Latest Technology News

More testing needed to ensure security of web applications

A new report from CyCognito looks at the challenges faced by cybersecurity professionals in protecting web applications, which have become prime targets for cyberattacks.

Organizations maintain dozens, often hundreds, of custom web apps, developed in-house and by third-party partners. What's more over 60 percent update web applications weekly or more often.

Continue reading

Dexcom G7 continuous glucose monitoring system now connects directly to Apple Watch

DexCom has announced that its Dexcom G7 Continuous Glucose Monitoring (CGM) System now connects directly to Apple Watch in the United States. The Dexcom G7 is the first and only CGM system offering real-time glucose readings on the Apple Watch, providing users with freedom and convenience even when their iPhone isn’t with them.

Jake Leach, executive vice president and chief operating officer at Dexcom, stated, “At Dexcom, our users are at the heart of everything we do. Direct to Apple Watch has been one of our most requested features, and we’re thrilled to roll it out to Dexcom G7 users in the U.S. and around the world. We’ve long believed that people with diabetes should be able to view their CGM data where and how they choose. Direct to Apple Watch is a testament to that, allowing people with diabetes flexibility and choice in how they manage their health.”

Continue reading

Generative AI: Productivity dream or security nightmare?

The field of AI has been around for decades, but its current surge is rewriting the rules at an accelerated rate. Fueled by increased computational power and data availability, this AI boom brings with it opportunities and challenges.

AI tools fuel innovation and growth by enabling businesses to analyze data, improve customer experiences, automate processes, and innovate products -- at speed. Yet, as AI becomes more commonplace, concerns about misinformation and misuse arise. With businesses relying more on AI, the risk of unintentional data leaks by employees also goes up. For many though, the benefits outweigh any risks. So, how can companies empower employees to harness the power of AI without risking data security?

Continue reading

Biometrics explained: Breaking down the technology's controversy and contributions to security

Advancements in technology within the last decade have sparked the increased use of digital biometric verification. The technology’s modern verification capabilities have outpaced traditional cybersecurity attack methods geared toward credentials theft -- making the technology an attractive enhancement for corporations seeking to provide a more secure, seamless experience for users to verify their identities. Now, users can leverage biometric technology for secure access to critical information, such as applications in financial and healthcare sectors.

However, recent pushback from the Federal Trade Commission (FTC) on the use of biometrics for identity verification, particularly age verification, highlights compliance concerns surrounding enterprises’ data collection and storage practices -- especially the collection of minors’ biometric information.

Continue reading

The critical role of load balancing [Q&A]

When the internet first emerged, the need for load balancers was mainly to optimize the growing use of PC servers and to support the surge in Web traffic. Their basic functionality was designed to pool server resources to meet this demand.

Load balancers have come a long way since, becoming broadly accepted as essential for evolving IT infrastructure and the exponential growth of apps.

Continue reading

Microsoft officially deprecates NTLM and promotes Kerberos authentication

Microsoft building

Several months after announcing its intention to do so, Microsoft has official deprecated the NTLM (NT LAN Manager) authentication protocol in Windows and Windows Server.

NTLM is now a very old protocol which has been superseded by the more secure and feature-rich Kerberos. It will still be possible to use NTLM until the next release of Windows and Windows Server, but Microsoft is keen for users to take action now.

Continue reading

Windows 10 may be in its death throes, but Microsoft has reopened beta testing

Embossed Windows 10 logo

In something of an odd twist, Microsoft has announced that there will soon be a new beta version of Windows 10. Yes, Windows 10, not Windows 11.

There is a little over a year until Microsoft brings Windows 10 to end of service, meaning it will receive no more updates of any description. Despite this looming deadline, the reopening of the Windows 10 beta channel means that the first beta build of the operating system in three years is just weeks away. So what is going on?

Continue reading

Cooler Master unveils MasterHub Stream Kit at Computex 2024 with modular design for content creators

Cooler Master, known for its extensive range of PC components and gaming peripherals, has introduced the MasterHub Stream Kit at Computex 2024. This upcoming product is specifically designed to cater to the diverse and evolving needs of content creators, including video editors, sound designers, and streamers. The MasterHub Stream Kit stands out as the first of its kind to feature modular components, which users can easily swap and rearrange according to their specific requirements.

The core of the MasterHub Stream Kit is its base module, equipped with pogo pins that facilitate quick attachment and removal of components, along with built-in magnets to ensure each piece remains securely attached. One of the key elements of this modular system is a customizable 15-key IPS display module, which allows users to fully tailor their control setup with macros, scenes, and other commands.

Continue reading

TRIBIT launches StormBox 2 Bluetooth speaker with 24-hour playtime

TRIBIT has launched the StormBox 2 Portable Bluetooth Speaker, an enhanced version of its popular predecessor. Featuring advanced Bluetooth 5.3 technology, the StormBox 2 offers a stable and extended 30-meter range, catering to a wide array of audio needs with its impressive 24-hour playtime and versatile app compatibility.

The newly upgraded speaker boasts a powerful 360° audio experience with two embedded 48mm full-range drivers, ensuring crystal-clear sound quality at a peak power of 34W. Whether you're looking to enjoy music at home or on the go, the StormBox 2's 360° surround sound offers complete audio immersion.

Continue reading

Executives keen to adopt AI coding tools -- developers less so

A new report reveals a disconnect between those in the C-suite and their eagerness to adopt AI coding tools compared to those actually using them who are cautious of AI.

The research from Snyk shows CTOs and CISOs are five times more likely than developers to believe AI coding tools pose no risk and twice as likely than developers to believe they are 'extremely ready' to adopt AI coding tools.

Continue reading

70 percent of enterprises have dedicated SaaS security teams

SaaS

Organizations have prioritized investment in SaaS security, with 70 percent establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions.

A new report from the Cloud Security Alliance (CSA), commissioned by cloud security specialist Adaptive Shield, also finds 39 percent of organizations are increasing their SaaS cybersecurity budgets compared to last year.

Continue reading

Ubuntu Core 24 introduces Linux-based enhancements for IoT and AIoT security and management

Canonical has officially released Ubuntu Core 24, an "immutable" version of Ubuntu tailored for intelligent edge and IoT applications, featuring a 12-year Long Term Support (LTS) commitment. This release encapsulates system components in strictly confined containers, ensuring a secure environment for deploying critical applications on billions of devices globally.

Ubuntu Core 24 supports various architectures including Arm, X86, and RISC-V, transforming Ubuntu into an adaptable platform for edge computing. This version introduces an optimized factory installation process, significantly reducing setup time and supporting secure, air-gapped installations crucial for maintaining global supply chains. Enhanced by validation sets for application management, Ubuntu Core 24 ensures that devices operate with the correct, tested combinations of software, boosting reliability and security.

Continue reading

74 percent of companies struggle with cloud spending

cloud cost

New research from tech consultancy esynergy, which surveyed 700 business and tech leaders in the US and UK, finds 74 percent of organizations struggle to optimize cloud spend.

It also finds that 51 percent anticipate making a change to their cloud strategy in response to cost pressures. Increasingly they're looking at FinOps (financial operations) is to ensure that cloud resources are used efficiently.

Continue reading

Measuring AI effectiveness beyond productivity metrics

Last year was an AI milestone marked by enthusiasm, optimism, and caution. AI-powered productivity tools promise to boost productivity by automating repetitive coding and tedious tasks and generating code.  A year later, organizations are struggling to quantify the impact of their AI initiatives and are reevaluating metrics to ensure they reflect the desired business outcomes.

Measuring developer productivity has historically been a challenge, with or without the introduction of AI-powered developer tools. Last year, McKinsey & Company described developer productivity measurement as a “black box,” noting that in software development, “the link between inputs and outputs is considerably less clear” than other functions.

Continue reading

Why the CHIPs act is the lifeline US tech desperately needs

In the next five to ten years, the United States faces a critical juncture in its technological trajectory, heavily influenced by the implications of the CHIPs Act. As a seasoned venture capitalist and Managing Director of Venture Labs, I have closely monitored the evolution of technology and innovation ecosystems. The CHIPs Act represents more than just a policy shift; it is a strategic maneuver poised to revolutionize the hardware industry, foster innovation, and bolster national security.

Historically, hardware production has been dominated by a few key players, leading to centralized control that stifles competition and innovation. The CHIPs Act aims to dismantle this concentration, decentralizing hardware production and empowering a diverse array of developers. This shift is crucial not only for fostering competition but also for driving technological advancements. By creating an environment where smaller companies can thrive, we can expect a surge in innovative solutions that address emerging challenges across various industries.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.