Cybersecurity teams are overconfident of their ability to deal with threats


A study from Immersive Labs finds that while businesses have high confidence in their overall resilience, teams are insufficiently prepared for threats.
The study, carried out by Forrester, surveyed 316 global cybersecurity training strategy decision-makers in the UK, US, Canada, Germany, and Sweden, finds that 82 percent agree they could have mitigated some to all of the damage of their most significant cyber incident in the last year if they were better prepared.
Camtasia 2023 adds new visual effects, filters and other major improvements to its roster


Michigan-based TechSmith has launched Camtasia 2023, a major new release of its professional screen recording and video editing tool for Mac and Windows.
The 2023 release focuses on two specific areas: offering enhanced visual effects and implementing various user feature requests.
Best Windows apps this week


Five-hundred-and-forty in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Microsoft won't release any new feature updates for Windows 10 anymore going forward. The operating system reaches end of support in October 2025 and will receive security updates only up to that date.
Why 5G/LTE network security needs a different approach [Q&A]


The continuing rollout of 5G offers faster mobile networking which will pave the way for new apps and devices connecting to the internet and to corporate networks.
Liron Ben-Horin VP of systems engineering at OneLayer argues that this world of faster connections and more devices will need a new approach to security. We spoke to him to find out more.
Get 'Working Smarter with Microsoft Outlook' (worth $20.99) for FREE


Millions of users across the globe spend their working hours using Microsoft Outlook to manage tasks, schedules, emails, and more
Post-pandemic, many organizations have started adopting remote working, and the need to stay productive in workspace collaboration has been increasing. Working Smarter with Microsoft Outlook takes you through smart techniques, tips, and productivity hacks that will help you become an expert Outlook user. This book brings together everything you need to know about automating your daily repetitive tasks.
Don't get stuck in a honeypot


Honeypots have been around for years and are a tried and tested cybersecurity mechanism. By creating a fake environment with attractive assets, organizations use honeypots to lure attackers into a trap where their actions can be studied and learned from to improve cybersecurity measures. Simultaneously, they are protecting the business’ real assets by preoccupying the attacker with the decoys.
However, honeypots have a narrow field of view as the only activity that they detect is those that target them directly. If an attacker gains access to a network, but not through the honeypot, the business would be none the wiser. It is, therefore, crucial to have more than one honeypot -- a honeynet -- to make it effective. Yet, honeypots are very time-consuming to apply as they need to be installed in networks and systems in data centers. It can take as long as an hour to install just one and it lacks any level of scalability.
Deepfake fraud hits a third of businesses


Deepfake fraud is on the rise, with 37 percent of organizations experiencing voice fraud and 29 percent falling victim to deepfake videos, according to a survey by identity verification specialist Regula.
Fake biometric artifacts like deepfake voice or video are perceived as real threats by 80 percent of companies, with businesses in the USA most concerned, about 91 percent of organizations considering them to be a growing threat.
New community helps businesses to collaborate like scammers


Cybercriminals and fraudsters have long relied on a dark web community to exchange information on vulnerable businesses and individuals as well as trading fraud-as-a-service schemes.
In an effort to turn the tables, Sift is launching a new online community called 'Sifters' to allow its customers to learn from, interact with, and share information with each other, including on any emerging fraud threats they encounter.
Modern Attack Surface Management means going beyond the surface


Security teams today are contending with an ever-increasing attack surface and an exponentially growing volume of vulnerabilities. Yet most teams are still equipped with the cybersec equivalent of a bucket to shovel out an ocean of CVEs. Buying them another shiny new bucket pales in comparison to plugging the actual leak in your ship (or enterprise).
Vulnerabilities can’t all be patched, so prioritizing these based on business risk is the most grounded approach. While leading security teams have begun to implement more advanced vulnerability management (VM) programs, others are struggling with outdated, manually intensive and less effective ways of managing vulnerabilities without context or insights on the true risk they pose. This can only work for so long, as it requires the continuous process of monitoring, discovering, analyzing, and remediating vulnerabilities across all potential attack vectors. Even then, good old human error sneaks its way in.
Get 'Mastering Windows Security and Hardening -- Second Edition' (worth $41) for FREE


Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders?
This updated second edition of Mastering Windows Security and Hardening is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies.
TeamViewer Remote promises to improve the performance and security of your remote desktop connections


Accessing your home or work devices from a remote location just got a lot easier -- and more secure -- with the launch of TeamViewer Remote 15.41.7, out now for Windows, Mac and Linux.
The headline new feature is a major revamp of how TeamViewer connects one user to another’s device. In place of a password-based system, users make use of session links to connect directly, and adds a new option that allows users to connect and control remote devices through any web browser.
Microsoft now lets you get Windows 11 updates faster


Updates to Windows 11 are a necessary part of using the operating system, and Microsoft releases them on a predictable schedule. Patch Tuesday (the second Tuesday of the month) is when updates are usually released to everyone, but there are exceptions.
In the case of important security updates, Microsoft may choose to release them on an out-of-band basis, but the company also releases preview versions of updates each month which anyone who seeks them out is free to install. However, Microsoft has just introduced a way to have these preview updates installed automatically if this is your preference. Here's how to do it.
Phone Link for iPhone is now rolling out to all Windows 11 users


Microsoft today announces the expansion of its Phone Link feature, finally allowing iPhone users to connect to -- and interact with -- Windows 11 PCs.
Microsoft Phone Link for iOS on Windows 11 is beginning to roll out today in 39 languages across 85 markets, with the process expected to be completed by mid-May.
Java retains its popularity in a changing landscape


The Java programming language dates back to 1996, released by Sun Microsystems as a way of developing multimedia applications in a portable and interactive way.
That Java is still immensely popular almost 30 years on suggests that it must have got something right. New Relic's 2023 State of the Java Ecosystem report takes an in-depth look at the use of one of the most popular programming languages.
Versa delivers zero trust access across the enterprise


Hybrid cloud and hybrid work have changed where and how we access systems, challenging organizations to find ways to secure the enterprise while delivering the best user experience.
While cloud-delivered Zero Trust Network Access (ZTNA) solutions are now widely adopted to secure remote work, they don't deliver the application performance and inline policy enforcement needed for workers at the office.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.