Latest Technology News

Google's Stadia game streaming service launches on November 19

Google Stadia controller

At this year's Game Developers Conference in March, Google took the wraps off Stadia, a new, instant-play cloud-based gaming service.

With Stadia, games are "played" on Google’s servers, and streamed to compatible devices in the home, including smartphones, tablets, desktops, laptops, TVs and more. Google claims Stadia servers are capable of providing 4K, 60 frames-per-second performance.

Continue reading

New privileged access solution improves security and control

Admin login

Many data breaches involve some form of compromised credentials and the problem is made worse where accounts have privileged access.

ManageEngine, the enterprise IT division of Zoho, is launching a new product called PAM360, a complete solution to prevent the exploitation of accounts with privileged access.

Continue reading

IT executives struggle to manage spending effectively

Executive spend

Wasted technology spend accounts for 30 percent of all IT spending according to the latest State of Tech Spend report from Flexera.

The average IT spend is 8.2 percent of revenue, but larger businesses (with more than 10,000 employees) this rises to 9.3 percent of revenue. 56 percent of respondents expect to increase their spending

Continue reading

Symantec launches new endpoint security solution for businesses

Endpoint protection

Endpoints are generally the part of any network that is most vulnerable to attack, but as the number and diversity of devices expands, defending the endpoint effectively is a major challenge.

Symantec is aiming to make life easier with the launch of Endpoint Security Complete, offering organizations a single solution for protection, detection and response, as well as new attack surface reduction and breach assessment and prevention capabilities.

Continue reading

56 percent of IT security pros admit their infrastructure has gaps

Attack route

New research released by AttackIQ based on a study by the Ponemon Institute reveals some worrying trends on the level of accountability for IT security and a lack of confidence in determining the effectiveness of security technologies.

Ponemon surveyed over 570 IT and IT security practitioners in the US and finds 63 percent of survey respondents say their IT security leadership doesn't report to the board on a regular basis, and 40 percent say they don't report to the board at all.

Continue reading

Updated platform improves security at the edge

Edge security

As mobile and cloud computing use increases it creates security, performance, quality and cost issues for organizations.

Akamai is launching enhancements to its Intelligent Edge Platform which will enable businesses to address security, media delivery, and web performance challenges by utilizing distributed workloads and intelligence closest to the digital touchpoint where the user interacts with data and applications.

Continue reading

Microsoft enables Tamper Protection by default in Windows 10

Windows 10 desktop background

Assuming you have Windows 10 1903 (Windows 10 May 2019 Update) installed, you should find that you now have Tamper Protection enabled.

Microsoft has announced that the security feature is now generally available for Microsoft Defender ATP customers, and at the same time it has enabled the feature by default for all Windows 10 users. But just what is Tamper Protection?

Continue reading

Microsoft turns to AI to clean out bad language from Xbox Live chats

Swearing

Microsoft has announced that it is introducing new filters that will enable Xbox Live players to avoid language they may find offensive or unacceptable. It is hoped that the AI-powered system will help to reduce trolling and bullying.

The system will be optional and will offer three levels of language filtering, as well as the option of remaining unfiltered. It's an expansion of Microsoft's family settings, and the company says it recognizes "that while some adults use profanity without any ill intent while gaming, parents with small children likely won't find this same experience acceptable".

Continue reading

Which countries are best at protecting your privacy?

Globe data

We all know that standards of privacy and surveillance vary around the world. But which places are best at protecting your privacy?

Research from security testing site Comparitech finds that no single country is consistent in protecting the privacy of its citizens, most are actively monitoring citizens, and only five could be deemed to have 'adequate safeguards'.

Continue reading

Google launches USB-C Titan security key

Does your laptop have USB-A ports? Gross! Don't you know no one uses them anymore? Everyone uses USB-C now. I am, of course, being facetious -- USB-C, while great, still has a long way to go before dethroning the ubiquitous Type A. With that said, there are computers that are USB-C only, such as Apple's MacBook Pro. Owners of those computers have to get dongles to use their USB-A devices.

Tomorrow, however, Google is making it possible to ditch the dongle when using a Titan security key. You see, the search giant is launching a USB-C variant of the two-factor authentication device. Not only will it be more convenient for those with USB-C laptops, but this new model looks nicer too (it's pretty).

Continue reading

What are cyber threats?

security skull

A cyber threat is basically any type of threat that is computer related in nature. To be clear, a computer could be a desktop computer, a laptop, a tablet or even a smartphone. All of these devices have particular types of threats that they can be exposed to that users need to be aware of to ensure that they can protect themselves and their confidential information. 

Given the number of different types of devices that can be exposed to cyber threats, there are a number of different types of issues that can present themselves. Each of these threats is unique in its own right and poses a different type of issue for the user, but typically they all have the same end result… the impacted system is somehow compromised and the user, or the user’s information, is placed at risk. While the list below is extensive, it is not all inclusive. There are far too many types of threats out in the wild of the Internet to list in one article. What I do hope to do is to list those that are most prevalent and give the reader a good overview of what the threat is and how it is often used to do damage to both home and corporate networks. 

Continue reading

6 benefits of self-service marketing

The most successful distributed brand managers know that local marketing is a necessary part of a national and global marketing strategy, as consumers look for a personalized and tailored experience that is relevant to their needs and specific to their location. Organizations are looking towards self-service marketing to streamline processes for local teams and facilitate local efforts at the corporate level.

When done right, local marketing offers an excellent return on investment. In 2017, Google found that businesses made $2 in revenue from every $1 invested in local advertising through AdWords and retailers advertising locally on Facebook achieved an average ROI of 152 percent. However, deploying a local marketing strategy across the distributed network can be challenging for corporate marketing teams. To maximize the chances of local marketing success, local marketers need to carry their weight. That's where self-service marketing comes in to play.

Continue reading

Lessons learnt from over a decade of Hadoop

Back in 2006 Apache Hadoop emerged and soon began to revolutionize the nascent world of big Data. It’s one of the key factors that helped shape a new industry and -- with the cloud -- helped drive a raft of new consumer industries and business services.

But the data lakes of Hadoop became a challenge to manage, and many Big Data and analytical projects became more of a quagmire than a sparkling lake of truth. What’s more the number compute engines overpopulated. They were operationally complex and demanded specialized skills to maintain. Those data lakes became very disparate compute engines, sharing the same storage whilst they operated disparate workloads. It became a mess. Managing them with the tools available was no picnic.

Continue reading

From security awareness to security enablement: A new era of cyber

Security leaders have every reason to worry about the evolving threat landscape. As cyber threats proliferate (ranging from HTTP phishing to state-sponsored ransomware), the cyber talent and skills gap only grows wider.

As if this weren’t enough to keep CISOs and CIOs up at night, IT and security teams are less confident than ever in their organizations’ abilities to defend against the latest cyber attacks. Research shows at least 80 percent of IT, security, and other professionals don’t feel adequately prepared to defend their organizations. And at least 68 percent doubt their organizations’ readiness to thwart advanced threats.

Continue reading

How to watch the Made By Google stream and Pixel 4 launch

Google logo on office

We have already seen Apple launch its new range of iPhones, and OnePlus bring new additions to its range of handsets -- now it is Google's turn.

Tomorrow in New York, the company is holding its Made By Google '19 event, and at it we can expect to see not only the launch of the Pixel 4 and Pixel XL, but also -- in all likelihood -- the Pixelbook Go. There may be a few other surprises, and you can tune into the live stream to get the news as soon as it happens -- and find out how many of the rumors are true.

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.