Latest Technology News

Examining the barriers to infrastructure-as-code

code

IT management has never been easy and the complexities multiply as we seek to adopt the latest technologies and push the bounds of innovation. For instance, as we enable more digital capabilities, by nature, we must increase the number of applications used within our IT environments. However, provisioning the infrastructure resources required to build and manage applications can often be an unpredictable process, causing bottlenecks and performance issues across the entire environment but especially so in one key area, data storage.

Rather than succumbing to the complex, highly manual and time-consuming nature of IT management, new solutions and management frameworks can help to create more simplicity and ease. Modern infrastructure that emulates a cloud operating model is capable of prioritizing flexibility, agility and speed in addition to enabling reliability and performance. What initially began with the prolific adoption of infrastructure as-a-service has now paved the way for infrastructure-as-code.

Continue reading

Partial automation: The key to easing fears and pushing digital transformation

digital transformation

Many enterprises trying to reach the highest levels of digital transformation are facing a problem: they aren’t adopting autonomous operations and artificial intelligence for IT operations (AIOps). While more than half (59 percent) of organizations consider themselves digital transformation adopters or even leaders, a mere 15 percent are implementing automated processes at the same level.

This gap is problematic for enterprises striving to be digital leaders. After all, part of digital transformation’s promise is using data to increase agility, maximize emerging opportunities, provide personalized experiences and, importantly, guarantee a business’s apps and digital services are continuously available.

Continue reading

Our water supply is of existential importance and needs the best possible protection against cyber attacks

Water is -- said without pathos -- our elixir of life. After the air we breathe, we depend on nothing more to survive. We are made up of about 70 percent water and can survive only a few days without its replenishment. So it's fair to say that few other areas of critical infrastructure are as important to us as the supply of pure drinking water. But in the face of rising global tensions, there is growing concern that water supplies, which are as important as they are vulnerable, could become the target of cyberattacks.

Earlier this year, on January 11, 2022, the Joint Research Center of the European Reference Network for Critical Infrastructure Protection (ERNCIP) published its Water Security Plan in the form of a handbook. This addresses the implementation of security measures to protect the physical and digital integrity of water supply systems. The plan is intended to enable drinking water supply operators to lay the groundwork for implementing specific measures to improve water system security against threats and attacks.

Continue reading

New UK data laws set to make annoying cookie pop-ups crumble

Website pop-ups asking you to consent to cookies have become a regular -- if irritating -- feature for European internet users since the introduction of GDPR in 2018.

As part of a post Brexit shake up of data law the UK government has announced that its Data Reform Bill will cut down on the number of times these 'user consent' boxes will be shown.

Continue reading

Get 'The Art of Writing Efficient Programs' ($31.99 value) FREE for a limited time

The great free lunch of "performance taking care of itself" is over.

Until recently, programs got faster by themselves as CPUs were upgraded, but that doesn't happen anymore. The clock frequency of new processors has almost peaked, and while new architectures provide small improvements to existing programs, this only helps slightly. To write efficient software, you now have to know how to program by making good use of the available computing resources, and this book will teach you how to do that.

Continue reading

How can business leaders improve digital experiences in the workplace?

Implementing digital transformation into your business is essential for success. But with technological advancements dominating the business world, it’s important to assess the digital additions within your company to discover if they are making the expected improvements.

As a business leader, you may wonder where to start. Here, we explore five ways to improve digital experiences in the workplace.

Continue reading

The rise of double extortion ransomware

Ransomware sign

We've become familiar with the widespread use of ransomware, but researchers at Rapid7 have been examining the rise of a newer phenomenon, 'double extortion'.

Pioneered by the Maze ransomware group, double extortion involves cybercriminals collecting files before encrypting them. Then if the target organization refuses to pay they threaten to release sensitive information.

Continue reading

Best Windows apps this week

Four-hundred-ninety-five in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released security updates for all supported versions of the Windows operating system this week. Check out Sofia's coverage of KB5014697 for Windows 11.

Continue reading

Why and how organizations are modernizing their container deployments at the edge [Q&A]

Edge computing is aimed at bringing computing power closer to the source of data, such as IoT devices. It's increasingly being seen as an alternative to traditional data center and cloud models.

Stewart McGrath is the CEO at Section, a global Edge as a Service (EaaS) provider that helps organizations improve availability of their containerized application workloads in the cloud. We spoke to him to find out how and why companies are moving applications out to the edge.

Continue reading

Microsoft Defender for individuals now available for Windows, macOS, iOS and Android

Microsoft has been working on a new security tool for a while now to help protect you and your family’s data and devices against online threats, such as malware and phishing attacks.

Three months ago it made a preview build of Microsoft Defender available for Windows Insiders to try out, and today it announces the tool's official availability for Microsoft 365 Personal and Family subscribers.

Continue reading

The power of cloud-based quality management

Cloud

Manufacturing has a history of moving at a glacial pace when adopting new technology such as cloud-based solutions, but cloud is not new anymore. In recent years, cloud computing and SaaS (Software-as-a-Service) have begun to dominate. More and more manufacturers are looking to switch their quality management to a cloud-based quality system.

Simply, in today’s ever-changing and volatile manufacturing climate, the cost advantages, power, and versatility of the cloud have become essential to survival.

Continue reading

Choose your partners carefully to protect your security

Man and woman shaking hands

Choosing a partner business with a poor security posture makes an organization 360-times more likely to be at risk compared to choosing a top security performer, according to a new study.

The risk surface research from Cyentia Institute and RiskRecon shows that single demographic factors, such as industry, size and region, aren't enough to assess the risk posed by third parties.

Continue reading

Microservices and service mesh are critical to digital transformation

New research shows that 85 percent of companies are modernizing their applications to a microservices architecture.

The study from Solo.io and ClearPath Strategies reveals that 56 percent of organizations with at least half of their applications on a microservices architecture have faster development cycles, with daily or more frequent releases.

Continue reading

Enterprises vulnerable to identity-related incidents due to lack of mature strategies

identity theft mask

Only 16 percent of respondents to a new survey have a fully mature identity and access management (IAM) strategy in place, yet 56 percent have experienced identity-related incidents in the last three years.

The study carried out by the Ponemon Institute for enterprise identity specialist Saviynt shows that the 84 percent without a mature strategy are currently dealing with inadequate budgets, programs stuck in a planning phase, and a lack of senior-level awareness.

Continue reading

Email threats still managing to evade defenses

Email attack

New research released today from Cyren shows that business email perimeter defenses are often incapable of preventing well-crafted email attacks.

During an average month, there are 75 malicious messages per 100 mailboxes that slip past email security filters like Microsoft 365 Defender. This means that an enterprise with 5,000 mailboxes would need to detect and respond to 3,750 confirmed malicious inbox threats each month.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.