Latest Technology News

The changing landscape of privacy and compliance

In the past decade, privacy-related legislation has developed considerably. The 'privacy industry' has gone through a metamorphosis not seen in many other disciplines. Now, as we reflect on the future post-pandemic, we must recognize that being able to quickly access and share accurate data is fundamental to everyone. 

When thinking about this, it’s important to remember that there’s a heavy overlap between business and personal aspects, an example of this is password managers. These will have both personal and work-related credentials saved to them, which can be hard to distinguish, and this is why corporate family use plans exist.

Continue reading

Overcoming the tech labor shortage: Strategies for closing the IT talent gap

plugging a gap

Despite ongoing economic uncertainty, companies of all sizes are still facing a severe shortage of IT personnel, a challenge compounded by the fact that almost every industry is competing for scarce skilled tech workers.

This well-documented problem has become known as the IT talent gap, and it is causing significant difficulty for organizations looking to fill a range of critical roles. In fact, 73 percent of business leaders predict they will struggle to fill open technology roles in 2023, according to industry research. These gaps in knowledge and experience are the root cause of a number of issues, not least of which include decreased revenue and customer satisfaction, increased stress and high turnover.

Continue reading

New cloud platform aims to improve supply chain management

supply chain

A new platform from Sonatype is designed to make it easier for developer and security teams to unite and build innovative software securely.

It delivers an Application Security Testing (AST) and Software Composition Analysis (SCA) tool that offers cloud, self-hosted, and disconnected deployment options -- giving control and flexibility to its customers.

Continue reading

Developers are working on an amazing new Mouse Jump utility for Microsoft PowerToys

Mouse Jump / FancyMouse

Anyone with a very large or ultra-wide display, or even a multi-monitor configuration, will be aware of the problem of moving the mouser cursor across what can feel like miles of screen space. For fans of the PowerToys collection of utilities there is a solution on the horizon in the form of Mouse Jump.

Mouse Jump is a tool that's based on an existing (non-PowerToys) utility called FancyMouse, and it speeds up the process of getting your cursor across a large area by "teleporting" it with the help of a keyboard shortcut to quickly move it long distances. Sounds good? Well, work is well underway to integrate the utility into PowerToys, but you can even try out the incredible capabilities right now.

Continue reading

Number of new Common Vulnerabilities and Exposures (CVEs) expected to increase in 2023

open digital lock

We can expect to see more than 1,900 new Common Vulnerabilities and Exposures (CVEs) per month in 2023, including 270 high-severity and 155 critical-severity vulnerabilities -- a 13 percent increase from published 2022 levels.

This is according to a report from cyber insurance provider Coalition, which finds that most CVEs are exploited within 90 days of public disclosure, with the majority exploited within the first 30 days.

Continue reading

87 percent of container images have high risk vulnerabilities

Due to the nature of modern software design and the sharing of open source images, security teams face a large number of container vulnerabilities according to a new report.

The study from Sysdig, based on real-world data sets covering billions of containers, thousands of cloud accounts, and hundreds of thousands of applications, finds 87 percent of container images have high or critical vulnerabilities.

Continue reading

Breaches, privileged credentials and the SaaS application conundrum [Q&A]

SaaS

Last year Toyota suffered a data breach due to accidentally exposing a credential allowing access to customer data in a public GitHub repository.

This type of breach could be avoided if organizations turned their focus on credentials that are exposed within SaaS applications. We spoke to Corey O'Connor, director of product at SaaS security platform DoControl, about why he believes identity security needs to go beyond just protecting the keys.

Continue reading

Microsoft is no longer selling Windows 10, directs seekers towards Windows 11

Windows 10 laptop

As promised, Microsoft has officially stopped selling Windows 10 licenses, meaning it is no longer possible to buy product keys for the operating system from the company.

We have known about the deadline for buying Windows 10 directly from Microsoft for a little while, and the company has now updated its website so the pages for Window 10 Home and Pro redirect to the page for Windows 11. But if you're dead set on buying Windows 10, you're not completely out of luck.

Continue reading

Microsoft Defender can now isolate Linux devices in the name of security

Microsoft Defender on a laptop

Microsoft has announced a public preview of a new feature of Microsoft Defender for Endpoint that makes it possible to isolate Linux devices.

The company explains that it is possible to isolate a Linux device using APIs, or via the Microsoft 365 Defender portal. The update means that in the event of a security breach it is now possible to cut off Linux devices from a network, just as it has been possible to do with Windows devices.

Continue reading

Samsung T7 Shield USB-C SSD now available in 4TB

Last year, Samsung released the T7 Shield -- a fast and durable USB-C SSD. At the time, the portable drive was offered in three colors (beige, black, and blue) plus two capacities (1TB and 2TB).

Today, Samsung adds a new 4TB capacity option to the T7 Shield lineup. Yes, you can now get the drive with double the storage of the previous top capacity. Unfortunately, this 4TB variant is only available in black -- fans of beige and blue are out of luck with this capacity.

Continue reading

Linux Mint 21.2 is named 'Victoria'

Are the Linux Mint developers fans of the Spice Girls? That I don't know. What I do know, however, is Linux Mint 21.2 has been code-named "Victoria." I'd like to think this version of the operating system is being named after soccer-star David Beckham's wife Victoria (who once went by the stage name "Posh Spice" as a member of the aforementioned pop singing group), but probably not.

Anyway, besides the codename of "Victoria," the Linux Mint developers have shared some interesting tidbits about the upcoming Ubuntu-based operating system. Most importantly, it will be released in June 2023. As expected, Linux Mint 21.2 will once again come with your choice of three desktop environments -- Cinnamon, Mate, and Xfce. If you opt for the Xfce variant, you will be treated to the cutting-edge version 4.18.

Continue reading

PDFsam Basic 5.0 released, makes it easy to split, merge and extract pages from PDFs

Sober Lemur SRL has just released a major new version of its free and open-source PDF toolkit with the launch of PDFsam Basic 5.0 for Windows, macOS and Linux.

The application, which allows users to quickly and easily extract pages from PDFs as well as offering split, merge and rotate tools, gains a major facelift with the version 5 release, along with a brand new tool and several additions to existing features.

Continue reading

Cloud storage remains popular but comes at a cost

Cloud money

A new survey of 350 IT leaders in the US and UK shows 84 percent of respondents want a large portion of their storage to remain in the cloud, and two-thirds of them want as much storage in the cloud as possible.

On average, enterprises have put 57 percent of their storage in the cloud, whilst keeping 43 percent on premises.

Continue reading

Windows 11X: The dream upgrade your PC needs

Although Windows 11 has a lot to recommend it, it does feel rather unfinished, and it’s a situation which isn’t helped by a never-ending stream of problematic updates -- no wonder people are already talking about its potential successor, Windows 12.

But maybe we don’t need to make a full version leap just yet, perhaps the problems with the new OS could be solved with a bit of thought and attention.

Continue reading

Checkmarx launches Supply Chain Threat Intelligence

The software supply chain is increasingly being weaponized by attackers seeking to compromise businesses and steal information.

Application security specialist Checkmarx is looking to combat this with the launch of a new product which delivers detailed threat intelligence on hundreds of thousands of malicious packages, contributor reputation, malicious behavior and more.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.