Twitter to roll out direct message updates including encryption and 'any emoji reactions'


Things have been undeniably chaotic at Twitter since the arrival of Elon Musk, but the social network is still rolling out new features. Next in line for an update are direct messages.
DMs are due to receive a batch of new features and functionality, not least of which is a much-requested security feature -- encryption. But there is much more to look forward to. And if all goes according to plan, the new features will roll out later this month.
How listed companies can establish cybersecurity accountability in 2023


In 2023, regulators will throw down a 'reporting gauntlet', and mandate listed companies to disclose cyberattacks in record time. This legislative sea change will not only intensify the need for adequate protections against attacks, but will require companies to identify and report an incident to their shareholders and the Cybersecurity Infrastructure Security Agency (CISA) within 72 hours.
Regulators have taken note that businesses are fighting a losing battle against foreign and domestic cyber criminality, and by introducing more stringent cybersecurity regulation, their focus is to ensure companies treat cyberattacks as an increasingly systemic threat.
3 Ways the UK public sector can improve security in order to enhance service delivery


From healthcare and education to housing, transport, energy, and so much more, governmental departments across the UK are the critical components of the country’s democratic system which ensures continued good governance through the dispensations of services that meet citizens' needs while representing their interests.
Alongside extraordinary financial challenges, the local government sector has had to grapple with a quickly-changing environment brought on by the disruption of the pandemic, rising geopolitical tensions, and a rapidly digitizing global society. This has driven the need for the digital transformation of the UK’s public sector in order to not only keep pace with the shifting landscape, but also take advantage of the opportunities that emerging technologies have to offer in improving efficiencies and enhancing service delivery.
How AI can evolve and up-level your firm's cyber defense strategy


A recent Statista report revealed the financial consequences of cybercrime in 2022 were higher than ever, with the average cost of data breaches in the U.S. totaling more than $9 million. With 2023 poised to be the year of reduced spending given an uncertain economy, protection against the rise of cyber incidents and data breaches will impact numerous industries and become more costly due to inflation. The human cost, however, is just as great, as businesses face increasing pressures to protect employees’ and customers’ personal information as well as their time and trust.
When a data breach occurs there’s little room and time for error: victims, as well as employees and stakeholders, expect a swift and appropriate incident response. Companies that handle mass amounts of personal data, especially in the legal sector where PII-containing case data is at stake, should look to new solutions rooted in artificial intelligence to complete similar tasks at faster speeds and reduced price points. This will also provide senior leadership much-needed peace of mind amid security-compromised induced stress.
Pick up Acronis Cyber Protect Home Office 2023 Advanced and 250 GB of cloud data for just $29.99


Everyone needs a backup -- but those backups require protecting too. Thankfully Acronis Cyber Protect Home Office 2023 Advanced has both bases covered: comprehensive backup for everything from individual files and folders to entire hard drives on the one hand, and protection against data-stealing malware on the other.
Not only does Acronis Cyber Protect Home Office 2023 Advanced -- available for under £25/$30 thanks to our great deal -- allow you to back up your files to another drive plugged directly into your PC or Mac or some form of network attached storage, but your subscription also entitles you to hundreds of gigabytes of online storage space, ensuring at least one copy of your data is stored offsite according to backup best-practice.
New Radiant Logic solution improves identity decision making


Enterprises need real-time access to lots of data, but it's important that access to that data is properly controlled.
Radiant Logic is launching a new data intelligence offering that offers identity observability and visualization capabilities, all built on an extensible API-layer and available as a SaaS offering.
Microsoft releases emergency patches for Intel CPU vulnerabilities in Windows 10, Windows 11 and Windows Server


Following a security disclosure by Intel way back in June of last year about vulnerabilities affecting its processors, Microsoft has issued a series of out-of-band fixes for the flaws.
In all, Intel revealed details of four data-exposing chip flaws (CVE-2022-21123, CVE-2022-21125, CVE-2022-21127 and CVE-2022-21166) described collectively as Processor MMIO (memory-mapped I/O) Stale Data Vulnerabilities. Now Microsoft has released a total of six emergency updates for various versions of Windows 10, Windows 11 and Windows Server.
Asset management and security -- how to secure your whole tech stack


In a tumultuous geopolitical environment, organizations use digital transformation initiatives to accelerate and maintain their productivity. Companies want IT to increase innovation and improve the efficiency of processes across their business. At the same time, IT leaders are under mounting pressure to gain full visibility of their infrastructure. This pressure stems from the need to minimize or mitigate the risk of any disruption that could directly impact customers, shareholders and employee data.
Without a clear understanding of where your tech stack sits today, those future goals will forever be out of reach. Whether you are a brand new CIO taking on IT responsibility for the first time, or a seasoned CIO with years of experience, being able to go between the big picture and the nuanced details is a necessary skill to develop.
Over 30 percent of mobile users encounter phishing attacks


According to data from Lookout, 2022 has seen the highest percentage of mobile phishing encounter rates ever, with an average of more than 30 percent of personal and enterprise users exposed to these attacks every quarter.
Since 2021, mobile phishing encounter rates have increased by around 10 percent for enterprise devices and more than 20 percent for personal devices.
Known vulnerabilities pose the biggest threat


Known vulnerabilities for which patches have already been made available are the primary vehicle for cyberattacks, according to a report released today by Tenable.
The Tenable Research team analyzed cybersecurity events, vulnerabilities and trends throughout 2022, including 1,335 data breach incidents publicly disclosed between November 2021 and October 2022.
88 percent of organizations have suffered cyber breaches in the last two years


A new survey of 300 CIOs, CISOs, and security executives from enterprises across Europe and the USA shows that 88 percent of organizations admit to being compromised by a cyber incident over the past two years.
The study from Pentera reveals that this is despite organizations having an average of almost 44 security solutions in place.
GDPR, liability and email security management in the digital age


On the 25th of May, 2018, the General Data Protection Regulation (GDPR) was passed, bringing into law a number of privacy and data protection regulations for those within the EU. Any business that operated within the EU had to immediately begin to respect the regulations laid out by this law.
Yet, even businesses outside of the EU are impacted, due to the fact that anyone that does business with someone within the EU area still must fall under these regulations. This meant that the vast majority of international companies, stretching from Asia and South America to North America and beyond, all had to start abiding by these laws.
Data protection in the cloud: 3 best practices


The "Global DataSphere" is exploding in size. IDC predicts that by 2026, the amount of data in the world will have doubled again. While most enterprises have digitized their operations, they continue to add more strategic workloads and create more and more data. So, as the amount of data enterprises have to deal with grows exponentially, moving to the cloud based on an elaborated strategy offers significant benefits like scalability, flexibility and cost-effective storage.
But can this go on forever? Gartner expects total worldwide end-user spending on public cloud services will reach a record $592 billion this year, a 21 percent increase from 2022. This rapid level of growth and migration raises some concerns at an enterprise level, with fast "lift and shift" migrations meaning best-practices for modern data protection aren’t followed. The Cloud security alliance (CSA) reported that 96 percent of companies say they have insufficient security for sensitive cloud data -- so across the board we have a long way to go on this journey. Here are three best practices for enterprises to protect their data in the cloud.
61 percent of Americans rely on free antivirus programs


A new report on the antivirus market from Security.org reveals that almost three-quarters of Americans still strongly believe computers need antivirus to protect their devices and 61 percent are relying on free options like Microsoft Defender.
The number relying on free solutions has held steady, down only one point since 2021. Interestingly, only eight percent of free antivirus users have experienced a breakthrough virus in the past year, compared to 10 percent of paid users.
Why SBOMs have become a vital element of supply chain risk management [Q&A]


In recent years, the software bill of materials (SBOM) has become a key element of software security and software supply chain risk management.
We spoke to Tim Mackey, head of software supply chain risk strategy at Synopsys to find out more about the benefits and challenges of SBOMs.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.