Security drives DevOps platform adoption


Nearly three-quarters of respondents to a new survey have adopted -- or plan to adopt within a year -- a DevOps platform in order to meet rising industry expectations around security, compliance, toolchain consolidation, and faster software delivery.
The study from GitLab shows security has overtaken even cloud computing as the number one investment area across DevOps teams at global organizations.
Consumers absorb cybersecurity tips from popular culture


According to a new study 59 percent US and UK consumers are now more cautious about trusting others online thanks to having watched fraud documentaries.
The report from Onfido looks at the impact of popular shows like Inventing Anna and The Tinder Swindler and finds that 67 percent of consumers admit they have changed their outlook on fraud.
Taking the risk-based approach to vulnerability patching


As one of the most effective ways to prevent attacks on IT assets, it is universally acknowledged and known that patching vulnerabilities is a critical process. But as the volume of vulnerabilities discovered in the tools we use continues to proliferate -- and the speed at which they are being weaponized increases -- patching is becoming a complex and difficult task for security teams. During the 2021 calendar year alone, more than 20,000 individual vulnerabilities were discovered and announced, and by May 2022, more than 10,000 issues had been released. The number of vulnerabilities being discovered and disclosed is not slowing down, it is accelerating.
While the security community’s ability and attention towards discovering vulnerabilities has matured, the scale of these issues has - in tandem - become overwhelming. So what can organizations do to stay afloat in today’s "sink-or-swim" threat landscape?
KB5015878 update broke audio in Windows but Microsoft has a fix... of sorts


One of the most recent updates released by Microsoft that has had something of an unwanted payload is the KB5015878 update for Windows 10. Many people installing the update found that it broke audio on their systems.
Microsoft has not only acknowledged the problem, it has also issued a fix. The company is using a once-rare-but-becoming-increasingly-common Known Issue Rollback (KIR) to recall the update. Sadly, it will be of no use to people who are experiencing audio problems!
Microsoft is displaying ads in yet another of its apps; Windows-maker gets sneaky in mobile Outlook


There's no such thing as a free lunch, and there's no such thing as free software (well... very, very rarely). If you don't pay a monetary price for software, you're almost certainly going to pay for it with your privacy, or by seeing ads.
This is something that users of Microsoft's software have had little choice but to become increasingly familiar with -- even in the case of paid-for software. The latest of the company's apps to fall victim to the advertising plague is Outlook Mobile. Users are particularly annoyed because the ads are difficult to distinguish from emails.
Steve Jobs' Apple-1 Computer prototype sells at auction for $677,196


Apple famously began life in Steve Jobs' parents' home in Los Altos, California, firstly in his bedroom, before relocating to the garage.
For obvious reasons, items from the early days of what was to become to a tech behemoth are hugely interesting to collectors and a rare Apple-1 prototype, has just sold for eye-watering figure at auction.
Disaster recovery planning: A successful framework for strategy and execution


The rise in cyber incidents is set to continue on its meteoric trajectory over the next decade. Ransomware attacks on a business, consumer, or a device are anticipated to take place every two seconds by 2031 -- a worrying escalation from every 11 seconds in 2021. And by 2025, damages are projected to reach a staggering $15 trillion annually, up from $3 trillion in 2015, according to Cybersecurity Ventures.
At the same time, users demand better performance and user experience year-after-year, and the subsequently increased threat landscape poses real challenges in connectivity and data security. 'Insider threat' also poses a considerable risk, with 80 percent of breaches involving privileged credentials misuse or abuse and malicious insider activity from recent employees.
Apple will provide you with everything you need to repair your own MacBook Pro or MacBook Air


Earlier in the year, Apple launched its self repair program, giving iPhone users the option of fixing their own phones. As well as providing instruction manuals and selling the parts, tool rental is also part of the program.
Now Apple has announced that it is expanding the Self Service Repair to include MacBook Air and MacBook Pro notebooks -- provided they are fitted with the M1 family of chips, that is. The company says that the program will expand to include additional Mac models soon, and that the iPhone self-repair service will expand out of the US to Europe and beyond.
IT leaders look to switch from legacy systems to data warehouses


According to a new study more than 59 percent of data and technology leaders plan to switch their data warehousing solutions and 46 percent say a legacy system is motivating them to do so.
The research carried out by Propeller Insights for Ocient surveyed 500 people who are managing active data workloads of 150 terabytes or more. It finds 97 percent of respondents say the volume of data managed by their organization is set to grow fast or very fast over the next one to five years.
AIOps needs a new (customer-focused) approach


IT infrastructure has become incredibly complicated -- intensified by the investment in digital transformations encouraged by the pandemic. One of the unintended consequences? IT teams and incident responders are stressed, and stretched farther than ever. PagerDuty’s The State of Digital Operations lays out the increased burden on these teams, the results in terms of burnout, and the impact having a more mature digital operations can have on minimizing that stress.
AIOps is an essential component to any mature digital organization, and it’s clear a new approach is needed. The sheer volume of IT events, from changes, warnings and incidents, to tickets for more routine activity are increasing 70 percent year-on-year. At a moment when increases in budgets won’t keep pace with the explosion of incidents or the complexity of IT infrastructure (if the budgets aren’t being reduced outright), leveraging AIOps to serve teams and customers is critical.
Organizations plagued by identity sprawl


A new study reveals that identity sprawl is a major problem for organizations, with 60 percent reporting as many as 21 separate identities per user.
The report from Radiant Logic and Gartner Peer Insights looks at the rapid growth of enterprise identity silos, and the explosion of user information, attributes, and credentials that accompanies it.
Your IT systems touch multiple networks -- what's your cyber hygiene plan?


The world is becoming more connected via the use of cloud computing services and Internet of Things (IoT) devices. Over the last decade, we have watched cybercrimes skyrocket before our very eyes. Corporations today cannot afford to rely on basic firewalls and antivirus software to ensure data is protected. It is essential to create a more powerful cybersecurity ecosystem.
How big is the threat against data? First, take a look at how much data we are talking about here. By the year 2025, we can expect there to be 175 zettabytes of data across the internet and networked computer systems. Think streaming video, dating apps, your private healthcare information, banking data, social media posts, and messages. The list can go on.
Dealing with the risks of online collaboration tools [Q&A]


The shift to working remotely has led to businesses relying increasingly on collaboration tools like Slack and Teams. But while these undoubtedly increase productivity they also introduce some extra risks.
We spoke to Brian Mannion, chief legal and data privacy officer at Aware, to find out about these risks and how enterprises can address them.
Google is finally bringing an RSS reader back to the desktop


Google Reader was killed off quite some time ago, but there are still plenty of people mourning the passing of this iconic RSS reader. There have been plenty of replacements developed, but few -- if any -- manage to match the simplicity of the original.
Now Google is having a second crack of the whip. Sadly, we can't report that Google Reader is coming back, but the desktop version of Chrome is getting an RSS reader to match its mobile counterpart.
Why merchants don't need to buy fraud insurance to cover everything


The discipline of fraud prevention has changed dramatically over the past five years and continues to evolve rapidly. Consequently, former truths about fraud prevention are increasingly becoming outdated myths. Legacy vendors propagate these myths to maintain relevance, but industry leaders understand the distinction and are moving forward.
In this article, the common myth we’ll tackle is that a merchant should buy fraud insurance to cover everything -- this is typically touted in the market as a 'chargeback guarantee.' On the surface, the simplicity is appealing; the vendor is claiming to solve merchants’ fraud problems by taking liability for chargebacks, returns abuse, Item Not Received abuse, and potentially more. But the statement is very much a myth for, at the very least, five important reasons:
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.