❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 7 December 2025Main stream

Privacy Framework β€” A Modern, Data-Centric Approach for 2025

Privacy Framework β€” A Modern, Data-Centric Approach for 2025
PF

Privacy Framework β€” A Modern, Data-Centric Approach for 2025

Data-centric privacy readiness, ISMS alignment, regulatory coverage, consent, DPIA/PIA, incident response β€” with real-world governance lessons.

Introduction

In 2025, privacy is no longer just a compliance obligationβ€”it has become a strategic differentiator, a board-level priority, and a resilience factor that impacts trust, brand value, and long-term sustainability. With expanding digital ecosystems, multi-jurisdictional regulations, AI-powered decision systems, and unprecedented levels of data movement across borders, enterprises today face a privacy landscape that is more complex and fast-shifting than ever before.

Action:

Start a privacy inventory project this quarter β€” list your top 3 data sources and assign owners for each.

A Privacy Framework offers structured guidance, governance, methodologies, and operational mechanisms to ensure that personal information is collected, used, stored, processed, and shared in ways that are lawful, ethical, secure, and aligned with customer expectations. In recent years, global eventsβ€”including the major flight disruption at IndiGo in December 2025β€”have demonstrated how operational failures, weak governance, unclear communication, and gaps in risk planning can severely impact trust. Even though the IndiGo incident was not a data breach, it highlighted how misalignment between regulation, internal capability, and operational readiness can trigger nationwide chaos. A strong privacy and governance framework would mitigate similar chaos in environments where personal data is involved.

Action:

Map one major operational process to privacy impact β€” e.g., customer refunds, cancellations β€” and identify data points used.

Why Organizations Need a Privacy Framework in 2025

Digital transformation, cloud technologies, AI-driven analytics, mobile adoption, and outsourcing have created a massive influx of structured and unstructured personal data. Business expansion across countries brings multi-jurisdictional privacy obligations. Meanwhile, customers are increasingly conscious about how their data is used, monitored, shared, monetized, or profiled. Market perception is now directly tied to privacy posture.

Action:

Run a rapid stakeholder survey (customers, partners) to capture top 3 privacy concerns within 30 days.

A Privacy Framework helps organizations operationalize data protection principles, embed privacy in business processes, implement technical and organizational safeguards, and ensure accountability through structured roles, auditability, and governance. It ensures that privacy is not a one-time project but a living, evolving capability.

Action:

Document a privacy governance RACI: who is Responsible, Accountable, Consulted, and Informed for your top 5 data flows.

Key Service Areas

Below table converts the main service activities into a quick-reference tabular layout.

Action:

Choose one service area to pilot with a small cross-functional team for 60 days.

Service Area Key Activities Regulations Coverage Product Partners
Privacy Readiness
  • Privacy-by-Design
  • Privacy Maturity Assessment
  • Procedure Blueprinting
  • PIA / DPIA
  • Breach Response & Management
GDPR, CCPA, LGPD, PDPA, PIPEDA, APP OneTrust BigID
PI Modelling & Mapping
  • Data Inventory
  • Data Flow Mapping
  • Data Modelling & Relationship
GDPR, Sectoral Laws BigID
Data Subject Rights
  • DSAR Portal
  • Identity Validation
  • Individual Request Fulfilment
  • Records & Reporting
GDPR, CCPA, PDPA, PIPEDA OneTrust
Consent & Cookie
  • Consent Categorisation
  • Consent Tracking & Revocation
  • Cookie Assessment & Scanning
GDPR, CCPA, ePrivacy (where applicable) CookieScan
Platform Solutions
  • Platform Architecture & Blueprinting
  • Implementation & Integration
  • Monitoring Dashboards
  • AI Regulatory Analysis
Depends on deployment region OneTrust Custom

Data-Centric View & Risk Landscape

Modern privacy management begins by understanding the data journeyβ€”collection, transformation, usage, storage, and archiving. This requires knowing data sources, processing activities, recipients, retention, and deletion flows.

Action:

Create a simple data-flow diagram for a single customer-facing process and keep it under 3 layers.

Typical data sources include CRM, customer services, retail systems, partner ecosystems, employee systems, and outsourcing providers. Each source adds complexity, and each requires controls mapped to legal and business obligations.

Action:

List top 5 external data partners and capture the legal basis or contract clause for data sharing with each.

Threats

Key ThreatsImpact
External & Internal AttacksData breach, reputational loss
Identity theftLegal, financial liabilities
RansomwareOperational paralysis

Drivers

DriverKey Factor
Regulatory ComplexityMulti-jurisdictional obligations
Market DemandPrivacy as competitive advantage
TechnologyAI, Cloud, IoT

SVG Infographic β€” Data-Centric Privacy

Data Sources Controls & Safeguards Governance Process β€’ Policy β€’ People Consumers Partners
Action:

Export this infographic as a PNG for stakeholder review and include it in your privacy charter deck.

Governance, Compliance & Case Study

A Privacy Framework must ensure governance, roles, monitoring, and auditability. It should include documented policies, periodic reviews, vendor oversight, and operational playbooks. Regulatory compliance alone is insufficient without implementation and continuous improvement.

Action:

Create a policy review calendar for the next 12 months and assign owners.

Real-world disruptions, like the IndiGo outage in December 2025, teach that failure modes are broader than cyberattacks. Operational or regulatory changes, poor communication, and lack of contingency planning can rapidly erode trust. The privacy parallel: a poorly handled data incidentβ€”slow notifications, confusing remediation, or no clear ownershipβ€”can cause similar reputational damage and regulatory exposure.

Action:

Draft a short incident communication template: what to say, whom to notify, and timelines for initial acknowledgement.

Issues & Challenges

Enterprises face practical hurdles that slow down privacy adoption. The table below summarises the most common challenges and suggested mitigation approaches.

Action:

Pick one challenge from the table and identify a low-cost pilot to address it within 45 days.

IssueWhy it mattersMitigation
Low awarenessEmployees and customers unaware of rights/risksTargeted training; short micro-modules
Growth vs PrivacyRevenue goals may override privacy controlsPrivacy risk scoring in product roadmap
Forced consentLegal & reputational riskDesign clear, granular consent flows
Data complexityHigh volumes, multiple formatsAutomated discovery & classification
Budget constraintsLimits tool adoption & peoplePhased tooling; focus on high-risk areas

The Way Forward

Adopt a data-centric and risk-based privacy strategy that combines strong governance, automated privacy operations, AI-enhanced compliance management, integrated incident response, transparent customer communication, comprehensive vendor oversight, scalable platform adoption, and continuous education.

Action:

Build a 90-day roadmap with milestones for governance, inventory, DSAR readiness, and one pilot automation.

The Privacy Framework must evolve with technology, regulation, and threats. It should be continuously measured, reviewed, and improved, and must be considered a strategic asset that enables business trust and sustainable growth.

Action:

Set up a monthly privacy KPI dashboard β€” include metrics like DSAR turnaround, PIA completion rate, and third-party control score.

Frequently Asked Questions (20)

Quick answers and guidance for executive and operational teams. The grid uses a 10x2 layout for clarity.

Action:

Select 5 FAQs relevant to your org and prepare short internal answers for stakeholder review.

1. What is a Privacy Framework?

A structured set of policies, processes, and controls to protect personal information across its lifecycle.

2. How does Privacy differ from Security?

Privacy focuses on lawful & ethical use of personal data; security provides the technical and operational safeguards.

3. What is PIA / DPIA?

Privacy Impact Assessment (PIA) or Data Protection Impact Assessment (DPIA) identifies privacy risks for projects/processes.

4. Which laws should global companies watch?

GDPR, CCPA, LGPD, PDPA, PIPEDA, APP and sectoral laws like HIPAA or GLBA.

5. What is Privacy-by-Design?

Embedding privacy into systems and processes from inception rather than as an afterthought.

6. How to handle DSARs efficiently?

Use portals, automation, identity validation, and standardized fulfilment workflows.

7. When is consent required?

Consent is required when processing lacks another valid legal basis or where explicit opt-in is mandated by law.

8. How often to review privacy policies?

At least annually, and whenever there is a significant product, legal, or operational change.

9. What role does AI play in privacy?

AI amplifies data processing risks and requires additional governance, explainability, and model monitoring.

10. How to prioritise privacy risks?

Use impact-likelihood scoring and focus on high-impact, high-likelihood scenarios first.

11. Is compliance enough?

No β€” compliance is a baseline. Operational readiness and culture are required for real protection.

12. How to manage third-party risk?

Contractual clauses, regular audits, data flow mapping, and continuous monitoring are essential.

13. What metrics track privacy health?

DSAR turnaround, PIA completion rate, incidents resolved, third-party control score, and training completion.

14. How to respond to a breach?

Follow your incident response plan: contain, assess, notify regulators & data subjects as required, remediate, and learn.

15. What is Data Minimization?

Collect only what is necessary and retain it no longer than required for the purpose.

16. How to handle cross-border transfers?

Use approved transfer mechanisms, SCCs, or ensure adequacy decisions where applicable.

17. Which tools help scale privacy?

OneTrust, BigID, Consent Management Platforms, DLP, and specialized DSAR tools.

18. How to integrate privacy in product dev?

Use privacy checklists, threat modelling, and mandatory PIAs for high-risk features.

19. How to train employees on privacy?

Micro-learning, role-based training, simulated DSAR exercises, and phishing/incident drills.

20. What is the ROI of privacy?

Reduced incident cost, improved customer trust, brand differentiation, and regulatory fines avoidance.

Built for: Privacy Framework review β€’ Last updated: Dec 2025 β€’ Designed by Hermit Crab

Keeping Security & GRC at the Forefront: Practical Guide

Keeping Security & GRC at the Forefront: Practical Guide

Keeping Security & GRC at the Forefront: Practical Guide

In today’s dynamic threat landscape β€” where cloud adoption, remote work, AI-driven attacks and stringent regulations are the norm β€” organisations must embed Security and GRC (Governance-Risk-Compliance) into every layer of business operations. This guide offers a comprehensive yet practical roadmap to help you design, deploy and sustain a resilient security posture combining rigorous governance, risk-based controls, and audit readiness.

Governance Risk Management Compliance Security Controls Monitoring & IR Culture & Awareness Integrated GRC + Security Framework

1. Governance as the Foundation

Governance defines the strategic framework for security and compliance β€” ensuring that every initiative aligns with business objectives, regulatory commitments, and corporate policy. It sets the tone from leadership downward, determining how risk is accepted, mitigated, or transferred, what standards apply, and who owns what. Without robust governance, even the best security tools and audit processes remain fragmented and ineffective.

A well-structured governance model codifies responsibilities for risk owners, compliance owners, control owners, and audit managers. This clarity ensures accountability, standardizes decision-making, and enables measurable control performance across the organization.

2. Risk Management β€” Proactive & Dynamic

Risk management helps organisations anticipate and prioritize threats rather than react to incidents after they happen. Modern risk management frameworks consider evolving factors β€” cloud adoption, supply-chain dependencies, third-party vendors, and the rapid rise of AI-powered threats β€” to evaluate what could go wrong, how likely it is, and how severe the impact would be.

Risk Management Life Cycle

StageDescription
Risk IdentificationSpot possible threats: cyber attacks, data leaks, vendor failures, regulatory fines.
Risk AnalysisAssess likelihood + impact (qualitative or quantitative).
Risk EvaluationCompare risks against organisational tolerance or risk appetite.
Risk TreatmentMitigate, transfer, accept, or avoid the risk via controls or process changes.
Continuous MonitoringTrack Key Risk Indicators (KRIs), re-evaluate after major changes (cloud, AI, vendor changes).

Embedding risk management into everyday operations β€” from project planning to technology adoption β€” helps organisations stay resilient. As new threats emerge (like AI-driven ransomware or supply-chain risks), a living risk register becomes the strategic asset.

3. Compliance That Builds Trust & Enables Growth

Compliance used to be viewed as a checkbox for audits, but in modern businesses it’s a competitive differentiator. Achieving and maintaining standards such as ISO 27001, GDPR/DPDP, PCI-DSS or SOC 2 enhances customer trust and unlocks new markets β€” especially when dealing with global clients.

A compliance program acts as a documented guarantee: employees follow defined processes, controls are regularly tested, and evidence is available for internal and external audits. This ensures organisations stay audit-ready, avoid penalties, and maintain credibility with partners and regulators.

Core Benefits of a Strong Compliance Program

BenefitWhy It Matters
Customer & Partner TrustClients share sensitive data only if compliance standards are demonstrable.
Operational DisciplineStandardized controls reduce human error and enforce consistent practices.
Regulatory ReadinessHelps adapt quickly to changing laws and cross-border regulations.
Market AdvantageCertifications strengthen proposals during tenders and vendor evaluations.

4. Security Controls β€” The Active Defense Layer

Security controls are the real-world mechanisms that protect data, infrastructure, and users β€” from on-prem servers to cloud workloads and remote endpoints. They form the active defense layer that complements risk assessments and compliance policies.

Categories of Security Controls

TypeDescriptionExamples
PreventiveStop threats before they happen.Firewalls, MFA, patch management, least privilege access
DetectiveDetect suspicious or malicious events in real-time.SIEM, IDS/IPS, log monitoring, anomaly detection
Corrective / RecoverRespond and recover from incidents or control failures.Backups, disaster recovery, incident response plans

In 2025 and beyond, many organizations are integrating **AI-driven security tools**, behavioral analytics, and automated detection β€” combining human oversight with machine speed to defend against advanced threats. :contentReference[oaicite:0]{index=0}

5. Continuous Monitoring & Incident Response β€” Always On

Threats evolve rapidly. Cloud misconfigurations, AI-powered malware, supply-chain compromises – these don’t wait for quarterly audits. Continuous monitoring ensures that you have real-time visibility into system health, deviations, or suspicious activities, enabling quick response and mitigation.

A well-defined Incident Response Plan (IRP) ensures clear roles, escalation paths, communication protocols and recovery procedures. Post-incident reviews feed back into risk management, compliance updates, and controls refinement β€” creating a feedback loop that improves cyber resilience over time.

6. People, Culture & Awareness β€” The Human Firewall

Even the most advanced tools and controls fail if users are unaware, untrained, or complacent. A strong security culture transforms security from a top-down mandate into a shared team responsibility.

Awareness programs, phishing simulations, regular training, and embedding security in everyday workflows makes compliance and risk-based controls part of the organizational DNA. This reduces human error, insider risks, and strengthens overall resilience.


Conclusion

Building a comprehensive GRC and security program isn’t just about ticking boxes β€” it’s about embedding resilience into your organization’s DNA. By combining strong governance, dynamic risk management, compliance, security controls, continuous monitoring, and a security-first culture, you build robust cyber resilience. In a world where cloud, remote operations, AI-driven threats, and evolving regulations define the landscape, this integrated approach becomes the backbone of sustainable business growth.

Start today: map your critical assets, classify risk levels, assign control owners, and define basic security & compliance processes. Even small steps taken consistently are better than large efforts done occasionally.

Frequently Asked Questions – Security & GRC
1. What does β€œKeeping Security & GRC at the forefront” actually mean? It means designing every business process with security and governance controls embedded from Day 1 to reduce risks, improve compliance, and strengthen decision-making.
2. Why is GRC important for modern organizations? GRC ensures consistent governance, reduces compliance violations, aligns risk with business goals, and protects the brand reputation.
3. What is the role of continuous monitoring in GRC? It provides real-time visibility into threats, control failures, policy deviations, and compliance gaps for faster decisions.
4. How does automation help in GRC? Automation reduces manual audits, eliminates data entry errors, accelerates risk assessments, and improves control reporting accuracy.
5. What frameworks support strong GRC programs? ISO/IEC 27001, ISO/IEC 42001, NIST CSF, SOC 2, COBIT, and GDPR form the backbone of most corporate governance structures.
6. How does GRC support cyber-resilience? GRC integrates risk management, incident response, disaster recovery and ensures organizations remain operational during cyber events.
7. What is the difference between Governance and Compliance? Governance defines β€˜how decisions are made’; compliance ensures those decisions follow internal policies and external laws.
8. Why is risk assessment so important? Risk assessment identifies vulnerabilities, attack surfaces, and business impacts, enabling prioritization of controls and budget.
9. How does AI enhance GRC? AI improves anomaly detection, accelerates audits, automates documentation, and predicts risks using behavioural analytics.
10. What is the significance of internal audits? Internal audits validate control effectiveness, ensure policy adherence, and prepare organizations for external certification audits.
11. Why should security posture be continuously updated? Threats evolve daily, so updating controls, patching systems, and reviewing risks ensures organizations stay protected.
12. What final steps ensure long-term GRC maturity? Regular audits, policy refresh cycles, leadership reporting, business continuity planning, and culture training maintain maturity.

13 of the Best Forsythia Varieties for Glorious Spring Color

7 December 2025 at 11:30

Forsythia is a deciduous shrub with bright yellow flowers that have become synonymous with spring. One of the earliest shrubs to bloom, it is sure to chase the winter blues away. Learn about 13 of the best forsythia varieties and choose your favorites, for sturdy plants that will reward with vivid color. Read more now.

The post 13 of the Best Forsythia Varieties for Glorious Spring Color appeared first on Gardener's Path.

Week in Review: Most popular stories on GeekWire for the week of Nov. 30, 2025

By: GeekWire
7 December 2025 at 11:00

Get caught up on the latest technology and startup news from the past week. Here are the most popular stories on GeekWire for the week of Nov. 30, 2025.

Sign up to receive these updates every Sunday in your inbox by subscribing to our GeekWire Weekly email newsletter.

Most popular stories on GeekWire

6 retro Unix platforms that shaped the Linux we know today

7 December 2025 at 12:00

Today, downloading a free Unix-like system for a PC or a single-board computer like a Raspberry Pi is routine. In the late '80s and early '90s, as computer hardware improved, these systems brought Unix power down from minicomputers and workstations to the personal level before the arrival of Linux.

Why your tech-savvy friends secretly hate these 5 Christmas gifts

7 December 2025 at 11:31

Christmas is coming, the goose is getting fat. Most of my friends and relatives know that I'm a self-confessed geek and will often buy me tech gifts that they're sure I'll love. Sometimes, however, they would have been better off saving their money. If you're looking to buy something for a tech lover, please don't get them these gifts.

Dogecoin’s Dozen Years: King Of Meme Coins Marks 12th Birthday In Rough Markets

7 December 2025 at 12:00

Dogecoin has just celebrated its 12th anniversary, a milestone that arrives during a period of shaky price action. The meme coin has spent the majority of recent days trading with a bearish tone, but its anniversary places into perspective how much the crypto environment has changed since the token’s joke-related launch in 2013.Β 

The celebration comes as analysts continue to debate whether Dogecoin’s long accumulation structure is nearing a turning point, and its next breakout might define its 13th year.

A Milestone That Shows How Far Dogecoin Has Come

Dogecoin began as a lighthearted project by developer Billy Markus and Adobe sales employee Jackson Palmer in order to poke fun at the rising popularity of Bitcoin at the time. Over the years, what started as a joke has grown into one of the world’s most recognized cryptocurrencies.Β 

Happy birthday to Dogecoin.

12 years and going. pic.twitter.com/n9Qg6KtfQU

β€” dogegod (@_dogegod_) December 6, 2025

At its peak on May 8, 2021, DOGE reached an all-time high of $0.73 with a market capitalization nearing $88.7 billion. Today, despite the recent price action, Dogecoin is still among the top 10 cryptocurrencies, with a market value around $22.5 billion and trading near $0.14.

The 12th birthday of Dogecoin came at a time when broader market sentiment is weak and investors remain cautious. On its anniversary, Dogecoin dropped by 3.1%, steeper than the general market dip, due to ongoing pressure on meme coins.

Amidst this, some milestones still stand out. The introduction of a Spot Dogecoin ETF shows this transformation more vividly than anything else, because it shows major financial players now view the meme coin as an asset worthy of structured, regulated investment exposure.Β 

Although early participation has been modest, the token’s entry into ETF territory is much more symbolic, as it represents a profound departure from the ecosystem that shaped its early years, and this could lead the cryptocurrency to new all-time highs in the coming months.Β 

What The 12th Year Means For Dogecoin’s Future

Reaching 12 years isn’t just a symbolic milestone. It illustrates Dogecoin’s longevity in a crypto environment where many cryptocurrencies fade quickly. The fact that Dogecoin still holds a top-tier market position suggests resilience. That resilience is now being echoed on-chain, as some of the largest Dogecoin wallets have begun adding to their balances again after activity recently fell to a multi-month low.

There are rumors that the updated internal code of Tesla’s website contains deeper Dogecoin payment mechanisms for electric cars like the Model 3 and Cybertruck, which is possibly related to the announced XMoney payment system on the X platform.Β 

This naturally circles back to the influence of Elon Musk, whose support has shaped Dogecoin’s public profile for years. The billionaire has consistently kept Dogecoin in the mainstream conversation through social media posts, product references, and earlier acknowledgments of Dogecoin-related payments for Tesla merchandise.

As for Dogecoin’s price outlook, many analysts are staying bullish. Predictions and price targets for the meme coin range from $0.75, to $1.30, with some pointing to ranges as high as $10.Β Β 

Featured image from Pexels, chart from TradingView

SNL free sample sketch has Melissa McCarthy crossing Jeremy Culhanes boundaries

7 December 2025 at 10:59
woman in purple sweater stands next to man in white shirt and red apron

Melissa McCarthy served up some of her classic physical comedy in a new Saturday Night Live sketch about what happens when a sales associate is just really, really nice to you on a particularly bad day.

Playing a severely touch-starved and jealous suburban woman, McCarthy doesn't quite know how to respond to cast member Jeremy Culhane's kindly grocery store employee, who has just handed her some soft and tasty Raclette. McCarthy, the owner of a pack of ill-behaved dogs, gives Culhane a family heirloom, pats him with soft caresses, and violates several other HR policies, all in the name of a little bite of cheese. I get it.

Melissa McCarthy takes the Christmas spirit too far in SNL sketch

7 December 2025 at 10:51
elderly woman looking outside a living room window with smile on her face.

The spirit of Christmas has taken over 30 Rock, and this week'sΒ Saturday Night LiveΒ host, Melissa McCarthy, joined in with a sketch about spreading joy through acts of kindness.

Well, kind of.

Following her young neighbor's heartwarming decision to shovel her snowy path, McCarthy β€” the elderly, seemingly innocuous grandma next door β€” decided to return the favor, with a series of gifts that escalate in terrifying, hilarious ways.

A bully (Marcello Hernandez) hog-tied on the front lawn, two women and a pimp on the doorstep, a gun in a nicely-wrapped box β€” it's like some kind of messed-up Grinch fable. Grandma might be a psychopathic killer, but her misguided attempts are still spreading holiday cheer.

New FreeBSD 15 Retires 32-Bit Ports and Modernizes Builds

7 December 2025 at 11:34
FreeBSD 15.0-RELEASE arrived this week, notes this report from The Register, which calls it the latest release "of the Unix world's leading alternative to Linux." As well as numerous bug fixes and upgrades to many of its components, the major changes in this version are reductions in the number of platforms the OS supports, and in how it's built and how its component software is packaged. FreeBSD 15 has significantly reduced support for 32-bit platforms. Compared to FreeBSD 14 in 2023, there are no longer builds for x86-32, POWER, or ARM-v6. As the release notes put it: "The venerable 32-bit hardware platforms i386, armv6, and 32-bit powerpc have been retired. 32-bit application support lives on via the 32-bit compatibility mode in their respective 64-bit platforms. The armv7 platform remains as the last supported 32-bit platform. We thank them for their service." Now FreeBSD supports five CPU architectures β€” two Tier-1 platforms, x86-64 and AArch64, and three Tier-2 platforms, armv7 and up, powerpc64le, and riscv64. Arguably, it's time. AMD's first 64-bit chips started shipping 22 years ago. Intel launched the original x86 chip, the 8086 in 1978. These days, 64-bit is nearly as old as the entire Intel 80x86 platform was when the 64-bit versions first appeared. In comparison, a few months ago, Debian 13 also dropped its x86-32 edition β€” six years after Canonical launched its first x86-64-only distro, Ubuntu 19.10. Another significant change is that this is the first version built under the new pkgbase system, although it's still experimental and optional for now. If you opt for a pkgbase installation, then the core OS itself is installed from multiple separate software packages, meaning that the whole system can be updated using the package manager. Over in the Linux world, this is the norm, but Linux is a very different beast... The plan is that by FreeBSD 16, scheduled for December 2027, the restructure will be complete, the old distribution sets will be removed, and the current freebsd-update command and its associated infrastructure can be turned off. Another significant change is reproducible builds, a milestone the project reached in late October. This change is part of a multi-project initiative toward ensuring deterministic compilation: to be able to demonstrate that a certain set of source files and compilation directives is guaranteed to produce identical binaries, as a countermeasure against compromised code. A handy side-effect is that building the whole OS, including installation media images, no longer needs root access. There are of course other new features. Lots of drivers and subsystems have been updated, and this release has better power management, including suspend and resume. There's improved wireless networking, with support for more Wi-Fi chipsets and faster wireless standards, plus updated graphics drivers... The release announcement calls out the inclusion of OpenZFS 2.4.0-rc4, OpenSSL 3.5.4, and OpenSSH 10.0 p2, and notes the inclusion of some new quantum-resistant encryption systems... In general, we found FreeBSD 15 easier and less complicated to work with than either of the previous major releases. It should be easier on servers too. The new OCI container support in FreeBSD 14.2, which we wrote about a year ago, is more mature now. FreeBSD has its own version of Podman, and you can run Linux containers on FreeBSD. This means you can use Docker commands and tools, which are familiar to many more developers than FreeBSD's native Jail system. "FreeBSD has its own place in servers and the public cloud, but it's getting easier to run it as a desktop OS as well," the article concludes. "It can run all the main Linux desktops, including GNOME on Wayland." "There's no systemd here, and never will be β€” and no Flatpak or Snap either, for that matter.

Read more of this story at Slashdot.

❌
❌