Four Zero Trust hurdles that organizations are failing to clear


More than a decade after the concept of Zero Trust was first introduced, it’s become one of the biggest buzzwords in the industry. According to Microsoft, 96 percent of security decision-makers believe Zero Trust is ‘critical’ to their organization’s success, with 76 percent in the process of implementation currently.
Zero Trust is on the rise because traditional security models that assume everything inside an organization’s network can be trusted is no longer valid. As enterprises manage their data across multiple applications and environments, on-prem or hosted in the cloud, and as users have more access to data at more interfaces, a network’s perimeter becomes porous and less defined. This causes the threat surface to expand as the edge becomes indefensible. This change has seen many organizations embrace Zero Trust principles to improve their security posture.
UK sees boost in AI adoption


Use of AI technology in the UK has stepped up since 2016, with 41 percent of companies adopting AI between 2016 and 2019, compared to just a fifth over six years ago.
A new study from Peak shows this puts the UK above the global average of 39 percent for this period, though it's since dropped back closer to the average, and represents an almost fourfold rise in the last ten years, compared to just 2.5 times in the US and three times in India.
Hackers can easily bypass mitigation for Microsoft Exchange security vulnerabilities


Late last week, Microsoft confirmed the existence of two actively exploited zero-day vulnerabilities in Exchange Server. Tracked as CVE-2022-41082 and CVE-2022-41040, both security flaws are worrying as they are known to be actively exploited.
While it works on a fix, Microsoft offered up instructions to mitigate the vulnerabilities. But it turns out that it is incredibly easy to bypass, with security experts warning that the method used is too specific, rendering it ineffective.
Transcend unveils MTE720T PCIe Gen4x4 M.2 2280 SSD


Solid state drives continue to get faster, with many computers now supporting the PCIe 4.0 standard. Hell, PCIe 5.0 computers are now emerging. If you have a PCIe 4.0-compatible PC, you will probably want to get such an SSD to maximize your performance. Is it largely for bragging rights and benchmarks? Arguably, yes, but if you can afford it, you might as well go for a PCIe 4.0 drive. After all, the price should not be much more than a PCIe 3.0 SSD.
Transcend has a new M.2 NVMe PCIe 4.0 SSD that is intended for industrial applications, but it can absolutely be used in any PC with a compatible M.2 slot. The drive is designed to be both durable and fast -- it can achieve read speeds up to 7,200 MB/s and write speeds up to 6,500 MB/s. Nice!
Logitech PRO X SUPERLIGHT wireless mouse now available in red


When driving in your car, a red traffic light tells you to "stop." When it comes to the PRO X SUPERLIGHT wireless mouse, however, Logitech is hoping the new red color option will instead make you go; as in, go to the store and buy it!
Yes, folks, the wildly popular PRO X SUPERLIGHT is now available in a new red color, joining black, pink, and white. While this is entirely subjective, I would say the red option is the prettiest of the bunch.
How MSPs and IT leaders can optimize cloud costs amid economic headwinds


Lingering recession concerns and sky-high inflation have created a challenging economic environment. Last year, increased consumer demand coupled with supply chain snags gave companies incredibly high pricing power. That appears to be coming to an end, however. As the risk for a coming recession grows, many companies are wrestling with logistical issues fueled by geopolitical tensions, war, and the pandemic.
As businesses navigate increasing economic headwinds, leaders should consider how to optimize IT investments and expenditures to ensure business success during this challenging time.
Why developers hold the key to cloud security


Developer-first security is the future in the cloud -- the responsibility for cloud security rests with developers and DevOps teams, not IT security.
In the days of the on-premise data center and early cloud adoption, the roles of application developers, infrastructure operations, and security were largely siloed. In the cloud, this division of labor increases the time-to-market for innovation, reduces productivity, and invites unnecessary risk.
Vulnerability management in 2023: Questions and answers


In this article, I will try to answer several important questions related to identifying, classifying, prioritizing, and eliminating vulnerabilities in a timely manner, as well as how to automate the vulnerability management process.
Let me start the article by defining the classic process of finding and eliminating vulnerabilities.
37 percent of companies lose over $100,000 to a cyberattack


Cyberattacks can cause significant harm to businesses, not least financial losses. According to recent findings from the Atlas VPN team, 37 percent of companies lose over $100,000 per cyberattack on average.
Some lose even more, with 22 percent of companies suffering significant losses ranging from $100,000 up to $499,999. Cybercriminals stole even more money, between $500,000 and $999,999, from 11 percent of businesses. Lastly, four percent of companies claim to have lost over $1 million after a successful cyberattack. A worrying two percent of businesses say they don't know their actual losses.
Adobe debuts Photoshop Elements 2023 and Premiere Elements 2023 with new photo and video effects


Adobe has unveiled brand new versions in its consumer photo and video range with the combined launch of Adobe Photoshop Elements 2023 and Adobe Premiere Elements 2023 for Windows and macOS.
Both new versions showcase new visual effects, but also come with the promise of usability, performance and stability improvements. They’re also accompanied by the launch of new companion web and mobile apps.
What does cloud native security actually look like? [Q&A]


Cybersecurity is a priority for all enterprises. We regularly see news of data breaches across a wide range of industries, and as workforces increasingly move to a hybrid model the issue becomes more acute.
As businesses undergo digital transformation they need to update not only their tools but also their attitude toward keeping systems secure. We spoke to Pravin Kothari, executive vice president, product and strategy at cloud security company Lookout to find out why in a cloud-native world security needs a different approach.
Why it's time to rethink your hybrid collaboration strategy


Over the last two years, organizations everywhere have built hybrid collaboration strategies from a variety of platforms and services in an effort to blend the most useful features. This is understandable given the rapid acceleration in the adoption of digital collaboration tools throughout 2020, which played a huge role in keeping the economy moving.
Since then, businesses have grown to rely on their collaboration capabilities as part of their ongoing approach to hybrid working. But in many cases, this has given rise to a somewhat cobbled-together approach, delivering user and customer experiences that work but aren’t entirely optimized.
Simple data management with Database as-a-Service (DBaaS) for Kubernetes


Modern applications need to be fast, available, and secure. They are composed of many microservices, often supported by multiple data services. Managing each of these data services in a dynamic, Kubernetes world is complex, time-consuming and leaves little time for innovation.
Managing stateful applications on Kubernetes in production is difficult. According to a Pure Storage survey, the most important customer requirements are:
Spotify is forcibly installing on Windows 10 and Windows 11 systems


If you have noticed the appearance of the Spotify app on your computer but you don't recall installing it, you are not alone. There are multiple reports -- or complaints, even -- from users of Windows 10 and Windows 11 that the app has installed itself without permission.
It is certainly not unknown for Microsoft to forcibly install apps on computers, but on previous occasions when apps have been foisted onto people, there has been some sort of announcement or notification. This has not happened this time around, so it is not quite clear what is going on. One thing is undeniable though: people are not happy.
Five SAP application security trends
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.