Latest Technology News

Borderless data: Acting locally, thinking globally

Global data

Around the world, data borders and regulations are being strengthened in a drive to protect customer privacy and fight cybercrime. As a result, multinational businesses are contending with a complex regulatory landscape. For business, data, and technology leaders, today’s challenge is to comply with local regulations while respecting customer expectations and managing complex global supply chains. To meet these macro and micro-economic challenges, organizations are looking for borderless data systems that enable global business operations but meet local demands.

The European Union’s General Data Protection Regulation (GDPR) has given rise to similar laws across the world, and the United Nations Conference on Trade and Development (UNCTAD) reports that 71 percent of countries have data protection regulations in place and 9 percent have legislation in development. Data governance professionals have increased their focus on data and cloud sovereignty in response, as some of these regulations restrict how data can be shared across physical national borders. In many cases, these regulations are positive and protect organizations and nations from criminals and aggressive states. However, today’s supply chains require data to be shared. A further complication is that cloud computing enables data sharing and business efficiency, yet the major cloud computing providers are firms from the USA. These businesses must comply with the US Cloud Act, which gives the US government access to data stored by these firms, even when hosting takes place outside of the USA.

Continue reading

Europe stays on top for broadband speeds

Mobile internet connection speed

Comparison site Cable.co.uk has released its annual analysis of broadband speed tests around the globe.

As in last year's report Western Europe tops the regional charts with an average download speed of 118.69Mbps, with North America second on an average of 94.02Mbps.

Continue reading

Over half of Azure and Google Cloud deployments fail CIS benchmarks

Cloud crime lock

Cloud misconfiguration is a critical issue as it amplifies the risk of data breaches and unauthorized access. But new research from Qualys shows that many cloud deployments on major platforms are failing Center for Internet Security (CIS) benchmarks.

The report finds that on average, 50 percent of CIS Benchmarks are failing across the major providers. The average fail rate for each provider is 34 percent for AWS, 57 percent for Azure, and 60 percent for Google Cloud Platform (GCP).

Continue reading

80 percent of digital certificates vulnerable to man-in-the-middle attacks

Magnified certificare

A new survey finds that nearly 80 percent of TLS certificates on the internet are vulnerable to man-in-the-middle (MiM) attacks, while as many as 25 percent of all certificates are expired at any given time.

The study, sponsored by automated machine identity management firm AppViewX and carried out by EEnterprise Management Associates (EMA), focuses on servers with SSL/TLS certificates on port 443.

Continue reading

Plugable USBC-4IN1 is the company's first single-chip hub

USBC-4IN1

Today, Plugable launches its first-ever single-chip hub. Called "USBC-4IN1," this adapter combines power and data transfer capabilities in a compact package. The hub, which utilizes the PS188 chip, offers dual-function USB-C port capabilities, including 100W power pass-through charging and high-speed 10Gbps data transfer.

The hub is compatible with laptops that have a full-featured USB-C or Thunderbolt port. As far as operating system support, it will work with macOS 11+, Windows 10+, or ChromeOS.

Continue reading

Guarding your digital realm: Navigating the era of encrypted messaging and secure communication tools

Secure messaging

In our modern hyperconnected world, we are constantly sending emails, instant messages, SMS messages, chats on social media, and much more to send information professional and personal. As each aspect of our lives continues to become digitized -- and as cybercrime gets ready to reach more than $10 trillion by 2025 -- it's becoming more important than ever to use encrypted messaging and secure communication tools to preserve our privacy.

Guarding your digital realm is thankfully more than viable with encrypted messaging and secure communication, in particular technologies such as end-to-end encryption, decentralized messaging platforms, and advanced privacy-enhancing features. To that end, let's talk about how these pioneering tools are playing a crucial role in protecting individuals, businesses, and journalists from cybercrimes.

Continue reading

Elon Musk makes history as Apple permits single-letter X app into App Store following Twitter rebrand

X app in App Store

Having previously rejected the X app from its App Store for having too short a name, Apple has had a change of heart, changing the rules for the renamed Twitter.

It used to be the case that app names had to be at least two characters in length, and this led to delay in getting the X app listed. But with Apple having relaxed for rules after Musk's latest example of spontaneity, X is the first -- and currently only -- app to be listed with a name comprising a single character.

Continue reading

Microsoft has some important changes for Windows 11 users with multiple monitors

Windows 11 logo on a laptop

When you've spent any amount of time using Windows 11 with two or more monitors, it's hard to go back to a single display setup.

But while working with multiple screens is a great productivity boost, it is far from being a perfect experience. Thankfully, Microsoft feels the pain of Windows 11 users and is bringing some helpful changes to settings that will make the experience far more pleasant.

Continue reading

MX Linux 23 is here: Your favorite Debian-based OS gets even better!

excitedwindowsnerd

MX Linux 23, the latest stable version of the popular operating system, is now available for download. This release is built on the sturdy foundation of Debian 12 “Bookworm” and MX repositories. Just as with previous versions, MX Linux 23 defaults to sysVinit while keeping systemd as an optional choice for installed systems.

One of the most noticeable changes in this release is the revamped live boot menus, featuring a more prominent “check media” function. This new feature offers an automatic media check before proceeding to boot, thus providing a smoother user experience.

Continue reading

Understanding large language models: What are they and how do they work?

intelligence

In recent years, large language models (LLMs) have revolutionized the field of natural language processing (NLP) and artificial intelligence (AI). These sophisticated models are used widely in AI solutions, such as OpenAI's ChatGPT, and have been designed to understand and generate human-like text, enabling them to perform various language-based tasks. People are incredibly excited by the potential of this technology which is poised to revolutionize how we live and work. However, to understand the true potential of LLMs, it is crucial that people know how they function.

LLMs, at their core, are neural networks trained on vast amounts of text data. They learn to predict the next word in a sentence by analyzing patterns and relationships within the training data. Through this process, they develop an understanding of grammar, syntax, and even semantic nuances. By leveraging this knowledge, these models can generate coherent and contextually relevant responses when given a prompt or query.

Continue reading

Getting on top of spiraling cloud costs

Cloud dollars

Cloud computing has revolutionized the way organizations operate, enabling scalability and helping businesses remain agile in ever-changing landscapes. However, what may have originally been touted as a cost-saving solution has become increasingly difficult to manage. 

Hyperscaler cloud services have the potential to offer huge cost savings due to their economies of scale. However, these savings may not always be passed down to customers. Moreover, the opaque pricing models of the larger service providers make the accurate estimation of costs difficult. The ease of provisioning resources in the cloud can also lead to significant overspending if not properly managed. Yet there are a variety of methods that can help cloud users better manage their increasing costs. Through the correct management, users can both reduce their cloud spend and better anticipate their monthly bill. 

Continue reading

Securing business communication: Three must-haves for securely supporting employees in the digital workplace 

remote work

No one would dispute that communication is vital, if not the most critical factor, to the success of any organization. But in the now not-so-new remote and hybrid work environment, it is harder than ever before to maintain the same level of communication, collaboration, speed -- and therefore productivity -- that was once available in the office environment.  

As enterprises look to technology to navigate the challenges of remote and hybrid working, providing tools that help employees work in a safe and secure manner is now, more than ever, an enabler of business success. Equipping employees with full-featured mobile messaging and collaboration tools with built-in security, control, and compliance is essential for helping them safely succeed in the digital world of work. 

Continue reading

Cyber Essentials? What's that then?

Laptop protect security

New research from Lookout finds that 40 percent of security pros have no clue about the UK Cyber Essentials framework -- the government backed program that aims to help UK organizations improve their cyber resiliency against the most common cyberattacks.

The research, carried out at Infosecurity Europe, surveyed 246 security professionals and finds only 28 percent of organizations had fully implemented Cyber Essentials. Of those that had not implemented the scheme, 58 percent say a lack of awareness or understanding is the reason why they hadn't.

Continue reading

The return of data modeling -- this time it's strategic [Q&A]

financial data exchange

Over the past decade data modeling -- setting up data structures aligned to business requirements -- has tended to take something of a back seat as businesses have rushed to bring products to market.

But we're producing more data than ever and need ways to process it effectively. That's why Satish Jayanthi, CTO and co-founder at Coalesce, believes it's time for data modeling to make a comeback in enterprise strategy. We spoke to him to find out more.

Continue reading

Apple confirms Screen Time bug that means parental restrictions may not stick

Hand holding an iPhone showing an Apple logo on a green background

Apple has acknowledged a flaw in its Screen Time software that means children may be able to access their iPhones and iPads longer than their parents would like.

A bug in the Downtime feature can cause Screen Time settings to reset so unlimited access is possible. Apple has confirmed that it is aware of the issue and it working to "improve the situation". But users may have doubts about the importance the company is placing on developing a fix; the bug has existed for months, and has persisted through a patch that was supposed to address the flaw back in May.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.