Latest Technology News

Databases on Kubernetes -- Support your cloud native strategy with open source Kubernetes operators

Today, developers are used to running applications in the cloud. They are accustomed to using software containers and building applications using microservices components connected by APIs. Gartner estimates that more than 90 percent of global organizations will be running containerized applications in production by 2027, up from less than 40 percent in 2021. Similarly, the company has predicted that 70 percent of organizations will complement continuous delivery for their applications with continuous infrastructure automation to improve business agility by 2025.

From an infrastructure perspective, this means Kubernetes. However, Kubernetes was initially built to manage stateless application components rather than the rest of the infrastructure that goes to make up IT systems. For the other elements involved, such as databases, containerization had to be made to fit.

Continue reading

How enterprises can stay ahead of risks, threats and potential attacks [Q&A]

Risk dial

Businesses are engaged in a constant cat-and-mouse game with hackers, attackers, and bad actors in order to stay secure.

Dominic Lombardi, VP of security and trust at Kandji believes that in order to stay ahead it's necessary to master basic IT and security hygiene, update and communicate your risk register, and work steadily toward a zero-trust security model. We spoke to him to discover more.

Continue reading

Vivaldi 6 offers Workspaces for better tab organization, adds custom icons to Themes

Vivaldi Technologies has unveiled Vivaldi 6.0 for Windows, Mac, Linux and Android, a major new release of its customizable web browser.

Version 6.0 lands with two heavyweight new features: an additional layer of tab organization called Workspaces, and support for custom icons on the browser toolbar.

Continue reading

Ransomware attacks can cost enterprises up to 30 percent of operating income

The financial impact of a ransomware attack can cost businesses up to 30 percent of their operating income, with smaller enterprises hit proportionally harder.

A new report from ThreatConnect looks at the financial impact of ransomware attacks on small ($500M), medium ($1.5B) and large ($15B) organizations within healthcare, manufacturing, and utilities.

Continue reading

Enterprises plan to increase cloud service investment as part of network transformation

Cloud money

In a drive for network transformation, 98 percent of enterprise IT leaders say they plan to increase their dependence and investment in cloud services.

The latest Enterprise Network Transformation report from SASE solutions company Aryaka finds that although an uncertain economy is impacting network and security team investments CIOs, CISOs and IT leaders are doubling down on investment in the cloud.

Continue reading

(Tell me why) We don't like passwords

Despite relatively low awareness of passwordless technology, 65 percent of North American consumers report they’d be open to using new technology that makes their lives simpler.

A new report from 1Password shows that 80 percent say they care about their online privacy and actively take measures to protect it. But it's clear that they also believe we can do better than passwords for both security and ease of use.

Continue reading

Creating a cybersecurity risk assessment

Risk dial

Most businesses will complete regular risk assessments as standard practice. They’re crucial to reducing the threat of financial or reputational loss and give you an overview of the high-risk areas you must address.

One type of risk analysis that is critical but sometimes overlooked is a cybersecurity risk assessment. In today’s digital-first world, it’s difficult to overstate the importance of analyzing and addressing threats to your IT security. Making it a regular occurrence is also advised because cybercriminals are finding new holes in your defenses every day.

To address these threats, full and frequent cybersecurity audits are necessary to review:

Continue reading

Decoy Dog sniffs out enterprise networks to target

A malware toolkit dubbed 'Decoy Dog' has command-and-control (C2) propagated to a Russian IP and is selectively targeting organizations worldwide -- and going undetected.

The Infoblox Threat Intelligence Group is the first to discover Decoy Dog and the company is collaborating with other companies in the security industry, as well as customers, to identify and disrupt this activity.

Continue reading

Cyber threats get more personal

Popular online platforms such as Netflix, Facebook, and Steam are being used to spread cyber attacks as criminals focus on consumers' favorite online activities.

The latest consumer threat guide from F-Secure finds the most imitated social media platform used to spread phishing threats in 2022 was Facebook at 62 percent. Steam, the largest distribution platform for PC games, was the most popular gaming platform to spoof at 37 percent.

Continue reading

New European legislation may mean Apple introduces app sideloading globally in iOS 17

iPhone

Apple has long taken a walled garden approach with so many of its products, but this is perhaps most apparent for iPhone users who are only able to install apps from the official App Store. But with the release of iOS 17, this looks set to change.

The ability to easily sideload apps from other sources is something that Apple customers have desired for years, and while the iPhone-maker seems on the verge of giving people what they want, it is not necessarily the case that the company is doing so willingly.

Continue reading

Signing up for an Apple Savings Account was surprisingly bad

Announced last year in partnership with Goldman Sachs, the much-anticipated Apple Savings Account finally launched earlier today. Despite the long delay between announcing and launching the bank account, signing up for it was a surprisingly bad experience,

Firstly, it requires you to own an iPhone (on iOS 16.4 or higher) and be in the USA. I luckily meet this criteria, but understandably, Apple fans in other places would like to take advantage of the impressive APY (currently 4.15%). Of course, if and when the account launches in other countries, the rate is likely to vary based on location -- the percentage is unlikely to be the same regardless of country.

Continue reading

You can now run Windows 11 from a live disk -- no installation required -- here's how

flash drive and laptop

Linux live disks provide a convenient and versatile solution for trying out various distributions without the need for installation. These bootable USB drives or CD/DVDs allow users to run a fully functional operating system directly from the removable media before committing to a full installation.

If you prefer Microsoft's operating system, it is now possible to create a live disk for Windows 11 -- fantastic news for anyone uncertain about whether the new OS will suit their needs and would like to try it first.

Continue reading

The most important factors in modern enterprise backup

Cloud-enterprise

Technology and the data that powers it are continually evolving. This is particularly true with enterprise organizations, which are more focused than ever on protecting and securing their data across increasingly complex IT environments. Against this backdrop, what do enterprises need to focus on? 

Firstly, a Modern Data Protection strategy and the deployed backup solution supporting it must be able to protect workloads across any IT environment. The rise of cloud migration and affiliated services has meant that the physical data center is no longer the heart of the IT infrastructure. The Veeam Data Protection Trends Report 2023 found that the average breakdown of servers is 28 percent in physical servers within a data center, 25 percent on virtual machines (VMs) hosted within the data center and 47 percent on VMs hosted within a hyperscaler or Managed Service Provider (MSP). This means that the modern environment is heavily dispersed, highly virtualized and mostly cloud-hosted. 

Continue reading

New solution offers cheaper enterprise-grade cloud storage

Cloud

A new enterprise-grade, native cloud storage solution aims to deliver increased speed, affordability and security thanks to its use of decentralized Web3 technology.

Impossible Cloud supports almost unlimited capacity, and its Object Storage solution offers a scalable, cost-efficient alternative for organizations that require reliable and secure storage.

Continue reading

82 percent of open source software components are inherently risky

open source

Recent supply chain attacks such as SolarWinds, Log4j and 3CX have highlighted the need to protect the software supply chain as well as the potential consequences of failing to properly assess the integrity of software.

A new report from software supply chain security management company Lineaje looks at the composition of open-source software and assesses the risks associated with its usage.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.