Our water supply is of existential importance and needs the best possible protection against cyber attacks
Water is -- said without pathos -- our elixir of life. After the air we breathe, we depend on nothing more to survive. We are made up of about 70 percent water and can survive only a few days without its replenishment. So it's fair to say that few other areas of critical infrastructure are as important to us as the supply of pure drinking water. But in the face of rising global tensions, there is growing concern that water supplies, which are as important as they are vulnerable, could become the target of cyberattacks.
Earlier this year, on January 11, 2022, the Joint Research Center of the European Reference Network for Critical Infrastructure Protection (ERNCIP) published its Water Security Plan in the form of a handbook. This addresses the implementation of security measures to protect the physical and digital integrity of water supply systems. The plan is intended to enable drinking water supply operators to lay the groundwork for implementing specific measures to improve water system security against threats and attacks.
New UK data laws set to make annoying cookie pop-ups crumble
Website pop-ups asking you to consent to cookies have become a regular -- if irritating -- feature for European internet users since the introduction of GDPR in 2018.
As part of a post Brexit shake up of data law the UK government has announced that its Data Reform Bill will cut down on the number of times these 'user consent' boxes will be shown.
Get 'The Art of Writing Efficient Programs' ($31.99 value) FREE for a limited time
The great free lunch of "performance taking care of itself" is over.
Until recently, programs got faster by themselves as CPUs were upgraded, but that doesn't happen anymore. The clock frequency of new processors has almost peaked, and while new architectures provide small improvements to existing programs, this only helps slightly. To write efficient software, you now have to know how to program by making good use of the available computing resources, and this book will teach you how to do that.
How can business leaders improve digital experiences in the workplace?
Implementing digital transformation into your business is essential for success. But with technological advancements dominating the business world, it’s important to assess the digital additions within your company to discover if they are making the expected improvements.
As a business leader, you may wonder where to start. Here, we explore five ways to improve digital experiences in the workplace.
The rise of double extortion ransomware
We've become familiar with the widespread use of ransomware, but researchers at Rapid7 have been examining the rise of a newer phenomenon, 'double extortion'.
Pioneered by the Maze ransomware group, double extortion involves cybercriminals collecting files before encrypting them. Then if the target organization refuses to pay they threaten to release sensitive information.
Best Windows apps this week
Four-hundred-ninety-five in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Microsoft released security updates for all supported versions of the Windows operating system this week. Check out Sofia's coverage of KB5014697 for Windows 11.
Why and how organizations are modernizing their container deployments at the edge [Q&A]
Edge computing is aimed at bringing computing power closer to the source of data, such as IoT devices. It's increasingly being seen as an alternative to traditional data center and cloud models.
Stewart McGrath is the CEO at Section, a global Edge as a Service (EaaS) provider that helps organizations improve availability of their containerized application workloads in the cloud. We spoke to him to find out how and why companies are moving applications out to the edge.
Microsoft Defender for individuals now available for Windows, macOS, iOS and Android
Microsoft has been working on a new security tool for a while now to help protect you and your family’s data and devices against online threats, such as malware and phishing attacks.
Three months ago it made a preview build of Microsoft Defender available for Windows Insiders to try out, and today it announces the tool's official availability for Microsoft 365 Personal and Family subscribers.
The power of cloud-based quality management
Manufacturing has a history of moving at a glacial pace when adopting new technology such as cloud-based solutions, but cloud is not new anymore. In recent years, cloud computing and SaaS (Software-as-a-Service) have begun to dominate. More and more manufacturers are looking to switch their quality management to a cloud-based quality system.
Simply, in today’s ever-changing and volatile manufacturing climate, the cost advantages, power, and versatility of the cloud have become essential to survival.
Choose your partners carefully to protect your security
Choosing a partner business with a poor security posture makes an organization 360-times more likely to be at risk compared to choosing a top security performer, according to a new study.
The risk surface research from Cyentia Institute and RiskRecon shows that single demographic factors, such as industry, size and region, aren't enough to assess the risk posed by third parties.
Microservices and service mesh are critical to digital transformation
New research shows that 85 percent of companies are modernizing their applications to a microservices architecture.
The study from Solo.io and ClearPath Strategies reveals that 56 percent of organizations with at least half of their applications on a microservices architecture have faster development cycles, with daily or more frequent releases.
Enterprises vulnerable to identity-related incidents due to lack of mature strategies
Only 16 percent of respondents to a new survey have a fully mature identity and access management (IAM) strategy in place, yet 56 percent have experienced identity-related incidents in the last three years.
The study carried out by the Ponemon Institute for enterprise identity specialist Saviynt shows that the 84 percent without a mature strategy are currently dealing with inadequate budgets, programs stuck in a planning phase, and a lack of senior-level awareness.
Email threats still managing to evade defenses
New research released today from Cyren shows that business email perimeter defenses are often incapable of preventing well-crafted email attacks.
During an average month, there are 75 malicious messages per 100 mailboxes that slip past email security filters like Microsoft 365 Defender. This means that an enterprise with 5,000 mailboxes would need to detect and respond to 3,750 confirmed malicious inbox threats each month.
Gateway debuts a new line-up of affordable notebooks
Gateway is as well known for its cow-spotted boxes as it is for its computer products. First started way back in 1985, the company is launching a new lineup of affordable Ultra Slim notebooks powered by 12th Gen Intel Core processors.
The new notebooks, available in a variety of screen sizes and colors, sport a modern, lightweight chassis and a hinge keyboard that can be elevated for comfort. They all come with Windows 11 pre-installed.
How to enable the secret side search feature in Chrome
It is easy to perform searches in Chrome, but you can make things easier. You probably currently either launch Google (or your preferred search engine) in a new tab, or just type a search term in the address bar, but there is another somewhat secret option.
Google’s browser has an optional search sidebar that not very many people know about. Called simply Side Search, this useful left-hand panel makes it easy to explore search results at speed.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.