Best Windows apps this week

speccy

Five-hundred-and-forty-two in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released security updates for Windows 10 and 11 this week. The updates address several critical issues in the operating systems.

Continue reading

The rise of biometrics for identity verification [Q&A]

Biometric scan

As the world increasingly moves away from relying solely on passwords for identity verification, the focus is on alternative technologies. Whether that is passkeys, biometrics or other options, each has its own advantages and adherents.

Ricardo Amper, CEO and founder of next-generation identity verification solution provider Incode, sees biometrics as the key to eliminating discrimination and to creating a world of greater trust. We spoke to him to find out more.

Continue reading

MSI launches SPATIUM M480 PRO series of PCIe 4.0 SSD

m480pro-20230511-2

Today, MSI launches the SPATIUM M480 PRO series of solid state drive, which is comprised of three PRO SSDs -- SPATIUM M480 PRO, SPATIUM M480 PRO HS, and SPATIUM M480 PRO PLAY. With their exceptional speed and cutting-edge features, the SPATIUM M480 PRO series is ready to impress professionals, content creators, and gamers alike.

At the heart of these SSDs lies high-quality, high-density 3D NAND flash memory, which enables the ultimate PRO performance for PCIe 4.0. With impressive sequential read speeds of up to 7400MB/s and sequential write speeds of up to 7000MB/s, the SPATIUM M480 PRO series takes data transfer rates to the next level. But it doesn't stop there -- MSI has also managed to achieve up to 60 percent faster random read/write speeds, ensuring an incredibly responsive experience even under heavy workloads.

Continue reading

Five ways ChatGPT can augment IT operations, without reinventing the wheel

Internet,,Business,,Technology,And,Network,Concept.,Artificial,Intelligence,(ai),,Machine

IT operations (ITOps) teams are finding it increasingly difficult to keep up with the complexity of their technology environments as they continue to grow. Today, the average large enterprise’s tech stack comprises of no less than 187 different applications. As organizations have become more reliant on these applications to support customer experiences and keep revenue flowing, ITOps teams face growing pressure to keep them running smoothly. They need to respond instantly to possible security incidents or service outages before they impact the business, support internal users effectively, and -- where time permits -- support development teams in their efforts to deliver innovation projects. Given the sheer breadth of responsibilities ITOps teams face, it’s no surprise that burnout has become commonplace.

To overcome these challenges and alleviate some of the pressure on ITOps teams, organizations are turning to artificial intelligence (AI) and automation. These capabilities can help by reducing manual workloads and increasing operational efficiency, which in turn boost job satisfaction and often leads to better customer experiences. Organizations have turned to many approaches and tools to drive this automation over the years, but in recent weeks it is ChatGPT, a sophisticated large language model, which has been capturing their attention. Cutting through all the hype, it’s possible to identify clear, practical upsides for businesses that implement ChatGPT in their IT operations.

Continue reading

How does adopting cloud and hybrid environments drive change in managing identities?

Cloud question

Businesses of all sizes have had to accelerate digitization across the entire business in recent years, as the adoption of hybrid working practices forces them to make changes to ensure operational continuity. By digitizing processes and embracing the cloud, businesses have delivered faster, more flexible, and more resilient services for employees and customers.

The rate of cloud adoption shows no signs of relenting. Gartner forecasts worldwide public cloud end-user spending to reach nearly $600 billion in 2023. This growth presents a multitude of opportunities, but the compounded cyber risk that comes with a widening digital footprint presents IT and security teams with an immense challenge.

Continue reading

SMEs underestimate the cost of cyber incidents

Money

A new report from cyber insurance provider Cowbell shows that 90 percent of small business leaders underestimate the cost of a cyber incident.

The study of 500 SME leaders across the US shows that 50 percent of SMEs have experienced a significant cyber incident in the past 12 months and, of those, 90 percent say the attack cost more than they anticipated.

Continue reading

Google brings AI collaboration to work

Google Duet AI

Google used yesterday's Google I/O to announce new services and capabilities across Google Cloud and Workspace.

Among these is Duet AI, an AI-powered collaborator, to enable more users and developers to start seeing the impact AI can have on their organization and help solve day-to-day work challenges.

Continue reading

Bad bot threats present a growing risk to organizations

big red bad bot

A global analysis of automated bot traffic across the internet finds that in 2022, almost half (47.4 percent) of all internet traffic came from bots, a 5.1 percent increase over the previous year. At the same time the proportion of human traffic (52.6 percent) decreased to its lowest level in eight years.

The report from Imperva shows the volume of bad bot traffic has grown for the fourth year in a row, presenting a significant risk for businesses. The level of activity in 2022 is the highest since Imperva produced its first Bad Bot Report in 2013.

Continue reading

Consumers remain hesitant about using biometrics

security eye fingerprint forensics

A new survey of 1,000 global consumers shows that 54 percent think digital authentication methods such as biometrics are revolutionizing the customer experience when it comes to online transactions and payments.

However, the study from Incode Technologies, also reveals that 48 percent of respondents do not see digital authentication as contributing to trust in the online world. This is due to concerns about fraud protections, privacy, and security.

Continue reading

Get 'GPT-3' (worth $27.99) for FREE

GPT-3

GPT-3, by Sandra Kublik and Shubham Saboo, provides a comprehensive guide on how to utilize the OpenAI API with ease. It explores imaginative methods of utilizing this tool for your specific needs and showcases successful businesses that have been established through its use.

The book is divided into two sections, with the first focusing on the fundamentals of the OpenAI API. The second part examines the dynamic and thriving environment that has arisen around GPT-3.

Continue reading

Three lesser-known endpoint vulnerability strategies you might be missing

endpoint protection

Modern IT environments continue to become more and more distributed, driving the growth of endpoints across the enterprise. Some research estimates that enterprises now manage more than 135,000 endpoints and Enterprise Strategy Group estimates that more than 70 percent of employees use more than four devices daily for work. That’s a lot of endpoints. And when you combine this endpoint growth with the fact that 560,000 new pieces of malware are detected every day, how can you not wonder if your organizations is the next target for a ransomware or phishing attack.

Security pros are overwhelmed by endpoints and struggle to find the right mix of solutions and strategies that can effectively secure their organizations. The more diverse they are, the more difficult they are to manage and secure (especially with mobile and IoT device proliferation). Just look at recent attacks against Twitter, Slack, Taco Bell, and more. For many organizations, endpoint security is really hard. This is why their security teams need to constantly assess and adjust their endpoint security strategies.

Continue reading

Compliance professionals want no-code platform solutions

No code banner. Vector concept illustration.

Among governance, risk, and compliance (GRC) professionals responding to a new survey, 69 percent say that deploying a GRC platform that doesn't need developer support would improve their role.

The study from Onspring finds that a worrying 73 percent of respondents still needed a developer to update and administer their GRC programs, indicating a clear need for technologies that don't require developer input.

Continue reading

NETGEAR launches Nighthawk M6 Pro Mobile Hotspot (MR6550)

MR6500_Hero_Transparent

NETGEAR has done it again, folks! The company has unleashed their latest creation, the Nighthawk M6 Pro Mobile Hotspot (MR6550), upon the world. Equipped with the Qualcomm Snapdragon SDX65 chipset, this little powerhouse is armed with advanced 5G mmWave and Wi-Fi 6E capabilities, delivering lightning-fast internet speeds and enhanced connectivity. It's like having a supercharged internet engine in the palm of your hand, ready to rev up your online experience to new heights!

Now, I know what you're thinking. How can a mobile router be so powerful and yet so portable? Well, my friend, the M6 Pro is a technological marvel. It's compact enough to fit in your pocket, making it the perfect companion for your daily commute or your wildest adventures. Whether you're working from a remote business site or simply enjoying a leisurely vacation, this router has got your back.

Continue reading

Exploring the potential of cloud PCs for strategic cost rationalization

Cloud-PC

The introduction of advanced technologies has opened a world of possibilities for global corporate growth. The problem is that IT department budgets continue to be constrained, limiting the scope of technology investments at large.

This means that business leaders need to innovate to be prepared for changing business conditions. Advancing their digital transformation roadmaps should take priority as this will likely provide the greatest return on IT investment since the technology choices they make today will have a major impact on future success.

Continue reading

Combating phishing and social engineering threats [Q&A]

Social Engineering

The majority of cyberattacks are made possible by some degree of human error. Phishing emails and social engineering continue to dominate as the most common delivery systems for an attack.

We spoke to Mika Aalto, CEO and co-founder at Hoxhunt, about why a human-focused cyber-strategy is the key to success in combating attacks, about the initiatives that organizations can implement to establish this and how he expects human-related cyber-attacks to evolve.

Continue reading

Load More Articles