Three ways to reduce expenses without sacrificing an employee's digital experience


The cost of supporting employee devices continues to increase, as does spending on network bandwidth and cloud services. Unfortunately, for many organizations, IT budgets are not keeping pace with the rising costs.
While IT spending is expected to rise in the next year, a large portion of that increase will go toward increased labor costs, as inflation and a stubbornly tight tech labor market will force companies to increase salaries.
Summer time and cybersecurity ain't easy


Cybersecurity concerns are likely to go out of the window during the summer months according to a new study which finds that 33 percent of employees in the US and UK are less likely to worry about following best practices while working in the summer.
The research, from API and application protection platform ThreatX, also shows IT teams are struggling to monitor and enforce BYOD policies during summer months when more employees are traveling or working remotely.
75 percent of people risk being hacked through poor password practice


New research into the password habits of over 8,000 individuals across the UK, France and Germany shows 75 percent of people don't adhere to widely accepted password best practices, putting themselves at risk.
The study from Keeper Security shows 64 percent are either using weak passwords or repeat variations of passwords to protect their online accounts. More than a third of people also admit to feeling overwhelmed when it comes to taking action to improve their cybersecurity.
Masimo launches innovative Denon PerL and PerL Pro True Wireless Earbuds


Masimo (a well-known medical technology company) is introducing its latest innovation -- AAT (Adaptive Acoustic Technology) -- through its recently acquired Denon audio brand. You see, the new Denon PerL and PerL Pro True Wireless Earbuds, which are equipped with Masimo AAT, launch today. The earbuds' name, "PerL," symbolizes Masimo's mission to deliver a "PERsonalized Listening" experience. But what is AAT? Well, it offers users the ability to create a personalized audio profile to optimize sound quality.
Hearing abilities vary from person to person and can significantly impact the listening experience. The Denon PerL TWS earbuds, including the Denon PerL Pro and Denon PerL models, utilize proprietary Masimo technology to measure faint otoacoustic emissions (OAEs) generated by the inner ear in response to a range of tones. These emissions are used to evaluate an individual's unique auditory response. How cool is that?
Enterprises urged to prepare for major PKI changes


Certificate authority GlobalSign is warning that later this year, and into 2024, there will be significant changes within the Public Key Infrastructure (PKI) marketplace that they need to be aware of.
These changes involve several critical areas: Google's move to reduce the lifespan of SSL/TLS certificates to 90 days, new CA/Browser Forum Baseline Requirements for email security, and mandatory Root changes issued by Mozilla.
Microsoft rethinks replacing Mail and Calendar apps with Outlook for Windows


The Mail and Calendar apps in Windows 11 have not been the recipients of much love -- either from users who find them limited and awkward, nor from Microsoft which has not updated the software for an age.
The company has already announced that the separate Mail and Calendar apps will be discontinued starting in September next year, with the new Outlook for Windows app being touted as the replacement. Despite the ill feeling towards the older apps, the announcement has been met with such a backlash that Microsoft has been forced to rethink its plans.
Microsoft updates Windows 11 system requirements and CPU support list


With little fanfare, Microsoft has released details of the updated listed of hardware supported by Windows 11. The new system requirements see the addition of support for a large number of CPUs from Intel, AMD and Qualcomm.
The update to the list of supported processors comes shortly after the release of Windows 11 Moment 3. As well as adding support for a large number of new CPUs, there have also been some removed from the list.
Solving the UK's digital identity dilemma


Earlier this year, a report was published in the UK with the aim of tackling the UK’s productivity and innovation crisis. Tony Blair and Lord William Hague are fronting the recommendations made, with a particular view to encourage the widespread adoption of digital ID cards. This has driven a discussion around the general public’s distrust towards government-controlled data schemes.
What’s interesting is that much of the UK population probably don’t realize just how many government IDs they already have; think tax returns, benefits, council payments and, of course, driving licenses. But even so, does this mean the UK is ready for a formal digital identity card? Many are more than happy to keep these various forms of ID in a disjointed manner, despite the inconvenience and inefficiency. Yet, the key issue here is trust, and the public needs to believe there is no overreach when they log in to a service.
Neobanks are on the rise: Can legacy banks keep pace?


Neobanks have shaken up the banking status quo since the introduction of PSD1 and PSD2, tempting customers in with user-friendly interfaces and streamlined processes. Legacy banks have struggled to keep up with the pace of innovation in the sector, and as a result, the industry is littered with rushed digital offerings that exacerbate the feeling that neobanks are pulling ahead in the digital transformation race.
In this day and age, having a low-quality digital banking platform is enough to turn customers away in favor of the digitally proficient neobanks. Customer loyalty doesn’t hold as fast as it once did, and customers are far more aware of the alternative services available to them at challenger digital banks. The traditional incumbents can’t continue to hope that their history and experience will win out as customers continue to experience low-quality customer service and deficient digital banking services.
ChatGPT can generate Windows product keys that allow free upgrades to Windows 11 Pro


It has been hard to ignore ChatGPT this year as the world goes crazy for the AI tool. While the artificial intelligence is still in its relative infancy, it is astonishing just what can be achieved with it; all that's needed is an idea and a cleverly worded prompt.
There are limitations to what it can do, some of which have been hard-coded into it. In theory, ChatGPT won't do anything illegal, or provide access to illegal content. In theory. Just as users found that while the AI wouldn't provide a list of torrent sites when asked, there was a way to bypass the block (by asking for a list of sites to dodge in order avoid encountering illegal content), and so a technique has been unearthed that can be exploited to get ChatGPT to spew out product keys for Windows 10 and Windows 11.
How object storage can contribute to cybersecurity analytics [Q&A]


Data volumes are growing exponentially year after year, this means huge amounts of log data that security teams are struggling to collect, analyze and act on in a timely manner.
As a result, security teams are inundated with data that is fragmented across locations and platforms. We spoke to CTO of MinIO Ugur Tigli to discuss how modern object storage can be used to build automated cybersecurity analytics pipelines to break down these barriers and enable security teams to quickly take action on the information stored in log files.
Logitech upgrades MK370 Combo for Business with Logi Bolt technology


Logitech has upgraded one of its popular keyboard and mouse combos. The MK370 wireless keyboard and silent mouse combo now comes equipped with Logi Bolt technology, providing enterprise-grade security for business users while delivering reliable connections -- even in congested Wi-Fi environments.
Recognizing the occasional spills that happen at workstations, Logitech has made the MK370 keyboard spill-proof. Its durable keys and sturdy tilt legs with adjustable height add an extra layer of utility and comfort. The full-size keyboard boasts eight convenient shortcuts and a complete number pad, simplifying data entry and navigation tasks. Additionally, the long battery life ensures that the keyboard remains powered for up to an impressive 36 months.
Why data mobility matters


While digital transformation strategies may have been accelerated by the pandemic, as workers return to offices, organizations around the world are beginning to contemplate moving applications back on-premises. And with financial pressures starting to bite, where and how data is stored is becoming even more important. It’s not purely a financial decision, however, as technical and security requirements need to be considered to maintain performance and protect against cyber threats like ransomware.
As a result, businesses are increasingly re-assessing their cloud strategies and weighing up moving workloads to the cloud, exploring different providers, repatriating back to their data centers, or a mix of all three based on their unique needs. But to be able to make the most of these different options, it's crucial that they pay close attention to their data mobility.
Kodi 21 'Omega' hits a huge development milestone and is available to download now [Updated]


Kodi 21 -- codename 'Omega' -- is the next version of the popular home theater software. The first alpha version of the program arrived two months ago, with the Kodi Foundation describing it as a "major release" with lots of new features.
Today, a brand new build arrives, which will be more appealing to users seeking greater stability.
Combating ransomware: Strategies for defense


In today's interconnected world, the threat of ransomware looms larger than ever before across industries. Malicious actors continue to exploit vulnerabilities, and the dark cloud of ransomware shows no signs of dissipating. Recent data from the Verizon Data Breach Investigations Report (DBIR) shows that cost per ransomware incident doubled over the past two years and remains one of the top action types present in breaches.
In this article, we will explore how ransomware works and what steps organizations can take to protect employees and data from these attacks.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.