Latest Technology News

How object storage can contribute to cybersecurity analytics [Q&A]

Data volumes are growing exponentially year after year, this means huge amounts of log data that security teams are struggling to collect, analyze and act on in a timely manner.

As a result, security teams are inundated with data that is fragmented across locations and platforms. We spoke to CTO of MinIO Ugur Tigli to discuss how modern object storage can be used to build automated cybersecurity analytics pipelines to break down these barriers and enable security teams to quickly take action on the information stored in log files.

Continue reading

Logitech upgrades MK370 Combo for Business with Logi Bolt technology

Logitech has upgraded one of its popular keyboard and mouse combos. The MK370 wireless keyboard and silent mouse combo now comes equipped with Logi Bolt technology, providing enterprise-grade security for business users while delivering reliable connections -- even in congested Wi-Fi environments.

Recognizing the occasional spills that happen at workstations, Logitech has made the MK370 keyboard spill-proof. Its durable keys and sturdy tilt legs with adjustable height add an extra layer of utility and comfort. The full-size keyboard boasts eight convenient shortcuts and a complete number pad, simplifying data entry and navigation tasks. Additionally, the long battery life ensures that the keyboard remains powered for up to an impressive 36 months.

Continue reading

Why data mobility matters

While digital transformation strategies may have been accelerated by the pandemic, as workers return to offices, organizations around the world are beginning to contemplate moving applications back on-premises. And with financial pressures starting to bite, where and how data is stored is becoming even more important. It’s not purely a financial decision, however, as technical and security requirements need to be considered to maintain performance and protect against cyber threats like ransomware.

As a result, businesses are increasingly re-assessing their cloud strategies and weighing up moving workloads to the cloud, exploring different providers, repatriating back to their data centers, or a mix of all three based on their unique needs. But to be able to make the most of these different options, it's crucial that they pay close attention to their data mobility.

Continue reading

Kodi 21 'Omega' hits a huge development milestone and is available to download now [Updated]

Kodi 21 -- codename 'Omega' -- is the next version of the popular home theater software. The first alpha version of the program arrived two months ago, with the Kodi Foundation describing it as a "major release" with lots of new features.

Today, a brand new build arrives, which will be more appealing to users seeking greater stability.

Continue reading

Combating ransomware: Strategies for defense

Ransomware Criminal

In today's interconnected world, the threat of ransomware looms larger than ever before across industries. Malicious actors continue to exploit vulnerabilities, and the dark cloud of ransomware shows no signs of dissipating. Recent data from the Verizon Data Breach Investigations Report (DBIR) shows that cost per ransomware incident doubled over the past two years and remains one of the top action types present in breaches.

In this article, we will explore how ransomware works and what steps organizations can take to protect employees and data from these attacks.

Continue reading

Why machine identities are crucial to zero trust strategies

The days when businesses operated within a defined perimeter that could be neatly protected by a firewall are long gone. Today’s enterprises are dynamic. In the era of cloud native, infrastructure is completely distributed -- from the traditional datacenter to multicloud instances, from physical servers and VMs to microservice-based applications and containerized workloads.

This change in how businesses operate necessitates a shift in how we defend. The old adage of "Trust but verify" has been replaced by, "authenticate everything all the time," otherwise known as "zero trust". Zero trust dictates that security teams must focus on each of the connection points on the network -- from the datacenter to the cloud to the endpoint, every connection must be verified and authenticated.

Continue reading

Best Windows apps this week

Five-hundred-and-forty-seven in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released the last cumulative update for Windows 10 version 21H2. The operating system has reached end of servicing. Devices that have not been updated yet to either Windows 10 version 22H2 or Windows 11 may be updated to continue receiving support.

Continue reading

How do you know what's real and what's AI? [Q&A]

robot call center

The world is increasingly buzzing with stories about AI generated content. Today when you contact a business you might equally well be talking to a bot as a human, but is it possible to spot AI generated content and should we be worried about it?

We spoke to Gaurav Kachhawa, chief product officer of conversational messaging platform Gupshup, to find out how to distinguish AI-generated content, as well as the ethics that surround its use.

Continue reading

Microsoft unveils Porsche 75th Anniversary Collection of Xbox Series X gaming consoles

Porsche is celebrating its 75th anniversary this year, and so the car-maker has partnered with Microsoft to create something truly special. Together, the companies have unveiled a limited collection of custom Xbox Series X consoles and Xbox Wireless Controllers inspired by six iconic Porsche motorsport cars. Sadly, these exclusive gaming systems won't be available for purchase. However, fans have the chance to win them through a sweepstakes.

The partnership between Porsche and Microsoft's Turn 10 Studios dates back to 2005, and it has brought co-branded elements to the popular Forza franchise. From the original Forza Motorsport to the latest release, Forza Horizon 5, Porsche vehicles have consistently been an integral part of the racing experience. This collaboration has allowed fans to enjoy the thrill of driving a Porsche in the virtual world -- without actually buying one of the expensive vehicles.

Continue reading

Download Debian 12 Bookworm-based Sparky 7.0 'Orion Belt' Linux distro now

If you are a fan of the Sparky Linux distribution, I have some exciting news-- version 7.0 is finally available for download. This release is based on -- and fully compatible with -- the Debian 12 "Bookworm" operating system. For users with ancient hardware, Sparky 7.0 still provides support for x86 (32-bit) machines. But seriously, folks, just buy a 64-bit PC already...

By leveraging the stability and reliability of Debian, Sparky 7.0 inherits a rock-solid base that ensures a smooth and secure user experience. This compatibility allows users to seamlessly access the extensive Debian software repositories, opening up a world of possibilities for software installations and updates.

Continue reading

Microsoft is making it easier to remove Chat from Windows 11's taskbar

Microsoft released a new Windows 11 preview build this week in which it changed the Chat integration in the operating system. The new build, which Wayne wrote about here, introduces a number of changes to the operating system.

One of these changes replaces the fly-out Chat interface with a shortcut to Microsoft Teams Free. When Microsoft launched Chat in 2021 on Windows 11's taskbar, it wanted to push Microsoft Teams usage on Home devices. Microsoft created the fly-out and made it difficult for users to remove it from the taskbar.

Continue reading

Developer enablement tools are changing the workplace -- but not necessarily for the better

frustrated

A new study from O'Reilly Media looks at how developer enablement tools including GitHub Copilot and ChatGPT are impacting productivity within the workplace.

And the news isn't all positive; almost half of all respondents (46 percent) say they are struggling with AI-assisted low and no-code tools that have steep learning curves and barriers to entry.

Continue reading

Breaches decline as security culture improves

CISO

The latest Security Maturity Report, published today by ClubCISO, shows 76 percent of CISOs reported no material breaches over the past year, up from 68 percent in 2022.

Despite the difficult economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 60 percent of those surveyed say that no material cyber security incident had occurred in their organization over the past 12 months.

Continue reading

Amidst an energy crisis, energy companies can't risk a cyberattack further damaging their reputations

energy

It’s no secret that rapidly rising prices, spurred by Russia’s war in Ukraine, have inflicted damage on the reputations of energy companies. While the companies themselves may not have caused those rising prices, it’s their logos that consumers see on top of their energy bills every month.

It should hardly be surprising then that a survey by Populous found that just 16 percent of Britons view the energy sector positively. These are people, remember, who’ve found themselves in the midst of one of the worst cost-of-living crisis in decades. Millions of them have also, at some point in the past few months had to choose between heating their homes and eating.

Continue reading

6 key takeaways from the 2023 Gartner Security and Risk Management Summit

The annual Gartner Security and Risk Management Summit is always fertile ground for discovering the latest trends in cyber security, with this year being no exception. The 2023 event was held in early June, and central themes of this year's summit were the increasing complexity of managing cybersecurity adversaries, the increase in data breaches, and the heightened risk identity poses in an ever-evolving digital landscape.

One of the most significant takeaways from this year's summit is the role of Privileged Access Management (PAM) within the Cybersecurity Mesh.  The Cybersecurity Mesh distributed architectural approach to scalable, flexible, and reliable cybersecurity control. The Cybersecurity Mesh allows the security perimeter to be defined around the identity of a person or thing, highlighting the critical role PAM plays in modern cybersecurity strategies. The shift to remote work, accelerated by the global pandemic, and the subsequent rise in cloud-based infrastructures, have further emphasized the importance of the shift from infrastructure-based perimeters to identity perimeters.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.