Lenovo ThinkPad and ThinkStation computers get certified for Linux


Lenovo makes some great Enterprise computers — both its desktops and notebooks can be found in use by many businesses. With that said, the company’s Windows laptops and Chromebooks are used in many homes too. Unfortunately, Lenovo’s consumer PCs have varying degrees of quality — some models are good, while others are downright bad.
Today, Lenovo announces amazing news regarding some of its higher quality computers. You see, all of the company’s ThinkStation and ThinkPad P Series workstations are now certified for Linux, including Ubuntu LTS and RHEL. This is in addition to Lenovo’s previously announced plan to pre-install Fedora on some machines.
Microsoft releases Windows 10 Build 19640


The Windows 10 May 2020 Update is currently rolling out to users of compatible systems, although Microsoft is blocking it for some with a 'your device isn’t quite ready' message.
That’s not a problem for Insiders on the Fast ring though who today get another new build to play around with.
How to boost your privacy and remove unwanted features from Windows 10


Windows 10 comes with lots of features that you might not need, or want. These include Cortana, Bing in Windows Search, and the Game Bar. In addition, Microsoft’s operating system spies on you in a number of ways.
Thankfully, disabling unwanted features and locking down your privacy just got way easier.
Data breaches cost US organizations $1.8 trillion over the last two years


Cybercriminals exposed more than five billion records in 2019, costing over $1.2 trillion to US organizations. Added to the 2.8 billion records that were exposed in 2018, this means breaches over the last two years have cost US organizations over $1.8 trillion.
This is one of the findings of the latest Consumer Identity Breach Report from ForgeRock, which shows a dramatic increase in the number of breaches.
IBM fairness toolkit aims to eliminate bias in data sets


IBM is announcing changes to its AI Fairness 360 toolkit to increase its functionality and make it available to a wide range of developers.
AIF360 is an open source toolkit that contains over 70 fairness metrics and 11 state-of-the-art bias mitigation algorithms developed by the research community to help examine, report, and mitigate discrimination and bias in machine learning models throughout the AI application lifecycle.
Almost 80 percent of companies have had a cloud data breach in the past 18 months


A new survey finds that 79 percent of companies experienced at least one cloud data breach in the past 18 months, and close to half (43 percent) reported 10 or more breaches.
The study for cloud access risk security company Ermetic conducted by IDC covered 300 CISOs and finds that security misconfiguration (67 percent), lack of adequate visibility into access settings and activities (64 percent) and identity and access management (IAM) permission errors (61 percent) are the top concerns associated with cloud production environments.
How to disable Cortana in Windows 10 May 2020 Update -- or even uninstall it


With the release of Windows 10 May 2020 Update, Microsoft not only introduced a range of new features and options, but also took some away. One thing that has changed with Windows 10 version 2004 is that Cortana is now a standalone app rather than an integral part of the operating system.
Not that you would necessarily notice, that is. Although the digital assistant is now separate from Windows itself, it still automatically runs at startup – it is possible, however, to disable Cortana and stop it from running in this way, or remove it completely.
Achieving success during 'transparent moments'


There are certain moments throughout a businesses’ lifecycle where security leaders need to have a clear view into their cloud infrastructure. One example is during mergers and acquisitions processes, when it’s crucial teams not only understand their own organization’s security posture but also that of the company being acquired. Still, a recent Forescout survey of IT and business decision-makers found that 65 percent of respondents regretted an acquisition their company made because of an overlooked cybersecurity issue.
Marriott International’s 2016 acquisition of Starwood Hotels set the company up to become the world’s largest hotel chain. However, it later emerged that Starwood’s reservation system had allowed unauthorized access to cybercriminals since 2014, leading to a large-scale (and very expensive) data breach in 2018 -- a clear example of why transparency is key during M&A. If Marriott had known that Starwood’s IT infrastructure had been compromised, they could have sought ways to remediate or otherwise address the issue and revised the proposed transaction accordingly. Instead, they were penalized heavily by regulators and were hit with lawsuits from customers.
How CISOs can get their good days back


The recent reminder of the importance of basic hygiene has been glaring not only within the physical world, but also the cybersecurity one. Chief Information Security Officers (CISOs) understand this more than most, given the sudden surge in remote work and additional threats this has brought to their organizations. Because so many people have started working from home, corporate perimeters have expanded in a way that many security professionals were not prepared to manage but must now understand in order to effectively safeguard their organizations.
With pundits anticipating a lasting impact on the way we work brought on by the pandemic, CISOs must consider all of the necessary steps to manage cyber risk in what could be the "new normal." And, like nearly anyone following social distancing guidelines right now, a good CISO understands that good security is built on a foundation of good, basic hygiene.
Plugable launches new line of USB-C adapters


Nowadays, many new laptops come with very few ports. In fact, some computers, such as Apple MacBook laptops, have no traditional USB-A ports, instead relying on USB-C exclusively. Sure, it looks clean and nice, but it limits functionality.
Thankfully, adding the needed connectivity to one of these USB-C only computers is just a dongle away. Today, Plugable releases a new line of USB-C adapters. This line is comprised of four dongles, three of which are for video out -- DisplayPort, HDMI, and VGA. The fourth is a Gigabit Ethernet adapter. They all feature flat cables and sleek bodies.
Debian-based MX Linux 19.2 now available for download


A couple days ago, we told you about a new version of a wonderful Linux distribution called Linux Lite. As great as that operating system is -- especially for those switching from Windows -- it isn't the only Linux distribution that is lightweight and easy to use. In fact, the Linux community probably has too many distributions from which to choose, but I digress.
Today, yet another great Linux-based operating system gets updated to a new version, this time it is MX Linux 19.2. It uses the lightweight -- yet pretty -- Xfce 4.14 for its desktop environment and MESA 18.3.6. It comes loaded with some great software, such as LibreOffice 6.1.5, Thunderbird 68.6.1, Firefox 76, GIMP 2.10.12, VLC 3.0.10, and Clementine 1.3.1.
Software quality beats delivery speed for most developers


The latest State of Software Quality survey from continuous reliability company OverOps shows that 70 percent of respondents say quality is paramount and they would rather delay the product roadmap than risk a critical error impacting their users.
In addition, over half of survey respondents (53 percent) indicate they encounter critical or customer-impacting issues in production at least one or more times a month. A quarter of participants also say that over 40 percent of critical production issues are first reported by end users or customers rather than internal mechanisms.
Thycotic extends its privileged access management range


Privileged access management (PAM) specialist Thycotic is expanding its portfolio with the announcement of three new products.
It's launching Thycotic Remote Access Controller, Thycotic Cloud Access Controller and Thycotic Database Access Controller, following its acquisition of cloud security company Onion ID.
Upgrade to Windows 10 Professional for only $39.95 and test untrusted programs safely with the updated Sandbox


In computing terms, a sandbox is an isolated environment inside which you can safely run operating systems and software without risking your data, privacy, or security. Therefore, the Windows Sandbox does exactly what it says on the tin: provides a lightweight desktop environment inside which you can safely test programs.
Why would you do this? The primary reason is security: you don’t know whether you trust a program or file, so by launching the Windows Sandbox tool in Windows 10 Professional or Enterprise you’ll create a Windows within Windows. If you’ve been experimenting with Hyper-V, you’ll see it shares the same underlying virtualization technology, albeit with some crucial differences.
Enterprise mobile phishing up 37 percent in Q1 2020


According to the latest study from mobile security company Lookout, the first quarter of this year saw the enterprise mobile phishing encounter rate increase by 37.1 percent globally .
This includes regional increases of 66.3 percent in North America, 25.5 percent in EMEA and 27.7 percent in the Asia Pacific region.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.