Latest Technology News

Google Nest Hub comes to LEGOLAND Hotels

About a year ago, we told you that Google was partnering with some hotels to have Nest Hub smart devices installed in guest rooms. Understandably, some people were concerned about having a microphone and camera in their hotel rooms.

However, those worries were unfounded. You see, Nest Hub doesn't even have a camera! Plus, Google is extremely focused on privacy, and the microphone can be totally disabled with a hardware switch. Ultimately, this hospitality partnership was simply a big win for hotel guests as they get to experience the convenience of Google Assistant when away from home.

Continue reading

Data governance -- balancing security against risk [Q&A]

Data governance

Data is the lifeblood of businesses, but managing it effectively and keeping it secure presents some significant challenges.

How do you ensure that you have the latest information for example? And how can you be certain your compliance procedures are up to date?

Continue reading

Are you a road warrior or a remote collaborator?

The COVID-19 pandemic has had a major effect on the way most of us work and new research from workplace communication specialist Poly has identified six different workplace personas that make up over 90 percent of a typical enterprise.

The study, carried out by by Factworks, aims to help businesses look at the attributes, pain points, and communication intensity associated with each persona, to better match workstyles and employee behaviors to communication devices and technologies.

Continue reading

Despite the headlines, there's no need to feel hopeless about cybersecurity

Head in hands

The recent Colonial Pipeline attack set off gasoline panic-buying on America’s East Coast and reportedly cost the company $90 million in ransom. An adversarial nation’s Sunburst hack penetrated major U.S. corporations and key government agencies with repercussions yet unknown. Looking at these and other incidents, friends and customers have asked me, "What’s the use? Why bother? If these powerful organizations can be held for ransom or lose key data, what chance does my organization have to defend itself?"

I understand the feelings of helplessness behind the question. It can sometimes seem cybersecurity experts are preaching fire safety while all around us the house is burning down.

Continue reading

ICS vulnerabilities on the rise as attacks increase

Industrial computer system

Industrial control system (ICS) vulnerability disclosures are increasing as recent high-profile cyberattacks on critical infrastructure and industrial enterprises have made ICS security a mainstream issue.

The latest biannual ICS Risk & Vulnerability Report released today by Claroty shows a 41 percent increase in ICS vulnerabilities disclosed in the first half of 2021 compared to the previous six months, which is particularly significant given that in all of 2020 they increased by 25 percent from 2019 and 33 percent from 2018.

Continue reading

Supply network mapping more important than ever

Supply chains have been mapped for forever, but now technology is being increasingly involved in network mapping. Supply chains are evolving due to factors around them which might be political, economic, production-based, or, as seen this year, because of a pandemic. Covid-19 exposed the fragility of many modern supply chains with businesses relying on imports from different countries at a time when manufacturing was decreasing.

Within  the wines and spirits industry companies across the world are scaling up their production, streamlining their supply chains, and expanding globally to become more efficient with their suppliers. It’s more important than ever to have an understanding of where everything comes from. You only have to look at the 2013 horse meat scandal to see why knowing  your product’s origins is vital.

Continue reading

Zorin OS 16 is the Windows 11-like Linux distribution Microsoft doesn't want you to know about

Windows 11 is a very good operating system, and it hasn't even gone gold yet. In fact, despite only being Beta, I can confidently call it the best version of Windows ever. It is shockingly polished and beautiful -- the true successor to Windows 7. Windows 10 wasn't bad, but it never felt complete. Windows 11 feels purposeful and well-loved by developers. Microsoft has impressed me with the upcoming operating system. It is appearing to be more than a superficial update as I once thought.

With all of that said, understandably, not everyone wants or needs Windows 11. Due to some rather lofty hardware requirements, some consumers will find their computer simply can't run Windows 11 even if they want it to. While Microsoft and the overall computer industry would love to see these consumers buy new computers, that simply is not necessary. Instead, a Linux-based operating system can breathe new life into your aging PC.

Continue reading

Why a 'one-size-fits-all' approach to data classification won't deliver in an era of enhanced regulation

In 2018 the European GDPR irrevocably changed the whole data privacy landscape. Since it was implemented there have been a host of other privacy regulations such as CCPA, CMMC, and India PDP, coming into force around the world. In fact, just a couple of weeks ago the Colorado Governor signed the Colorado Privacy Act (CPA) into law, the latest in the recent wave of state privacy legislation in the US and unlikely to be the last. The CPA will take effect July 1, 2023, six months after Virginia’s Consumer Data Protection Act (CDPA) and the California Privacy Rights Act (CPRA) become effective.

Following the implementation of such data protection and privacy regulations, there have been plenty of high-profile cases and fines issued. This further underpins the need to ensure sensitive information is handled in the correct manner and reinforces that this is a government requirement that organizations can no longer ignore.  For example, just this month British Airways settled a legal claim from some of the 420,000 people affected by a major 2018 data breach. The breach affected both customers and BA staff and included names, addresses, and payment-card details. The UK Information Commissioner's Office handed BA its largest fine to date -- £20m -- over the "unacceptable" failure to protect customers.

Continue reading

How long until others copy Apple's Mail Privacy Protection?

When iOS 15 is released this fall, users will have access to enhanced Siri capabilities, new ways to personalize their device, helpful improvements to the Find My iPhone/iPad, and several other new features and functionality to play with. But in the worlds of digital privacy and marketing technology, there's one update in particular that has been sending shockwaves up and down the industry.

Companies who care about email marketing have been in a sort of panic mode ever since the full slate of iOS 15 updates was revealed a couple months ago, due to a new feature called Mail Privacy Protection. In what Apple is calling an advancement of its "privacy leadership," the ability to block marketers from tracking the open behavior of their emails is the first step in what could be a cataclysmic shift for the entire spam (I mean, "email marketing") industry.

Continue reading

Small companies make good targets for cybercriminals

"Cybersecurity doesn’t apply to me because my business is too small to matter", and "Cybercriminals would never bother hacking us because we don’t have valuable data or many financial assets."

If these comments sound familiar, that’s because it is unfortunately the view held by a large majority of the SMB community. Small to medium sized businesses are slowly jumping on the cybersecurity bandwagon, but must first leave this 'it would never happen to me' mentality behind.

Continue reading

Why proactive cybersecurity means focusing on people

insider threat

Today’s work environment is radically different from that of just 16 months ago. COVID-19 has created a permanent state of hybrid or fully remote work, which, yes, brings a number of benefits, but it also increases employee stress, reduces their attention span, and creates a chasm between them and their internal security team.

We’re living in the new world order, which compounds and amplifies the threats from what have historically been the three most common security incident reasons -- people getting hacked, people making mistakes, and people breaking rules. Not being proactive about potential insider threats almost guarantees an organization that hasn’t been hacked will be doomed to join the many big-name brands that have found themselves having to pay ransom for access to their systems. 

Continue reading

This is Google Pixel 5a with 5G

If you are a hardcore Android user, you should buy a Pixel. Google’s smartphones may not have the best specifications, but they do offer the purest Android experience. They are the only way to truly experience Android as Google intends it -- including timely OS updates. They are free of bloat, unlocked, and often very affordable. Best of all, they offer a remarkable photography experience.

Today, Google officially announces the oft-rumored Pixel 5a with 5G. It isn’t a flagship device, but with a reasonable $449 asking price, the Android 11 smartphone looks to be a great value. The 6.34-inch OLED screen features a respectable 2400x1080 resolution, while the 12.2 MP dual-pixel and 16 MP ultrawide rear cameras should take exceptional photos. While it does get water resistance, the Pixel 5a with 5G lacks wireless charging -- you must use USB-C to charge the 4680 mAh battery.

Continue reading

Ubuntu Linux gets certified for secure and regulated workloads

secure payments lock

Canonical is announcing today that Ubuntu is set to drive high security and regulated workloads thanks to gaining a new FIPS (Federal Information Processing Standards) certification.

Now the world's most popular operating system across private and public clouds, Ubuntu has received the FIPS 140-2, Level 1 certification for its cryptographic modules in Ubuntu 20.04 LTS, including OpenSSL 1.1.1.

Continue reading

ExtraHop provides deep threat insights for hybrid cloud

cloud magnifier

The expansion of cloud use and remote working have made protecting business systems much more complicated, with simple perimeter controls no longer enough.

ExtraHop is launching updates to its Reveal(x) 360 cyber defense platform that provide deep forensic insight into hybrid cloud networks to allow for advanced threat response.

Continue reading

Trickle down of nation state attack tools may harm businesses

Attack button

A new study from HP Wolf Security shows that 72 percent of IT decision makers worry that nation state tools and techniques could filter through to the dark net and be used to attack their businesses.

The survey, of 1,100 decision makers around the world, also finds 58 percent are worried their business could become a direct target of a nation state attack. A further 70 percent believe they could end up being 'collateral damage' in a cyber war.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.