Valve Runs Its Massive PC Gaming Ecosystem With Only About 350 Employees
Yet, surprisingly, the size of the “Steam” department inside Valve has shrunk in recent years, from a peak of 142 employees in 2015 down to just 79 in 2021. From the outside, having just 79 employees keeping track of more than 11,000 Steam releases in 2021 is a pretty incredible ratio. Some readers may also be surprised that Valve’s “Games” department has represented a majority of the company’s headcount since 2003. That has remained true (though to a lesser extent) even in more recent years, as Valve’s output of new games has become much more occasional. It seems likely a large number of those Games department employees are devoted to ultra-popular Valve games like Dota 2 and Counter-Strike 2, which enjoy tens of millions of players and need significant support work.
The leaked data also shows the slow rise of Valve’s small Hardware department, which started with just three employees in 2011 as the company began work on its doomed Steam Machines initiative. Transitioning into the Valve Index era in the late 2010s, the hardware department still represented just a few dozen people and a paltry 3 to 4 percent of the company’s annual payroll. By the time we hit 2021 and the run-up to the Steam Deck, the Hardware division still makes up just 12 percent of Valve’s small total headcount. Looking back, it’s impressive that such a small team was able to create a portable gaming device that quickly spawned a whole micro-industry of imitators. We can only hope the Hardware team got a little more employee support in the wake of the Steam Deck’s market success.
Read more of this story at Slashdot.
UK Nears 1 Million EV Chargers
ChargeUK’s analysis, which was carried out by the thinktank New AutoMotive, suggested that the private sector was confident it could meet a target set by the previous Conservative government of 300,000 public charge points by 2030. “In little more than a decade, the UK’s charging sector has grown to become a major player in the green economy, providing the infrastructure that more than a million EV drivers rely on today and scaling fast to deliver the charging needed through to 2030 and beyond,” said Vicky Read, the chief executive of ChargeUK.
Read more of this story at Slashdot.
Cloudflare Reports Almost 7% of Internet Traffic Is Malicious
The report also highlights the increased importance of application programming interface (API) security. With 60% of dynamic web traffic now API-related, these interfaces are a prime target for attackers. API traffic is growing twice as fast as traditional web traffic. What’s worrying is that many organizations appear not to be even aware of a quarter of their API endpoints. Organizations that don’t have a tight grip on their internet services or website APIs can’t possibly protect themselves from attackers. Evidence suggests the average enterprise application now uses 47 third-party scripts and connects to nearly 50 third-party destinations. Do you know and trust these scripts and connections? You should — each script of connection is a potential security risk. For instance, the recent Polyfill.io JavaScript incident affected over 380,000 sites.
Finally, about 38% of all HTTP requests processed by Cloudflare are classified as automated bot traffic. Some bots are good and perform a needed service, such as customer service chatbots, or are authorized search engine crawlers. However, as many as 93% of bots are potentially bad.
Read more of this story at Slashdot.
Rite Aid Says Breach Exposes Sensitive Details of 2.2 Million Customers
“On June 6, 2024, an unknown third party impersonated a company employee to compromise their business credentials and gain access to certain business systems,” the company said in a filing. “We detected the incident within 12 hours and immediately launched an internal investigation to terminate the unauthorized access, remediate affected systems and ascertain if any customer data was impacted.” Ars Technica’s Dan Goodin reports: RansomHub, the name of a relatively new ransomware group, has taken credit for the attack, which it said yielded more than 10GB of customer data. RansomHub emerged earlier this year as a rebranded version of a group known as Knight. According to security firm Check Point, RansomHub became the most prevalent ransomware group following an international operation by law enforcement in May that took down much of the infrastructure used by rival ransomware group Lockbit.
On its dark web site, RansomHub said it was in advanced stages of negotiation with Rite Aid officials when the company suddenly cut off communications. A Rite Aid official didn’t respond to questions sent by email. Rite Aid has also declined to say if the employee account compromised in the breach was protected by multifactor authentication.
Read more of this story at Slashdot.