Latest Technology News

To grow, you need a strategic approach to automation

process automation

Businesses are embracing automation. But you’re most likely to find it thriving in discrete pockets throughout the organization, rather than integrated into every process. One initiative might automate the routing of customer emails to the right agent, while another might help the payroll team process timecards faster. Whilst these solutions to point problems are innovative, their limited scope means they fall short of full-scale automation.

For proof, consider that only 17 percent of businesses have scaled their intelligent automation technologies, according to a recent report from HFS Research, and 90 percent aren’t taking an integrated approach. If organizations want to grow their business, it’s critical they abandon working in silos in favor of a strategic, holistic approach to automation.

Continue reading

The challenge of obtaining visibility into cloud security

Data cloud lock

Digital criminals are increasingly pivoting to the network after initially attacking an endpoint or publicly accessible cloud. Indeed, a network foothold enables attackers to move laterally to more valuable cloud workloads. They can then steal their target organization’s sensitive information and monetize it in whatever way they deem fit.

Many of us are fighting back against the threat of lateral movement by augmenting our visibility over the network. However, we’re constantly running into challenges in the cloud. When using AWS Virtual Private Cloud (VPC) or Azure Virtual Networks (VNets) to detect threats in network traffic, for instance, we’re missing packets’ application-level context. We thus can’t detect the malicious activity that hides within them. In this post, we will discuss why achieving visibility into the cloud continues to pose a challenge. We’ll then explore how we can gain the requisite level of visibility in the cloud.

Continue reading

5G and risks to critical infrastructure [Q&A]

industrial skyline

The speed and bandwidth of 5G means that as the roll out continues a lot of industrial automation equipment will eventually be on the 5G network.

So what can be done to protect the integrity and availability of manufacturing networks and other critical infrastructure? We spoke to Dave Weinstein, CSO of Claroty to discuss the link between 5G and the cyber security of critical infrastructure.

Continue reading

Netflix launches new top 10 feature so you can see what's popular in your country

Netflix on smartphone

Having previously contented itself with offering up algorithm-based suggestions about what you might like to watch next, Netflix has introduced a new feature that lets you see what other people are enjoying.

New lists of the top 10 films and series let you see what is currently popular on the streaming platform. Netflix has chosen to provide top 10 lists based on country, so you'll only see lists of the ten most popular series and movies in your country rather than globally.

Continue reading

Samsung admits to data breach unconnected to mysterious Find My Mobile 1 push notification

Samsung S20

Last week, Samsung customers around the world were confused by the appearance of a mysterious push notification which simply read "1". The company revealed that the Find My Mobile notifications had been sent out by mistake as part of a test, but there was something even more worrying.

In addition to the random notification, some users reported that they were able to access personal data of other users, including names, addresses and partial payment card details. Samsung has now admitted to the data breach and says it will be contacting those affected.

Continue reading

Revolut raises $500m in funding, valuing it at $5.5bn and making it the most valuable UK fintech startup

Revolut card

Financial disruptor Revolut has managed to raise $500 million in a Series D funding round. The new funding sees the value of the digital banking platform rocketing to $5.5 billion, making it the UK's most valuable fintech startup, and one of the most valuable fintech firms in Europe.

The funding comes from a group of investors headed up by TCV (Technology Crossover Ventures) and effectively triples the value of Revolut when compared to its funding round in 2018. The cash injection will be used to expand its multi-currency operations both in Europe and on a global scale.

Continue reading

HyperX Cloud Flight S gaming headset features Qi wireless charging

Qi is amazing technology, allowing you to charge your smartphone by just placing it on a wireless charging pad/mat. Long gone are the days where you have to fumble around with a cable to charge your phone like a caveman. The thing is, it is hardly new -- it took Apple a while to add it to the iPhone, but the Palm Pre had it over a decade ago. Seriously, folks. Hell, there were even Nokia Lumia Windows Phones with wireless charging! And yet, despite the technology being fairly old in 2020, it is still very cool -- and finding its way onto more device types all the time.

For instance, today, HyperX launches a new gaming headset that features Qi wireless charging. Called "Cloud Flight S," you can drop the headset onto any Qi pad (such as this one) to charge it up, but HyperX is selling its own wireless charger called "Chargeplay Base." If you find yourself without such a charging pad, don't panic -- it can also charge with USB. The microphone can be easily detached for when you just want to listen to music, but also, this is great for privacy. While Cloud Flight S does have a mute option, being able to physically remove the microphone is the most foolproof way to avoid accidentally sharing too much during a gaming session.

Continue reading

New biometric solution guards email against account takeovers

hands keyboard

At the root of most data breaches is a compromised account, but these can be very hard to identify, often coming to light only after they've been used to steal data.

Email security specialist GreatHorn is launching a biometric solution that effectively identifies compromised accounts and blocks takeover attempts by validating users using their unique typing patterns.

Continue reading

Cisco launches new cloud-native security platform

cloud lock

As businesses move into the cloud and expand their use of IoT devices, protecting their systems becomes much more complex.

To address this problem Cisco is launching a new integrated cloud-native security platform, Cisco SecureX, aimed at improving visibility, identifying unknown threats, and automating workflows to strengthen customers’ security across network, endpoint, cloud, and applications.

Continue reading

Google helps devs speed up Firefox with open source Lighthouse extension

Lighthouse

Google has released a Firefox version of its Lighthouse browser extension, giving developers an easy way to test the performance of websites and web apps.

The open source extension makes use of the PageSpeed Insights API, and the new release brings Firefox in line with Chrome which has had a version of the extension for a few years now. The ultimate aim is to make it easier for developers to improve app and page performance by encouraging better practices.

Continue reading

Debian-based Netrunner 20.01 'Twenty' Linux distribution now available for download

One of my favorite Linux distributions is Netrunner. If you aren't familiar, it is a Debian-based operating system that utilizes the KDE Plasma desktop environment. It is very polished and chock-full of excellent pre-installed applications such as LibreOffice, GIMP, Firefox, and Skype. All of this makes Netrunner a great choice for those switching from Windows, but also, it is a wonderful option for Linux experts too. Seriously, folks, you will be blown away by how exceptional it is -- one of the best.

Today, Netrunner 20.01 becomes available, and it is a very important milestone. You see, not only does it represent 10 years of development, but also, it is the twentieth major version of the operating system. And so, the Debian Buster (stable) 10.3-based distro is being dubbed "Twenty." Netrunner 20.01 is using KDE Plasma 5.14.5 and comes with a very special birthday wallpaper!

Continue reading

You can't have Google apps on your Huawei phone because Donald Trump says so

Huawei

If you have a Huawei phone launched after May 16 last year, you're going to have to live without Google app such as Gmail, YouTube and Google Maps -- even the Play Store.

Known collectively as Google Mobile Services, Huawei is banned from gaining a license from Google to use its software. In a post on its support website, Google has revealed more about what is going on, and advises people against bypassing the ban by sideloading apps.

Continue reading

3 ways to be more adaptable to change

Developer team

One of the biggest things an organization can do to stay afloat and thriving in our current competitive landscape is to be readily adaptable to change. In contrast, one of the biggest mistakes I often see organizations make is not having a strong enough grasp on their IT infrastructure to do so.

This means that when a problem arises, decision makers will often act out of instinct and make changes that then create further problems or cause unexpected side effects. Once you can quickly and properly survey the technological and/or organizational landscape you’re working with, being adaptable to change can be almost effortless. Below are a few tactics to help you remain adaptable to change and avoid potential catastrophe in the face of an uncertain market.

Continue reading

London insurance market turns to tech to maintain its world-leader status

London skyline

A survey, by IT services provider NTT DATA, of senior leaders in the London insurance market shows a major appetite for technological change within the industry.

It finds that 70 percent of insurance leaders are looking to invest in robotic process automation (RPA) in the future, while 51 percent are focusing their budget on AI and machine learning, exploring use cases like using AI in underwriting to recognize patterns in large data sets and inform human decision making.

Continue reading

Vectra helps enterprises protect against Office 365 breaches

endpoint protection

As more services move to the cloud, enterprises are exposed to increased risks from data breaches, and around 40 percent of organizations have suffered from Office 365 account takeovers.

According to Microsoft's Q3 2019 earnings call, there are more than 180 million monthly users on Office 365, which means there's a big attack surface out there for cybercriminals. That's why threat detection and response specialist Vectra AI has announced a new tool to help businesses protect themselves.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.