Microsoft and Talon launch enterprise-grade ChatGPT


Enterprise browser specialist Talon Cyber Security has announced that it has integrated its secure enterprise browser with the Microsoft Azure OpenAI Service to provide enterprise-grade ChatGPT access to customers.
This allows organizations to maintain data protection, keeping data put into ChatGPT within their perimeter and preventing it from transferring to third-party services. When using ChatGPT in Azure OpenAI Service, the organization uses its own Azure resources, so sensitive data is not delivered to other locations, improving data security and reducing risk.
New tool makes it easier to manage machine identities


Thanks to increased cloud and container use there's a growing demand for machine identities, but delivering and managing those identities can present problems.
Machine ID specialist Venafi is launching a new tool called Firefly that enables security teams to easily and securely meet developer-driven machine identity management requirements for cloud native workloads by issuing machine identities, such as TLS and SPIFFE, locally and quickly across any environment.
Misconfigurations leave internet-facing servers open to attack


Issues with server configuration remain a major problem. Researchers at Censys have identified over 8,000 hosts on the internet misconfigured to expose open directories.
These directories contain potentially sensitive data, such as database information, backup files, passwords, Excel worksheets, environment variables, and even some SSL and SSH private keys. Exposure of these types of data in such an accessible manner can offer threat actors an easy way into an organization's network.
What if cloud data was stored on floppy disks?

Databases on Kubernetes -- Support your cloud native strategy with open source Kubernetes operators


Today, developers are used to running applications in the cloud. They are accustomed to using software containers and building applications using microservices components connected by APIs. Gartner estimates that more than 90 percent of global organizations will be running containerized applications in production by 2027, up from less than 40 percent in 2021. Similarly, the company has predicted that 70 percent of organizations will complement continuous delivery for their applications with continuous infrastructure automation to improve business agility by 2025.
From an infrastructure perspective, this means Kubernetes. However, Kubernetes was initially built to manage stateless application components rather than the rest of the infrastructure that goes to make up IT systems. For the other elements involved, such as databases, containerization had to be made to fit.
How enterprises can stay ahead of risks, threats and potential attacks [Q&A]


Businesses are engaged in a constant cat-and-mouse game with hackers, attackers, and bad actors in order to stay secure.
Dominic Lombardi, VP of security and trust at Kandji believes that in order to stay ahead it's necessary to master basic IT and security hygiene, update and communicate your risk register, and work steadily toward a zero-trust security model. We spoke to him to discover more.
Vivaldi 6 offers Workspaces for better tab organization, adds custom icons to Themes

Ransomware attacks can cost enterprises up to 30 percent of operating income


The financial impact of a ransomware attack can cost businesses up to 30 percent of their operating income, with smaller enterprises hit proportionally harder.
A new report from ThreatConnect looks at the financial impact of ransomware attacks on small ($500M), medium ($1.5B) and large ($15B) organizations within healthcare, manufacturing, and utilities.
Enterprises plan to increase cloud service investment as part of network transformation


In a drive for network transformation, 98 percent of enterprise IT leaders say they plan to increase their dependence and investment in cloud services.
The latest Enterprise Network Transformation report from SASE solutions company Aryaka finds that although an uncertain economy is impacting network and security team investments CIOs, CISOs and IT leaders are doubling down on investment in the cloud.
(Tell me why) We don't like passwords


Despite relatively low awareness of passwordless technology, 65 percent of North American consumers report they’d be open to using new technology that makes their lives simpler.
A new report from 1Password shows that 80 percent say they care about their online privacy and actively take measures to protect it. But it's clear that they also believe we can do better than passwords for both security and ease of use.
Creating a cybersecurity risk assessment


Most businesses will complete regular risk assessments as standard practice. They’re crucial to reducing the threat of financial or reputational loss and give you an overview of the high-risk areas you must address.
One type of risk analysis that is critical but sometimes overlooked is a cybersecurity risk assessment. In today’s digital-first world, it’s difficult to overstate the importance of analyzing and addressing threats to your IT security. Making it a regular occurrence is also advised because cybercriminals are finding new holes in your defenses every day.
To address these threats, full and frequent cybersecurity audits are necessary to review:
Decoy Dog sniffs out enterprise networks to target


A malware toolkit dubbed 'Decoy Dog' has command-and-control (C2) propagated to a Russian IP and is selectively targeting organizations worldwide -- and going undetected.
The Infoblox Threat Intelligence Group is the first to discover Decoy Dog and the company is collaborating with other companies in the security industry, as well as customers, to identify and disrupt this activity.
Cyber threats get more personal


Popular online platforms such as Netflix, Facebook, and Steam are being used to spread cyber attacks as criminals focus on consumers' favorite online activities.
The latest consumer threat guide from F-Secure finds the most imitated social media platform used to spread phishing threats in 2022 was Facebook at 62 percent. Steam, the largest distribution platform for PC games, was the most popular gaming platform to spoof at 37 percent.
New European legislation may mean Apple introduces app sideloading globally in iOS 17


Apple has long taken a walled garden approach with so many of its products, but this is perhaps most apparent for iPhone users who are only able to install apps from the official App Store. But with the release of iOS 17, this looks set to change.
The ability to easily sideload apps from other sources is something that Apple customers have desired for years, and while the iPhone-maker seems on the verge of giving people what they want, it is not necessarily the case that the company is doing so willingly.
Signing up for an Apple Savings Account was surprisingly bad


Announced last year in partnership with Goldman Sachs, the much-anticipated Apple Savings Account finally launched earlier today. Despite the long delay between announcing and launching the bank account, signing up for it was a surprisingly bad experience,
Firstly, it requires you to own an iPhone (on iOS 16.4 or higher) and be in the USA. I luckily meet this criteria, but understandably, Apple fans in other places would like to take advantage of the impressive APY (currently 4.15%). Of course, if and when the account launches in other countries, the rate is likely to vary based on location -- the percentage is unlikely to be the same regardless of country.
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.