Latest Technology News

The benefits of hybrid open-closed source software for smaller companies [Q&A]

Developer

Open source has gained enterprise popularity for its decentralized, collaborative approach to software development. By bringing large groups of developers together, it can boost efficiency, visibility and drive the adoption of new technologies.

However, taking a full open-source approach might not be the best fit for smaller enterprises. Dr. William Bain, founder and CEO of ScaleOut Software, cautions that the costs and legal risks associated with going full open source may be too great for smaller software companies. Instead, he recommends a hybrid open and closed-source model, we talked to him to learn more.

Continue reading

Microsoft pushes new features to some Windows 11 2022 Update users, including Explorer tabs

Explorer tabs

When Microsoft started the rollout of Windows 11 2022 Update (Windows 11 22H2) recently, there was disappointment that some of the promised features -- such as tabs in Explorer -- were missing. Now the company is starting to push some additional features out to users who are running the Release Preview version of Windows 11.

So, what can you expect from this feature push? Tabs! File Explorer now has tabs, plus some other enhancements, and there's a new taskbar overflow menu. There's more too.

Continue reading

Microsoft releases PowerToys v0.63 with loads of fixes and a significantly smaller installer

PowerToys

It is only a few days since we learned that Microsoft is working on a great new PowerToys utility called File LockSmith. This particular tool is not quite ready yet but in the meantime we have PowerToys v0.63 to enjoy.

For the v0.63 release cycle, the PowerToys development team says that it is "focused on stability and improvement". While this may not sound overly enticing, the release of PowerToys v0.63 is an important one. In addition to introducing a large number of fixes, this latest update not only makes steps towards eliminating the UAC prompt during installation, but also greatly reduces the size of the installer.

Continue reading

Logitech K380 Multi-Device Bluetooth Keyboard and Pebble M350 Wireless Mouse both available in three new colors

Jut yesterday, we told you the Logitech PRO X SUPERLIGHT wireless mouse is now available in a new red color. Adding new colors and patterns to existing products is something Logitech does often. Consumers seem to appreciate this, as it allows them to customize their desk space.

Today, Logitech takes the same approach with both the K380 Multi-Device Bluetooth Keyboard and Pebble M350 Wireless Mouse. These are existing products from the company, but as of today, they are available in three new beautiful colors -- Blueberry, Lavender Lemonade, and Sand. All three are pretty, but I think Lavender Lemonade is my favorite of the bunch.

Continue reading

Google launches Nest Wifi Pro with Wi-Fi 6E

If you consider yourself a technology enthusiast, then you absolutely must have the latest and greatest in wireless networking. In other words, anybody who is anybody has a Wi-Fi 6E router. After all, the 6GHz band it adds makes regular Wi-Fi 6 far inferior.

Fans of the Google Wifi mesh system have been clamoring for a Wi-Fi 6E upgrade, and today, it finally happens! The unimaginatively named Nest Wifi Pro is here to blanket your home with that glorious 6GHz band. And yes, smart home fans, the Tri-band router (2.4GHz, 5GHz, and 6GHz) also serves as a Thread border router -- it will eventually be a Matter hub too.

Continue reading

A fundamental mechanism that secures the internet has been broken

Resource Public Key Infrastructure -- or RPKI -as it's better known -- is a security framework that is designed to prevent cybercriminals or rogue states from diverting internet traffic.

National research center for Cybersecurity ATHENE says it has found a way to easily bypass this security mechanism, and in a way that means affected network operators are unable to notice.

Continue reading

New exposure management platform helps businesses manage cyber risks

Risk dial

The average enterprise uses more than 130 cybersecurity point solutions, creating siloed data that is hard for security teams to apply in meaningful ways.

To address this problem, Tenable is launching a new exposure management platform, aimed at giving customers a unified view into their organization's assets and vulnerabilities across the whole attack surface.

Continue reading

DDoS attacks get smaller -- but there are more of them

DDoS attacks

The amount of DDoS attacks increased by 75.6 percent compared to the second half of 2021, but the average (0.59 Gbps) and maximum (232.0 Gbps) attack sizes each decreased by 56 percent and 66.8 percent, respectively.

New research from Nexusguard shows that single-vector attacks represented 85 percent of all attacks globally in the first half of this year. Of these User Datagram Protocol (UDP) attacks accounted for 39.6 percent, an increase of 77.5 percent from the first half of 2021, the remainder being HTTPS flood attacks.

Continue reading

New tool helps enterprises measure the effectiveness of their security spending

Lock and money

Spending more money on cybersecurity tools doesn't necessarily mean you're less likely to suffer from a cyberattack. Until now though it's been hard to tell whether what you do spend is actually delivering a good return on investment.

Safe Security is today launching a new Return on Security Investment (ROSI) calculator that enables CISOs and CFOs to quantify the reduction in risk for each dollar invested in cybersecurity.

Continue reading

Four Zero Trust hurdles that organizations are failing to clear

 More than a decade after the concept of Zero Trust was first introduced, it’s become one of the biggest buzzwords in the industry. According to Microsoft, 96 percent of security decision-makers believe Zero Trust is ‘critical’ to their organization’s success, with 76 percent in the process of implementation currently. 

Zero Trust is on the rise because traditional security models that assume everything inside an organization’s network can be trusted is no longer valid. As enterprises manage their data across multiple applications and environments, on-prem or hosted in the cloud, and as users have more access to data at more interfaces, a network’s perimeter becomes porous and less defined. This causes the threat surface to expand as the edge becomes indefensible. This change has seen many organizations embrace Zero Trust principles to improve their security posture.

Continue reading

UK sees boost in AI adoption

Artificial intelligence

Use of AI technology in the UK has stepped up since 2016, with 41 percent of companies adopting AI between 2016 and 2019, compared to just a fifth over six years ago.

A new study from Peak shows this puts the UK above the global average of 39 percent for this period, though it's since dropped back closer to the average, and represents an almost fourfold rise in the last ten years, compared to just 2.5 times in the US and three times in India.

Continue reading

Hackers can easily bypass mitigation for Microsoft Exchange security vulnerabilities

Microsoft sign

Late last week, Microsoft confirmed the existence of two actively exploited zero-day vulnerabilities in Exchange Server. Tracked as CVE-2022-41082 and CVE-2022-41040, both security flaws are worrying as they are known to be actively exploited.

While it works on a fix, Microsoft offered up instructions to mitigate the vulnerabilities. But it turns out that it is incredibly easy to bypass, with security experts warning that the method used is too specific, rendering it ineffective.

Continue reading

Transcend unveils MTE720T PCIe Gen4x4 M.2 2280 SSD

Solid state drives continue to get faster, with many computers now supporting the PCIe 4.0 standard. Hell, PCIe 5.0 computers are now emerging. If you have a PCIe 4.0-compatible PC, you will probably want to get such an SSD to maximize your performance. Is it largely for bragging rights and benchmarks? Arguably, yes, but if you can afford it, you might as well go for a PCIe 4.0 drive. After all, the price should not be much more than a PCIe 3.0 SSD.

Transcend has a new M.2 NVMe PCIe 4.0 SSD that is intended for industrial applications, but it can absolutely be used in any PC with a compatible M.2 slot. The drive is designed to be both durable and fast -- it can achieve read speeds up to 7,200 MB/s and write speeds up to 6,500 MB/s. Nice!

Continue reading

Logitech PRO X SUPERLIGHT wireless mouse now available in red

When driving in your car, a red traffic light tells you to "stop." When it comes to the PRO X SUPERLIGHT wireless mouse, however, Logitech is hoping the new red color option will instead make you go; as in, go to the store and buy it!

Yes, folks, the wildly popular PRO X SUPERLIGHT is now available in a new red color, joining black, pink, and white. While this is entirely subjective, I would say the red option is the prettiest of the bunch.

Continue reading

How MSPs and IT leaders can optimize cloud costs amid economic headwinds

Cloud dollars

Lingering recession concerns and sky-high inflation have created a challenging economic environment. Last year, increased consumer demand coupled with supply chain snags gave companies incredibly high pricing power. That appears to be coming to an end, however. As the risk for a coming recession grows, many companies are wrestling with logistical issues fueled by geopolitical tensions, war, and the pandemic.

As businesses navigate increasing economic headwinds, leaders should consider how to optimize IT investments and expenditures to ensure business success during this challenging time.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.