Latest Technology News

Certificate outages impact the majority of organizations

Magnified certificare

A new survey finds 83 percent of 1,000 organizations surveyed experienced a certificate-related outage over the last year, with over a quarter (26 percent) saying critical systems were impacted.

The report from identity management firm Venafi shows that digital transformation is driving an average of 42 percent annual growth in the number of machine identities.

Continue reading

Cyberattacks increase as security talent remains scarce

Cyber attack

A new survey of more than 1,200 security leaders reveals they've seen an increase in cyberattacks while their teams are facing widening talent gaps.

According to the latest State of Security report from Splunk 65 percent of respondents say they have seen an increase in attempted cyberattacks. In addition, many have been directly impacted by data breaches and costly ransomware attacks, which have left security teams exhausted.

Continue reading

Women in tech held to a higher standard than male colleagues

Women working in technology face tougher scrutiny and are more often asked to handle administrative duties than their male colleagues according to a new survey.

The study from Navisite polled over 100 women in the technology industry, with two-thirds of respondents holding engineering or technical roles within their organization, and finds 94 percent feel they are held to a higher standard than their male colleagues.

Continue reading

DuckDuckGo brings its private web browser to Mac in beta

DuckDuckGo for Mac beta

Towards the end of last year, we learned that 2022 is the year that DuckDuckGo's privacy-focused web browser is coming to the desktop.

Today the company has launched the beta version of DuckDuckGo for Mac -- meaning macOS users will have another alternative to Chrome et al before people running Windows 11. The DuckDuckGo browser is billed as offering a high level of security, fast performance, and privacy by default which is more than just a replacement for Incognito Mode.

Continue reading

Cybersecurity takes a back seat to other digital projects

Digital transformation

A new study reveals that 79 percent of cybersecurity professionals think that their organization prioritized maintaining business operations over ensuring robust cybersecurity in the last 12 months.

The CyberArk 2022 Identity Security Threat Landscape Report also points up how the rise of human and machine identities -- often running into the hundreds of thousands per organization -- has driven a build-up of identity-related cybersecurity 'debt', exposing organizations to greater risk.

Continue reading

AI's evolution from oddity to ubiquity

Artificial intelligence

There was a time when the notion of machines "thinking" was the stuff of fantasy. We had the tin man in the Wizard of Oz but that was fiction, a nice story created in Hollywood. The idea that a computer could think, solve problems, and learn from experience like a human was just too far-fetched in the early 20th century. But, science happens, and in the mid-1950’s, the first program, Logic Theorist designed to mimic human-like skill solving was created and the rest, as they say, is history.

Over the next twenty years, the concept of artificial intelligence evolved. Many thought that the attention artificial intelligence received after the Logic Theorist program was created would propel this new discipline into practical, real-world applications. But there was a problem; computer storage and speed requirements to process the amount of data used for running machine learning algorithms were just not up to snuff. To fully realize the potential of AI, computers needed to get faster with more storage. Lucky for us, computers did get faster, much faster, and as we learned from Moore’s Law, storage increased too, at a rate that eventually caught up to the requirements of AI.

Continue reading

'RansomOps' attacks yield record returns for perpetrators

Early ransomware campaigns relied on sending out large volumes of emails in so called 'spray-and-pray' attacks.

But a new report released today by Cybereason highlights the rise of sophisticated RansomOps attacks that are allowing ransomware syndicates to reap the benefits of record profits.

Continue reading

If it's the second Tuesday in April it must be Identity Management Day

identity theft mask

First held in 2021, Identity Management Day seeks to inform about the dangers of casually or improperly managing and securing digital identities by raising awareness and sharing best practices across the industry.

Today's second celebration of all things identity management -- you may have noticed the Identity Management Day eggs and bunnies in the shops (oh, they're for something else?) -- has sparked comment from many industry figures and we round up some of their thoughts below.

Continue reading

Plex is dropping support for podcasts this week

Some four years after adding support for podcasts, streaming media service Plex has announced that podcasts will no longer be available through its apps.

While the company insists that, "we're big podcast fans here at Plex", it says that it is "sorry for the inconvenience" of dropping support. But for anyone who has been using Plex to access podcasts, they may well agree that killing off the feature is the kindest thing to do, but it has irked those who paid for a Plex Pass subscription to use it.

Continue reading

TP-Link Deco XE75 Wi-Fi 6E tri-band mesh system (AXE5400) is shockingly affordable

Wi-Fi 6E is the latest and greatest wireless networking standard. It is special because it uses the less-crowded 6GHz band for a reduction in interference. If you already utilizing regular Wi-Fi 6, the upgrade to Wi-Fi 6E probably isn't worth it. If you are still on 802.11ac or earlier, however, Wi-Fi 6E is absolutely worth your attention.

Today, TP-Link launches a new product that combines Wi-Fi 6E with mesh networking. Called Deco XE75 (AXE5400), it comes with two access points that each utilize tri-band connectivity. Best of all, despite being fairly bleeding-edge, it is surprisingly affordable.

Continue reading

Securing remote work isn't a perk of the job: 4 tips for the future of flexibility

Remote working

In workplaces around the country, business leaders are struggling to settle on a long-term policy for their return to the office. The issue isn’t just the pandemic, although sudden changes have caused companies like Ford and Google to delay their return-to-office strategies. The more pressing challenge as enterprises grapple with the choice of remote or in-person work is employee retention and recruitment. The fact of the matter is some workers would rather quit than go back to commuting and working in an office.

But while corporate leaders are considering the impact of remote, hybrid, and in-person work policies as part of their retention strategies, they must also bear in mind the cybersecurity implications of these flexible approaches. For your CISOs and security team leads, securing remote workers isn’t a perk of the job.

Continue reading

Lessons the military can bring to cybersecurity [Q&A]

The ongoing struggle between good and bad actors in the cyber world has often been compared to a battle or warfare. More recently the threat of nation state attacks on critical infrastructure has led to more actual military interest in the cyber arena, as we've seen in Ukraine.

The Israel Defense Force's 8200 unit is often referred to the SEALs or SAS of cyber military units and its veterans are driving many of Israel's tech start ups.

Continue reading

Vivaldi joins Mozilla in lambasting Microsoft's approach to changing Windows 11's default browser

Microsoft Edge on laptop and smartphone

When Microsoft launched Windows 11, the company was heavily criticized for just how difficult it was to change the default web browser to something other than Edge.

After listening to these complaints, Microsoft used the KB5011563 update to simplify the process of switching browsers. While a welcome improvement, it was not enough for Mozilla who said that there was still more to be done to reduce the number of steps involved. Now Vivaldi has joined the Firefox-maker in saying that moving away from Edge should be made even easier, and not limited to those who are 'technically competent'. The company goes beyond this, accusing Microsoft of malpractice.

Continue reading

Moving to the cloud is the basis of a good Business Continuity Plan

A Business Continuity Plan is, broadly speaking, a set of processes and principles to improve resilience and ensure a business can continue functioning. Due to the importance of IT to productivity for almost every organization in the 21st century -- downtime, when IT systems are offline, is its antithesis.

Thanks to the rapid adoption of digital tools spurred on by the pandemic and the general move to online we have seen throughout the world, there is a tremendous amount of risk out there for businesses with online assets, from cyberattacks and ransomware to natural disasters and power outages. However, using cloud-based IT assets such as remote desktops, SaaS applications, and cloud storage of data can be a shortcut to protecting their continuity -- and therefore the continuity of your business.

Continue reading

How can growing MSPs navigate today's staffing challenges?

Over the last two years, the rise of remote working and increased digitalization across private and public sectors has increased demand across the MSP ecosystem, giving many businesses the opportunity to grow.

However, these opportunities can also bring significant challenges. For instance, it’s crucial to balance the needs of existing clients with the time and resources required to successfully onboard new ones. Some organizations find they are so focused on meeting and exceeding the expectations of their current customers, that it can limit their ability to expand -- with an inevitable knock-on effect on growth. And when teams are already at capacity, the idea of adding to their workload can seem like an impossibility.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.