiles so you can maintain separate online personas

Multiple Facebook profiles

After a period of experimentation, Meta has finally decided to permit users to create multiple Facebook profiles. Each profile -- and you can have up to four -- can have its own connections, and will have its own customized Feed.

Meta suggests that Facebook users could use the new option to keep personal and professional relationships separate, but there are many reasons for wanting to maintain more than one Facebook profile. But while the change to allow multiple profiles is a big one, there are limitations and some things are not changing.

Continue reading

BenQ unveils X3100i, X500i, and X300G 4K HDR gaming projectors

BenQ has expanded its range with the introduction of three new X Series projectors: the X3100i, X500i, and X300G. Designed for diverse gaming environments, these projectors boast various technical specifications to elevate the gaming experience.

All three models, the X3100i, X500i, and X300G, bring forth 4K HDR resolution, aiming to enhance visual clarity and detail for gamers. BenQ’s HDR-PRO technology is embedded in each projector, intended to offer vibrant contrasts and realistic shadows, making it a promising feature for gamers keen on detailed and immersive visuals.

Continue reading

Navigating 20 years of cybersecurity: The evolution of patch management

System patching

As we approach the 20th anniversary of Cybersecurity Awareness Month, it's crucial to reflect on the progress made in patch management, a fundamental cybersecurity practice aimed at helping organizations mitigate the risk of unpatched vulnerabilities -- the primary gateway for attackers to breach organizational systems and deploy ransomware and other malware.

In 2003, patch management awareness was low, but it wasn't as critical to global cybersecurity as today because cybercrime was less developed. Automated exploits for known vulnerabilities and ransomware, which now monetizes attacks, hadn't emerged yet.

Continue reading

To mitigate insider risk, focus on people and not technology

insider threat

Insider risk poses the most serious threat to data and operations, yet most organizations still lack a security strategy designed to confront it.

The Ponemon Institute’s 2023 Cost of Insider Risks: Global Report found that insider risk -- whether unintentional or intentional -- has continued to rise over the past two years while the costs of breaches have risen as well. The 309 organizations benchmarked over a 12-month period averaged 24 incidents each, with a total average cost of $16.2 million.

Continue reading

Microsoft makes important clarifications about this week's Copilot-touting Windows 11 update

Copilot in Windows 11

There are big changes coming to Windows 11 this week as Microsoft starts the rollout of a huge update, as it announced at its recent Surface event.

Starting on September 26, the update will make features such as Copilot and passwordless security options available to users of Windows 11, but Microsoft has made a couple of clarifying points out it. Firstly, it is important to note that this update, although big and noteworthy, is not Windows 11 23H2 -- this is coming later in the year. But there's more.

Continue reading

This week sees Microsoft starting to embrace a password-free future for Windows 11

Windows 11 Moment 3

Passwords are a blessing and a curse, serving to secure files, devices and more, while simultaneously being burdensome and, to some extent, offering a false sense of security. With the update that is rolling out to Windows 11, Microsoft is fully embracing the passwordless future the company so desires.

Microsoft points out that passwords are nowhere near as secure as people might think, citing the statistic of 4,000 password attacks every second as proof. The Windows 11 update introduces greater password free security thanks to Windows Hello and wider support for passkeys.

Continue reading

TECNO PHANTOM V Flip 5G is a luxury Android foldable smartphone

Blending cutting-edge technology and fashion-forward aesthetics, TECNO's sub-brand, PHANTOM, has unveiled its flagship foldable -- the PHANTOM V Flip 5G. With this move, TECNO leaps into the future, introducing its first-ever flip phone and setting a high bar in the luxury smartphone market.

The heart of the PHANTOM V Flip 5G's imaging prowess is its 64MP RGBW Ultra Sensitive Sensor Main Camera, which ensures vibrant photos even in low-light conditions. Boosting its capabilities is the unique RGBW pixel format, which offers reduced noise and superior color accuracy.

Continue reading

It's time to safeguard the financial sector: Navigate employee turnover to defend against escalating cyberattacks

security breach

It’s no secret that cybersecurity has a significant skills shortage. According to ISC2 research, the worldwide shortage is as high as 3.4 million cybersecurity workers. As a result, security professionals’ skills are in very high demand, making finding and retaining talent challenging. Swimlane’s own research shows that 82 percent of organizations report it takes three months or longer to fill a cybersecurity role, with 34 percent reporting it takes seven months or more.

The situation isn’t improving either. Some 70 percent of companies also report that it takes longer to fill a cybersecurity role now than it did two years ago. The challenge has led one-third (33 percent) of organizations to believe they will never have a fully-staffed security team with the proper skills, according to Swimlane’s survey

Continue reading

Knightscope K5 Robot joins NYPD: Big Brother surveillance looms over New Yorkers

The world of technological advancement continues to reshape various sectors, and now it's impacting our very notion of public safety. Knightscope, Inc., known for developing autonomous security robots and emergency communication systems, has partnered with the NYPD. At a Manhattan subway station press conference, this new initiative was met with both anticipation and concerns.

While the Metropolitan Transportation Authority (MTA) champions this collaboration, there are questions to be asked. The Knightscope K5 security robot's introduction into the bustling heart of New York City will be preceded by a two-week period for training and configuration. But how will this machine, designed to autonomously patrol the streets, balance its duties with respecting the privacy rights of citizens?

Continue reading

Staying safe online by bringing nonstandard applications into the identify lifecycle

Security concept

This year marks the 20th Cybersecurity Awareness Month, and today, the prevailing theme, "It’s easy to stay safe online," remains a timely reminder. The message is clear: online safety can be achieved with the proper knowledge and tools. This comes with a bit of a caveat, however, as many of our current security processes are manual and rely on the end user's discretion and action, such as turning on MFA. Adding further complexity is the ever-growing challenges posed by nonstandard applications, which do not work with established security standards like single sign-on.

A report by Netskope paints a grim picture with its concerning findings. For instance, the report found that 97 percent of apps used within enterprises operate outside the traditional identity perimeter. While the ubiquity of these nonstandard applications is undeniable, the lack of oversight in their security is alarming. The Ponemon Institute's research reveals that only 34 percent of organizations are proactive in prioritizing the security of nonstandard applications. When educated on the risks, this figure jumps dramatically to 82 percent. People care once they understand the impact on the business.

Continue reading

The key threats facing ICS/OT environments

Industrial IoT

Industrial control system and operational technology environments are becoming increasingly interconnected and complex, offering efficiency and innovation. However, this also exposes organizations to heightened vulnerabilities from relentless cyber threats.

The latest SANS 2023 ICS/OT Cybersecurity Survey, sponsored by critical infrastructure protection specialist OPSWAT, shows the three items of utmost importance for ICS security programs in 2023 have been identified as network visibility, risk assessments, and transient device threat detection.

Continue reading

Ubuntu 23.10 'Mantic Minotaur' Beta now available for download

It's that exhilarating time of the year for the Linux community -- the Ubuntu team has unveiled the Beta version of the Ubuntu 23.10 for Desktop, Server, and Cloud deployments. Now, if you're wondering about its reliability, rest assured; these Beta images are largely free from critical image build or installer issues.

Dubbed as the "Mantic Minotaur," this edition propels Ubuntu’s legacy of amalgamating the newest open source marvels into an efficient, user-friendly Linux distribution. Behind the scenes, the team has been burning the midnight oil, rolling out enhancements and ironing out the glitches.

Continue reading

Email: Adapting to the riskiest business tool

Malicious email

Almost every organization freely admits that people are the biggest risk to their security and are most vulnerable when using email. While the 'outbound' risk of an employee accidentally or intentionally leaking data is very clearly categorized as an insider risk, even a phishing attack that originates from outside the organization requires an insider to, essentially, open the door.

And it’s a valuable vulnerability for threat actors to be aware of; the FBI reported that Business Email Compromise (BEC) scams accounted for $50 billion in losses between June 2016 to December 2022.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.