You should replace Windows 11 with Linux Mint 21.1 on grandma's PC this Christmas


Grandmothers can be great ladies, but let's be honest -- they aren't very good at using computers. It's not their fault though -- they didn't grow up with them. That's why every time you visit grandma for Christmas, she asks you to fix her computer.
If you are sick of removing malware from grandma's PC, there is a simple solution -- install Linux! Yes, by formatting grandma's hard drive and replacing Windows with Linux, she will have the best Christmas ever.
Refurbished vs remanufactured: What's the difference and why does it matter?


Second-hand products have seen a surge in popularity of late as businesses and consumers alike look to save money and live more sustainably. The technology industry hasn’t been without its own mini revolution, seeing refurbished goods flood the market as online marketplaces and new business models disrupt the industry. And this trend is only set to continue with ongoing supply chain issues, the cost-of-living crisis rumbling on and the ever-growing pressures to become more sustainable.
Due to these tensions, finding cost-effective tech that does not drain the planet’s resources can lead you down two paths: Refurbishing or Remanufacturing.
Third-party behaviors increase risk to organizations


A new Third-Party Risk Report from secure enterprise browser tech company Talon Cyber Security focuses on the ways in which third-party workers increase security risks and organizations vulnerable to data breaches.
Talon surveyed 258 third-party workers, including contractors and freelancers, and finds 89 percent work from personal, un-managed devices, which organizations lack visibility into and therefore cannot enforce the enterprise’s security posture on.
Enterprise management undervalues the power of search in digital transformation efforts


A new study from Coveo shows 81 percent of IT and business stakeholders agree that it's hard to engage management when talking about search.
The study of 600 people carried out by Dimensional Research shows 83 percent of respondents say that enterprise search is crucial to digital transformation efforts, but that company leadership rarely talks about it.
A hybrid approach and risks to security -- quantum computing predictions for 2023


Quantum computing holds the promise of much faster processing speeds but is still widely viewed as still being some way in the future as a commercial proposition. It could boost machine learning and AI, and unlock the power of unstructured data.
Of course quantum also comes with security challenges thanks to its potential to crack passwords and break encryption. Here's what industry experts expect to see happening in the quantum world in 2023.
Why IAM alone is no longer sufficient to defend against today's evolving threat landscape


It’s a fact -- today’s businesses are using multiple, fragmented identity management tools to control access; and most are even paying for identity tools that they’re not even using. A recent survey found that 52 percent of organizations manage over 10,000 digital identities and 96 percent of those organizations have multiple identity management tools in place. More doesn’t always mean better protection, as 89 percent of organizations surveyed were still hit by an identity-based cyberattack in the last year.
Identity sprawl is a real thing and it’s an obstacle that is making many organizations more susceptible and more vulnerable to attacks.
Poor website experience makes 60 percent of consumers abandon a purchase


A new survey of 6,000 online shoppers in the US and EU finds that many websites are causing problems for eCommerce companies due to poor design.
The study from Storyblok shows that 42 percent say they decide whether to stay on or leave a website within 10 seconds -- 20 percent within five seconds -- while 60 percent have abandons a purchase because of poor website experience.
Apple fixes Gatekeeper-bypass vulnerability after Microsoft discovers macOS security flaw


A Microsoft security researcher has unearthed a security vulnerability in macOS which has been named Achilles.
Tracked as CVE-2022-42821, Jonathan Bar Or found that the flaw could be used to bypass the Gatekeeper security feature of macOS in order to execute malicious apps. Apple has now fixed the vulnerability in Big Sur, Monterey and Ventura versions of macOS.
Microsoft confirms KB5021233 update is causing 0xc000021a errors and blue screens in Windows 10


The curse of the problematic Windows update strikes again! Following the release of the KB5021233 update for Windows 10 last week, Microsoft has acknowledged that the cumulative security update is causing blue screens for some users.
The company is now investigating the cause the issue that leads to a BSoD (Blue Screen of Death) and a 0xc000021a error. The problem affects Windows 10 versions 20H2, 21H1, 21H2 and 22H2, and Microsoft has a workaround for users to try until a fix is developed.
No more either/or: How a layered, data-centric approach to security removes outdated restrictions


Viewing security as a modern data challenge is something different from simply recognizing the crucial role of data. IT security has always been about gathering, analyzing and acting on data. But modern cloud data challenges are about handling ever increasing amounts of disparate, differently-structured and unstructured data, from a changing mix of dynamic sources.
The challenge is not about battling to handle data overload. But rather, rethinking the underlying data technologies you use at the core of your security platform, so that as more data floods in, it makes your security tighter and more effective.
Hyperscale, cyber vaulting and tougher policies -- storage and data predictions for 2023


Data is increasingly seen as being among and organization’s most valuable assets and businesses are generating more and more of it.
But of course it has to be stored and kept secure. Much of it is in an unstructured form too, which creates additional challenges. We asked some experts in the data and storage field to give us some predictions for this sector in the coming year.
Increasing eCommerce sales place onus on retailers protecting customers from downtime and data breaches


With the annual Christmas/New Year shopping season in full swing, high network traffic is expected to accompany the sales throughout December and into 2023. During this time, retailers will expect to see a higher-than-average number of visitors to both their stores and their online websites.
But with soaring inflation and energy price rises causing economic uncertainty, predicting the level of sales traffic that eCommerce sites can expect isn’t an easy task. Therefore, adapting their strategies to ensure they are ready for any level of network traffic must be a priority.
Meeting the challenge of securing cloud-native apps [Q&A]


As more and more of our computing moves to the cloud, protecting information and apps throws up a new set of challenges for enterprises.
We spoke to Ratan Tiperneni, president and CEO of cloud-native app protection specialist Tigera, to find out more about the security implications of going cloud native and how to deal with them.
Give the gift of an NVIDIA GeForce RTX 4090 this Christmas with a YEYIAN ODACHI prebuilt gaming PC


Santa Claus is cool and all, but let's be honest, the gifts his elves make are kind of lame. Look, it is 2022, and no kid wants a wooden train, stuffed animal, or baby doll. Santa can keep that crap at the North Pole. Thee days, kids want electronics and hardcore gaming computers.
If you want to impress someone this Christmas, you should buy them a prebuilt gaming PC with a legit gaming card. Don't know which PC to buy? Don't worry -- there are three new "ODACHI" desktops from YEYIAN that are guarantied to "wow" the recipient. They are powered by either an Intel Core i9 13900KF or AMD Ryzen 9 7950X and come with either an NVIDIA GeForce RTX 4080 or 4090.
The case for a security program


Modern corporations are fully dependent on their IT infrastructure for their daily operations. Securing an IT infrastructure can be a daunting task. Fortunately, there are common best practices that have found success for some of the biggest companies in the world. These best practices share common traits that can be duplicated to match almost any environment.
Before we begin, let’s examine the past failures of many security professionals. As security managers, we must understand that the most secure environments, regardless of the sophistication of your tools or the talent of your staff, will eventually be compromised by the weakest link in your controls. So how do we manage these weak links? Let’s start by identifying them.
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.