Sabrent launches 16TB Rocket XTRM-Q Thunderbolt 3 external SSD
Solid state drives are wonderful, right? No one disputes that. SSDs are fast, compact, and energy efficient. The only real downside when compared to hard disk drives is capacity. HDDs typically offer higher storage capacity than SSDs.
But what if that wasn't the case? What if you could have the best of both worlds? Well, folks, Sabrent has a new Thunderbolt 3 external SSD that might make you forget about old-school HDDs entirely. Called "Rocket XTRM-Q," the SSD (SB-DXMQ-8X2) can now be had with an insane 16TB of storage! It even has a durable aluminum body.
Best practice steps for safe data sharing
Digital data is everywhere. You only have to look at how much data is transmitted over the internet on a weekly, daily, hourly, or even second-by-second basis to understand just how much data is being shared. In fact, at the start of 2020, the amount of data in the world was estimated to be 44 zettabytes. Given how much data is created every day, pundits predict that this will likely increase to 175 zettabytes by 2025.
As employees and businesses, we are constantly sharing information. Likewise, the number and variety of entities and individuals we share that information with has grown exponentially. No longer is this simply restricted to the perimeter of our own businesses, but it now extends to partners, suppliers, customers, prospects, and influencers around the globe. Consequently, the challenge for most organizations now is: how do we share data easily, quickly, yet also securely?
Leveraging MISP and TheHive when you create your cyber threat intelligence practice
Many CISOs I speak with across Europe tell me their cybersecurity teams rely on two, primary open-source platforms within their security operations (SecOps). The first is Malware Information Sharing Platform (MISP), that allows the storing and sharing of indicators of compromise (IoCs) with other MISP users. The second is TheHive, designed for security incident response (IR). The two solutions are tightly integrated so that SOCs, CERTs and any security practitioner can act more quickly when incidents happen.
For organizations with limited resources or just beginning to build a SecOps practice, MISP and TheHive are easy-to-use tools to help your teams react to malicious threats. The next step to proactively mitigate risk from the full breadth of threats your organization is facing, is to leverage MISP and TheHive to create a cyber threat intelligence (CTI) practice. To do this, you need to consider a third platform that integrates with these two solutions and provides five essential capabilities for a CTI practice so your teams can get ahead of threats.
A majority of email links lead to malicious sites
A new email security report from GreatHorn reveals that 30 percent of links received by email lead to malicious sites.
Spoofed email accounts or websites are the most experienced form of a business email compromise (BEC) attack as 71 percent of organizations acknowledge they have seen one over the past year. This is followed by spear phishing (69 percent) and malware (24 percent).
Connected device industry faces severe skills shortage
Demand for connected devices is causing a severe developer skills shortage and a crisis in wellbeing as developers come under increasing pressure.
New research for the Qt Company, carried out by Forrester Consulting, finds 75 percent of connected device manufacturers say that demand is outstripping supply. At the same time 65 percent are worried about the wellbeing of their developers.
AI will be used to unleash a global cyber incident in the next 12 months
New research from Deep Instinct finds that 78 percent of SecOps professionals are concerned that cyber adversaries will develop and deploy AI to cause a global cyber incident in the next 12 months.
The study of 600 IT and cybersecurity professionals finds more than half of respondents believe ransomware or zero-day attacks are the biggest threats to their organization.
Linux Foundation launches Open Voice Network
Many organizations are now relying on voice assistant systems to handle enquiries, but just as with other forms of information it's important to protect the consumer and the proprietary data that flows through voice.
The Linux Foundation is launching an Open Voice Network, an open source association dedicated to advancing open standards that support the adoption of AI-enabled voice assistance systems.
Only seven percent of IT security leaders report direct to the CEO
New research from SOC specialist LogRhythm finds that just seven percent of security leaders are reporting to the CEO, and only 37 percent say they or someone in their security function reports to the board of directors.
In addition 53 percent of security leaders claim their senior leadership doesn't understand their role, and 51 percent believe they lack executive support.
Microsoft is adding a new utility to PowerToys v0.39 -- Awake
If you think it feels like a long time since PowerToys received any significant updates, you're not wrong -- it has indeed been a while. But that's about to change as Microsoft is preparing to add a new utility to the collection.
Briefly known as Espresso (in a nod to the 'caffeinate' command in macOS), the new tool is called Awake. Coming to PowerToys v0.39, this is a keep-awake utility that can be used to stop Windows from going to sleep.
Microsoft offers bug-blasting KB5003690 cumulative update to all supported Windows 10 versions
The attention surrounding Windows right now is very much focused on what Microsoft is going to have to say about Windows 11 later this week. But in the meantime, there are still millions of users running Windows 10 and contending with its various problems.
Now, having tested it with Windows Insiders on the Beta or Release Preview channels, Microsoft is giving the KB5003690 update a wider release. The cumulative update is now available for Windows 10 versions 20040, 20H2 and 21H1, fixing various issues including poor gaming performance, blurry text, and more.
Samsung Galaxy Chromebook Go is a ho-hum Chrome OS laptop with optional LTE
Chromebooks have been gaining in popularity lately, and it isn't hard to see why. As more and more people do their computing almost exclusively on the web, it makes no sense to spend big money on a Windows laptop you don't really need. Don't get me wrong, Windows definitely still has a place, and Microsoft's operating system is currently more useful than Chrome OS, but it simply overkill for many. Chromebooks are simple, safe, and getting better all the time. Google is giving the people what they want.
While Chromebooks don't typically have the most exciting hardware, there are some powerful models on the market. Today, Samsung shares details about an all-new 14-inch Chrome OS laptop, but sadly, it not at all exciting. In fact, is rather ho-hum. Called "Galaxy Chromebook Go," it is powered by a fairly anemic Intel Celeron processor. The screen resolution is an embarrassing 1366x768. Worst of all, it uses sluggish eMMC for storage, and the base model has a paltry 4GB of RAM.
HyperX Cloud Stinger wired gaming headset is pretty in pink
Pink has traditionally been a color for girls and women -- at least here in the United States. Of course, just because it is tradition, that doesn't mean it is set in stone. These days, anybody can proudly wear the color pink -- regardless of gender -- and rightfully so. If you like the color pink, nobody should make you feel bad about that.
Today, HyperX (now an HP company) launches a special pink variant of its popular Cloud Stinger gaming headset. Yes, this affordable headset for gamers can now be had in the same color as Pepto Bismol or bubble gum.
Why digital transformation is an ongoing process for enterprises
It’s already well known that COVID-19 accelerated digital transformation. McKinsey estimates that it shot forward by about 7 years of progress within just a few months, and CNBC reports that 85 percent of companies sped up their digital transformation plans, but the real question is what happens now?
You could say that there are 3 main pillars to digital transformation, and they don’t necessarily take place one after another. These pillars include:
Sophisticated new attacks target container supply chains and infrastructure
New research reveals a continued rise in cyberattacks targeting container infrastructure and supply chains, and shows that it can take less than an hour to exploit vulnerable container infrastructure.
The latest threat report from cloud-native security company Aqua Security offers a detailed analysis of how bad actors are getting better at hiding their increasingly sophisticated attacks.
Finding the formula to combat back-to-work anxiety in STEM
Mental health is a popular topic at the moment, while the majority of us were trying to maintain a healthy routine and lifestyle while stuck indoors, it begged the question, what about after lockdown? Back to work anxiety was bad enough for some of us after months of leisure time and lie ins. But entering the next stage of eased lockdown regulation is a cause of mental health disruption for some of us, bringing a sense of unease, worry, and anxiety.
At first, the thought of losing our freedom and summer plans caused anxiety in itself, but once we got used to our new life it subsided. While some are eagerly anticipating a return to work and normality, others are genuinely distressed by it -- whether this is facilitated by concerns of the virus or facing our colleagues, there’s a real issue that needs addressing.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.