Latest Technology News

Elevation of privilege is the top Microsoft vulnerability category

A new report into Microsoft vulnerabilities shows 2021 saw a 47 percent decrease in critical vulnerabilities, marking the lowest ever total since the report began.

The 2022 Microsoft Vulnerabilities Report from BeyondTrust also reveals that for the second year running, elevation of privilege was the #1 vulnerability category, accounting for 49 percent of all vulnerabilities.

Continue reading

Growing complexity leads enterprises to look for new service providers

Cloud maze complexity

A new study from CloudBolt Software reveals that 80 percent of enterprises are so frustrated with their existing cloud-oriented provider they are actively looking for a replacement within the next twelve months.

At the core of this dissatisfaction with CSPs and MSPs is the growing complexity of multi-cloud environments, and a widening skills gap among both enterprises and service providers.

Continue reading

Two-thirds of data breaches at UK legal firms caused by insiders

New analysis of data breaches in the UK legal sector reveals that 68 percent were caused by insiders.

Analysis by secure cloud platform NetDocuments of data from the Information Commissioner's Office (ICO) reveals evidence of a 'Great Exfiltration' where employees are leaving their jobs and taking their company's data with them.

Continue reading

How secure is your supply chain?

Broken chain

Supply chains are fast becoming one of the top targets for cyber criminals, so when it comes to supply chain risk management, organizations in every industry need to start paying more attention.

While the vast majority of business leaders recognize that cybersecurity is now a key priority, the UK’s Department for Digital, Culture, Media and Sport (DCMS) recently noted that in too many instances, actions aren’t keeping up with intentions. In fact, nearly a third of UK companies admitted they aren’t currently taking any preventative action at all.  

Continue reading

Kingston VP80ES IronKey Vault Privacy 80 is an encrypted USB-C SSD with touchscreen

Solid state drives don't just make wonderful internal boot drives for computers -- they're excellent for external storage too. Not only are they smaller than mechanical hard disk drives, but they use less power and are much faster as well. Quite frankly, if you are someone that needs to transport data on a portable drive, you'd be insane to still use a HDD with moving parts.

But what if you lose that external solid state drive? Well, if the content is unencrypted, your files could be exposed to the finder. This is particularly problematic for business users that are storing company secrets or private customer data. Thankfully, a new USB-C solid state drive from Kingston makes it super easy to encrypt and decrypt your data. You see, the VP80ES IronKey Vault Privacy 80 is a hardware-encrypted (FIPS 197 certified with XTS-AES 256-bit) SSD with a color touchscreen that allows you to enter a passcode, password, pin, or phrase.

Continue reading

Windows 11 Phone is everything a mobile operating system should be

Microsoft certainly bet big on Windows 10 Mobile, even going so far as to buy phone giant Nokia in order to make its own handsets for it. While there was much to recommend the tiled mobile operating system, the combined might of iOS and Android proved too strong for the would-be rival. Windows 10 grew into a great operating system on PCs and tablets, but the company was forced to pull the plug on its mobile aspirations.

Windows 11 is slowly replacing Windows 10 (with the emphasis on 'slowly') but given the chance, would it fare any better on mobile than its predecessor did?

Continue reading

Why the voice network is a blind spot for security professionals [Q&A]

We're familiar with threats to data and data networks, but there's another part of corporate communication that's often overlooked yet represents an equally valid attack vector and equally high risks.

We spoke to Mutare CTO Roger Northrop to find out more about the risks voice networks present and why organizations need to take them seriously.

Continue reading

Silicon Power PCIe Gen 4x4 UD90 solid state drive is fast, but the SSD is also kind of slow

Are all PCIe 4.0 solid state drives fast? Absolutely. However, they aren't all the same speed. For instance, the Mushkin SSD we covered here can achieve read speeds up to 7,415MB/s -- that is really fast. A new SSD called "UD90" from Silicon Power, however, can only do up to 4,800MB/s.

Yes, folks, we have two M.2 drives, both with the same PCIe Gen 4x4 interface, but one is significantly faster than the other. In other words, the UD90 is rather slow as a PCIe Gen 4.0 drive... comparatively. And yet, compared to SATA-based solid state drives, the UD90 is actually incredibly fast.

Continue reading

The current state of intelligent automation adoption in cybersecurity

In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, whilst another 85 percent plan on automating them in the next 12 months.

Despite the positivity of these statistics, many organizations struggle to change to a more automated process. This was highlighted at a recent webinar we held with a panel of senior cybersecurity experts from a multitude of sectors. The discussion revealed that, while most organizations are exploring automation, few have made significant progress and they attributed this to a combination of factors including needing an improved understanding of automation, increased help from vendors and a lack of good IT foundations.

Continue reading

Employee burnout: The financial impact to businesses and how to tackle it

Customers are always at the heart of a business. In fact, company owners, managers and their employees often go out of their way to please and satisfy every client’s needs. There is no hiding that this can be a tiring and demanding process, and it can eventually end up having a detrimental impact on a business' biggest asset: its employees.

Without adequate support and precautions, workers can face burnout. Not only will this put their physical and mental wellbeing to the test, but it can also conceal serious implications for the business itself. Stressed and unhappy employees can be more difficult to manage and -- in the long term -- could have pricey consequences on the company’s finances.

Continue reading

Four reasons you should go digital in your asset management

Managing assets is an important but laborious task. It can be difficult to track the location, condition or repair history of individual assets, and surveys are highly costly and time-consuming.

It’s likely your work is being doubled-up and digging out asset data requires you to locate the one CAFM super-user on your site, or you end up relying on pieces of paper, only to input the data at a later time.

Continue reading

How Fortune 1000s can get privileged access management right

Privileged access management is not a new concept to most IT and security leaders, but we’ve seen a surge in cyber incidents focused on exploiting privileged access that have renewed its importance. From the Windows Print Spooler vulnerability of 2021 to the Okta breach that impacted hundreds of companies earlier this year, attackers continue to gain access through vulnerable credentials and use that access to move laterally and cause trouble at rapid speeds for Fortune 1000 organizations. While breaches happen, it’s unfortunate when something as simple as privileged access management could have thwarted the attackers.

As geopolitical tensions continue to rise on the cybersecurity front, it’s clear no one is spared from cyberattacks. With that, it’s more critical than ever before for organizations to closely review current privileged access management policies and solutions. Here are some best practices to think about when deciding how to approach PAM properly and securely.

Continue reading

HP chooses Ubuntu-based Pop!_OS Linux for its upcoming Dev One laptop -- could System76 be an acquisition target?

Rumors have been swirling lately that HP was planning to release a laptop running the Pop!_OS operating system. Today, System76's CEO Carl Richell shared on Twitter that this is absolutely happening -- a 14-inch developer-focused notebook called "Dev One." While this is good news for the Linux community overall, it is quite curious. After all, System76 doesn't just maintain the Pop!_OS operating system, it sells computers running the distribution too. In other words, HP and System76 are competitors in the hardware business.

So, what does this tell me? Well, it is purely speculation, but as the old adage says, "where there is smoke, there is fire." And so, it is safe to assume that HP acquiring System76 could be a possibility in the future -- if this new relationship pans out at least. HP could be testing the waters with the upcoming Dev One. Keep in mind, System76 does not even build its own laptops, so we could see the company leave the notebook business and focus on desktops only -- let HP handle the Pop!_OS laptops.

Continue reading

MINISFORUM HX90G Windows 11 mini PC is powered by an AMD Ryzen 9 5900HX CPU and RX 6650M GPU

MINISFORUM is a computer manufacturer that has been cranking out a lot of mini PCs lately. Its machines are looked upon favorably by many consumers that prefer diminutive desktops. Not only are its computers well-made and small, but often quite powerful too. These machines can be good servers, retro-gaming machines, office workstations, home theater PCs, and more.

Many MINISFORUM computers are powered by capable Intel processors, but lately, the company has been making mini PCs with AMD chips too. In fact, the company now has several AMD-powered options. Today, MINISFORUM announces an upcoming AMD desktop that is notable for using discrete graphics. Called "HX90G," the tiny Windows 11 PC is powered by an AMD Ryzen 9 5900HX CPU and RX 6650M GPU. Yeah, this diminutive computer is going to rock!

Continue reading

The challenge of shifting left: Why AIOps is essential

Development teams are being forced to 'shift left'-- under pressure from the business to move more and more work closer to the design and development phase, earlier in the process.

The idea is to catch bugs earlier, before they turn into costly production outages, and should improve efficiency while minimizing risk within the software development cycle. Yet this demand puts even more pressure and responsibility on developers.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.