Latest Technology News

New, free tool to help enterprises assess financial risk of cyberattacks

Risk dial

A successful cyberattack can have significant costs for a business, in terms of both reputation and finances. But what's the actual cost of an attack? And if you're looking at insurance how much should you be covered for?

To help answer those questions Safe Security is announcing two industry-first assessment tools to empower organizations to make financial decisions based on their actual cyber risk.

Continue reading

Das Keyboard launches MacTigr wired mechanical keyboard for Mac

While Apple's Magic Keyboards are actually quite good (unlike its terrible Magic Mouse), there is one unfortunate fact -- the company simply doesn't make a mechanical keyboard. And so, if you want such a keyboard for your Mac, you will have to depend on a third-party company. The problem there, however, is there are so many keyboard makers these days, it can be hard to know which are actually good. Sadly, there are many that are terrible.

Well, folks, Das Keyboard has a new Apple-focused USB-C keyboard called "MacTigr," and if you aren't aware, that company is one of the most respected keyboard manufacturers out there. Seriously, you can never go wrong with a Das Keyboard product. Not only is MacTigr built like tank, the wired keyboard is loaded with many excellent features.

Continue reading

Windows 12 wallpapers created by AI -- download them now

Windows 11 hasn’t been with us very long, but you’ve probably seen reports that Microsoft is already working on its successor, Windows 12.

While there aren’t any screenshots, or anything else, to view of Windows 12 just yet, we asked an AI text-to-image tool to give us its take on what the future operating system might look like.

Continue reading

Cybercriminals attack the wrong water company in bungled extortion attempt

On Monday, hacker group ClOp claimed to have gained access to 5TB of data from UK water supplier Thames Water and said it could change the chemical composition of the company's water supply.

Thames Water denied the reports and said it hadn't faced a cyber attack. Today it emerges that an attack has taken place but on a different company, South Staffordshire plc, the parent company of South Staffs Water and Cambridge Water.

Continue reading

Monitoring and management of backups becomes more challenging

Disk backup

Monitoring of backups has long been a necessary chore for IT professionals, but a report out today shows that new issues are also impacting the category and creating greater challenges.

The study from Bocada, a company which specializes in the automation of backup reporting and monitoring, is based on a survey of over 260 IT professionals. Varied environments and growing data volumes are revealed as a major concern, with securing data across backup applications the most-cited backup management challenge, followed by protecting growing data volume.

Continue reading

Microsoft warns that KB5012170 update may cause 0x800f0922 error

Windows 11 laptop

Microsoft has issued a warning about the KB5012170 update, a security update for Secure Boot DBX released a few days ago.

The company says that users of Windows 11, Windows 10 and Windows Server may find that the update installation fails, resulting in a 0x800f0922 error. While there is currently no fix, Microsoft has issued some advice while it investigates the problem.

Continue reading

Microsoft launches Dev Box Preview to make life easier for developers

Microsoft sign

Microsoft has announced the availability of the public preview of Microsoft Dev Box. The service lets developers create cloud-based workstations whenever they are needed for projects, even when working out of the office.

The company describes the secure Azure-based service as "a managed service that enables developers to create on-demand, high-performance, secure, ready-to-code, project-specific workstations in the cloud".

Continue reading

Cloud hyperscalers get more involved in open source

open source

Amazon, Microsoft, and Google are getting more employees involved in open source than ever before according to new analysis.

A study from Aiven of GitHub, the repository hosting service, finds the total number of active contributors to GitHub from Amazon, Microsoft, and Google has increased by 300 percent in six years -- from 2,654 contributors in May 2016 to 10,549 in May 2022.

Continue reading

The changing role of the CISO [Q&A]

CISO

The IT infrastructure of a modern enterprise is made up of a complex architecture of dynamic networks, cloud deployments, software applications, and endpoint devices.

Each of these has its own set of security controls, which form a critical part of the technology ecosystem, but managing these systems can hinder efficient threat detection and response, which in turn compromises visibility, allowing vulnerabilities and gaps to flourish.

Continue reading

Why data security is no longer optional

Security breaches cost more than just money. Investing in data security today prevents long-term negative consequences that cost your business time, money, and reputation. Acquiring threat intelligence data is a primary step in preventing cyberattacks, and web scraping is the method of choice for many modern data-driven businesses.

Business and personal activities are increasingly being digitized. Whether you are simply taking your temperature with a connected thermometer or sending products across complex supply chains, enterprises continuously collect data to improve services and refine operational processes.

Continue reading

Google Cloud and Google Workspace now support multiple SSO IdPs

Google Cloud

Google has announced an expansion of its sign-in options. The company is opening up google Workspace, Google Cloud and BeyondCorp Enterprise so users can take advantage of single sign-on (SSO) from multiple third-party identity providers.

Google has long-supported SSO using the SAML protocol from a single identity provider (IdP), but the company recognizes that times are changing. Support for multiple SAML-based identity providers instead of just one is something that will benefit many customers.

Continue reading

Your current cybersecurity approach creates systemic vulnerabilities

Security concept

Verizon recently released its 2022 Data Breach Investigations Report, giving businesses vital insights into the state of cybersecurity around the world. Containing an analysis of over 23,000 incidents and 5,200 confirmed breaches over 15 years, Verizon attributes the number-one motive of cyberattacks to financial gain. Almost four out of five breaches were attributable to organized crime seeking to extort businesses of hefty ransomware sums, backed by insurance pay-out.

Verizon has also estimated that there has been a 13 percent increase in ransomware breaches -- this is more than in the last 5 years combined. Additionally, 82 percent of cyber breaches involved a human element, namely through stolen credentials, phishing, misuse or simply an error.

Continue reading

Is risk-aversion holding back cloud maturity?

cloud misconfiguration

As we all know by now, the "cloud" is not just another "IT thing" that only IT people should care about. This is because every organization that has understood this principle has triumphed. Unfortunately, a significantly higher number have merely paid lip service to this idea. To them, the cloud is just another IT thing. The cloud enables a pace of change that companies of the past could have only ever dreamed of. Instead of waiting 6 months to deploy a new app, you can have the idea in the morning and have it deployed company-wide by the afternoon.

At least that’s the theory. But how many of us have seen this happen in reality? The problem is not a technical one. Most organizations could work at this "cloud pace," but most don’t. They might have the technology, leadership support, budget etc. to operate at this "same day" pace, but they don’t. Why not?

Continue reading

Will Microsoft never learn? The company hits paid-up Office 2021 users with ads for Microsoft 365

Annoyed woman crossing arms

There are various business models for software these days, ranging from simple purchases to subscriptions. There are also freemium apps and games that are cost-free but feature advertising. If you have spent money on software, you might rightly expect it to be free from ads, but not in the case of Microsoft Office 2021.

Microsoft is certainly no stranger to using its products -- such as Windows 11 -- as platforms to advertise other products and services. Office 2021 is just the latest example, with Microsoft using the software -- for which users have paid a one-off fee -- to advertise the subscription-based its Microsoft 365 products.

Continue reading

Why security training is key to improving cybersecurity posture

The threat landscape is constantly evolving and the shift to hybrid has only widened the attack surface. Today, organizations continue to be in the firing line as cybercriminals exploit their most used application: emails. The proliferation of phishing and business email attacks have seen hackers targeting the biggest corporate security weakness; employees.

Threat actors target workers because they are seen as the weakest link. Cybercriminals are thriving by targeting and exploiting staff, especially those who haven’t received effective user education and training. As the attack surface expands and threats become more sophisticated, organizations must reinvent the wheel by changing their approach to cybersecurity. Where should they start? With training employees and providing omnipresent tools and technology to prevent, detect, and recover from even the most sophisticated of attacks.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.