Google Nest Hub comes to LEGOLAND Hotels
About a year ago, we told you that Google was partnering with some hotels to have Nest Hub smart devices installed in guest rooms. Understandably, some people were concerned about having a microphone and camera in their hotel rooms.
However, those worries were unfounded. You see, Nest Hub doesn't even have a camera! Plus, Google is extremely focused on privacy, and the microphone can be totally disabled with a hardware switch. Ultimately, this hospitality partnership was simply a big win for hotel guests as they get to experience the convenience of Google Assistant when away from home.
Data governance -- balancing security against risk [Q&A]
Are you a road warrior or a remote collaborator?
The COVID-19 pandemic has had a major effect on the way most of us work and new research from workplace communication specialist Poly has identified six different workplace personas that make up over 90 percent of a typical enterprise.
The study, carried out by by Factworks, aims to help businesses look at the attributes, pain points, and communication intensity associated with each persona, to better match workstyles and employee behaviors to communication devices and technologies.
Despite the headlines, there's no need to feel hopeless about cybersecurity
The recent Colonial Pipeline attack set off gasoline panic-buying on America’s East Coast and reportedly cost the company $90 million in ransom. An adversarial nation’s Sunburst hack penetrated major U.S. corporations and key government agencies with repercussions yet unknown. Looking at these and other incidents, friends and customers have asked me, "What’s the use? Why bother? If these powerful organizations can be held for ransom or lose key data, what chance does my organization have to defend itself?"
I understand the feelings of helplessness behind the question. It can sometimes seem cybersecurity experts are preaching fire safety while all around us the house is burning down.
ICS vulnerabilities on the rise as attacks increase
Industrial control system (ICS) vulnerability disclosures are increasing as recent high-profile cyberattacks on critical infrastructure and industrial enterprises have made ICS security a mainstream issue.
The latest biannual ICS Risk & Vulnerability Report released today by Claroty shows a 41 percent increase in ICS vulnerabilities disclosed in the first half of 2021 compared to the previous six months, which is particularly significant given that in all of 2020 they increased by 25 percent from 2019 and 33 percent from 2018.
Supply network mapping more important than ever
Supply chains have been mapped for forever, but now technology is being increasingly involved in network mapping. Supply chains are evolving due to factors around them which might be political, economic, production-based, or, as seen this year, because of a pandemic. Covid-19 exposed the fragility of many modern supply chains with businesses relying on imports from different countries at a time when manufacturing was decreasing.
Within the wines and spirits industry companies across the world are scaling up their production, streamlining their supply chains, and expanding globally to become more efficient with their suppliers. It’s more important than ever to have an understanding of where everything comes from. You only have to look at the 2013 horse meat scandal to see why knowing your product’s origins is vital.
Zorin OS 16 is the Windows 11-like Linux distribution Microsoft doesn't want you to know about
Windows 11 is a very good operating system, and it hasn't even gone gold yet. In fact, despite only being Beta, I can confidently call it the best version of Windows ever. It is shockingly polished and beautiful -- the true successor to Windows 7. Windows 10 wasn't bad, but it never felt complete. Windows 11 feels purposeful and well-loved by developers. Microsoft has impressed me with the upcoming operating system. It is appearing to be more than a superficial update as I once thought.
With all of that said, understandably, not everyone wants or needs Windows 11. Due to some rather lofty hardware requirements, some consumers will find their computer simply can't run Windows 11 even if they want it to. While Microsoft and the overall computer industry would love to see these consumers buy new computers, that simply is not necessary. Instead, a Linux-based operating system can breathe new life into your aging PC.
Why a 'one-size-fits-all' approach to data classification won't deliver in an era of enhanced regulation
In 2018 the European GDPR irrevocably changed the whole data privacy landscape. Since it was implemented there have been a host of other privacy regulations such as CCPA, CMMC, and India PDP, coming into force around the world. In fact, just a couple of weeks ago the Colorado Governor signed the Colorado Privacy Act (CPA) into law, the latest in the recent wave of state privacy legislation in the US and unlikely to be the last. The CPA will take effect July 1, 2023, six months after Virginia’s Consumer Data Protection Act (CDPA) and the California Privacy Rights Act (CPRA) become effective.
Following the implementation of such data protection and privacy regulations, there have been plenty of high-profile cases and fines issued. This further underpins the need to ensure sensitive information is handled in the correct manner and reinforces that this is a government requirement that organizations can no longer ignore. For example, just this month British Airways settled a legal claim from some of the 420,000 people affected by a major 2018 data breach. The breach affected both customers and BA staff and included names, addresses, and payment-card details. The UK Information Commissioner's Office handed BA its largest fine to date -- £20m -- over the "unacceptable" failure to protect customers.
How long until others copy Apple's Mail Privacy Protection?
When iOS 15 is released this fall, users will have access to enhanced Siri capabilities, new ways to personalize their device, helpful improvements to the Find My iPhone/iPad, and several other new features and functionality to play with. But in the worlds of digital privacy and marketing technology, there's one update in particular that has been sending shockwaves up and down the industry.
Companies who care about email marketing have been in a sort of panic mode ever since the full slate of iOS 15 updates was revealed a couple months ago, due to a new feature called Mail Privacy Protection. In what Apple is calling an advancement of its "privacy leadership," the ability to block marketers from tracking the open behavior of their emails is the first step in what could be a cataclysmic shift for the entire spam (I mean, "email marketing") industry.
Small companies make good targets for cybercriminals
"Cybersecurity doesn’t apply to me because my business is too small to matter", and "Cybercriminals would never bother hacking us because we don’t have valuable data or many financial assets."
If these comments sound familiar, that’s because it is unfortunately the view held by a large majority of the SMB community. Small to medium sized businesses are slowly jumping on the cybersecurity bandwagon, but must first leave this 'it would never happen to me' mentality behind.
Why proactive cybersecurity means focusing on people
Today’s work environment is radically different from that of just 16 months ago. COVID-19 has created a permanent state of hybrid or fully remote work, which, yes, brings a number of benefits, but it also increases employee stress, reduces their attention span, and creates a chasm between them and their internal security team.
We’re living in the new world order, which compounds and amplifies the threats from what have historically been the three most common security incident reasons -- people getting hacked, people making mistakes, and people breaking rules. Not being proactive about potential insider threats almost guarantees an organization that hasn’t been hacked will be doomed to join the many big-name brands that have found themselves having to pay ransom for access to their systems.
This is Google Pixel 5a with 5G
If you are a hardcore Android user, you should buy a Pixel. Google’s smartphones may not have the best specifications, but they do offer the purest Android experience. They are the only way to truly experience Android as Google intends it -- including timely OS updates. They are free of bloat, unlocked, and often very affordable. Best of all, they offer a remarkable photography experience.
Today, Google officially announces the oft-rumored Pixel 5a with 5G. It isn’t a flagship device, but with a reasonable $449 asking price, the Android 11 smartphone looks to be a great value. The 6.34-inch OLED screen features a respectable 2400x1080 resolution, while the 12.2 MP dual-pixel and 16 MP ultrawide rear cameras should take exceptional photos. While it does get water resistance, the Pixel 5a with 5G lacks wireless charging -- you must use USB-C to charge the 4680 mAh battery.
Ubuntu Linux gets certified for secure and regulated workloads
Canonical is announcing today that Ubuntu is set to drive high security and regulated workloads thanks to gaining a new FIPS (Federal Information Processing Standards) certification.
Now the world's most popular operating system across private and public clouds, Ubuntu has received the FIPS 140-2, Level 1 certification for its cryptographic modules in Ubuntu 20.04 LTS, including OpenSSL 1.1.1.
ExtraHop provides deep threat insights for hybrid cloud
The expansion of cloud use and remote working have made protecting business systems much more complicated, with simple perimeter controls no longer enough.
ExtraHop is launching updates to its Reveal(x) 360 cyber defense platform that provide deep forensic insight into hybrid cloud networks to allow for advanced threat response.
Trickle down of nation state attack tools may harm businesses
A new study from HP Wolf Security shows that 72 percent of IT decision makers worry that nation state tools and techniques could filter through to the dark net and be used to attack their businesses.
The survey, of 1,100 decision makers around the world, also finds 58 percent are worried their business could become a direct target of a nation state attack. A further 70 percent believe they could end up being 'collateral damage' in a cyber war.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.