How to avoid getting caught in ransomware's crosshairs
Paying off a bad actor for successfully implementing ransomware into an organization is the enterprise equivalent of rewarding a bad child who vandalized a home with candy -- but unfortunately, many organizations often have no choice but to pay… and pay a lot.
Technology has enabled asymmetric attacks. In other words, one attacker can federate an attack across many organizations. The attacker needs to get the attack right once -- while the defenders (corporations, governments, hospitals, etc.) need to get their defense right every… single… time!
Microsoft foists the Surface Duo and its chunky bezels on more countries
The Surface Duo is a pretty cool device on paper. If you aren't familiar, Microsoft essentially connected two Android smartphones using innovative hinges. Why did the company do this? Well, the goal was productivity -- having two apps running simultaneously on two displays would be great for business use (and entertainment).
Unfortunately, Surface Duo doesn't just exist on paper -- it is an actual product. And for the most part, it has been panned by critics. Its software is reportedly buggy and the hardware durability is questionable -- the damn thing develops cracks. Its bezels are large and unsightly, making it look very outdated. There are reports that the camera is horrible too.
How APIs are aiding the healthcare industry in the 21st century
Without a doubt, the pandemic has accelerated digital transformation initiatives, and, in our new remote working environment, enterprises are focusing on how they can continue to provide seamless digital experiences to consumers. To achieve this, APIs are widely recognized as the oil that fuels our digital world, and different types of APIs power the digital mesh to which we are now all connected.
Once considered niche, API technology has now become mainstream and is viewed as an integral part of the day-to-day digital landscape. In fact, according to The Forrester Wave: API Management Solutions, Q3 2020 report, "By opening access to digital business capabilities, APIs drive agility to optimise customer experiences, create dynamic digital ecosystems, achieve operational excellence, and build platform business models."
New account fraud is down partly thanks to selfies
New account fraud based on ID verification declined by 23.2 percent worldwide, year-on-year in 2020 according to a new report from AI-powered identity verification specialist Jumio.
Although selfie-based fraud rates were five times higher than ID-based fraud, this shows the growing number of stolen ID documents available on the dark web and, more importantly, the growing need to determine if an ID is authentic and belongs to the user.
Microsoft is making big changes to Settings in Windows 10
Microsoft has made some very dramatic changes to the look and feel of Windows 10 over the years, and this is not a trend that's set to change any time soon. Continuing its plan to kill off the legacy Control Panel, the company is introducing big changes to Windows 10's Settings app.
The changes will be important to anyone who is keen on customizing or taking control of Windows, giving them two important new options that are sure to be welcomed by power users -- especially those who want to kill off the Task View button.
Software industry turns to crowdsourced security during the pandemic
Among the many things that have changed in 2020 it's proved to be a record year for crowdsourced cybersecurity adoption, according to Bugcrowd.
Enterprises across all industries have been implementing crowdsourced cybersecurity programs to keep up with the evolving threat landscape. Bugcrowd has seen a 50 percent increase in submissions on its platform in the last 12 months, including a 65 percent increase in Priority One (P1) submissions, which refer to the most critical security vulnerabilities.
DDoS attacks up 287 percent as online gaming and gambling become prime targets
A lockdown increase in online gaming activity has inevitably attracted attention from attackers, resulting in nearly 77 percent of cyberattacks targeting the online gaming and gambling industries in Q3 of 2020.
The latest DDoS Threat Report from Nexusguard also reveals a huge 287 percent increase in total DDoS attacks in the third quarter compared to the same period last year.
Plugable releases TBT3-UDC3 Thunderbolt 3 and USB-C docking station with 100W PD
There are so many docks and docking stations nowadays, that it can be hard to get excited about them. Look, I get it, they all pretty much do the same thing -- turn your laptop into a desktop while also charging it. The thing is, not all of them are created equally. In fact, some are much better than others.
With all of that said, Plugable has a new docking station that is worth your attention. Called "TBT3-UDC3," it is compatible with both Thunderbolt 3 and USB-C computers thanks to its use of Intel's Titan Ridge chipset. What makes this port so intriguing (beyond its 11 ports) is its 100 watts of power delivery and affordable price -- especially with a limited time coupon.
COVID-19 highlights barriers to zero trust adoption
With many large enterprises using Active Directory (AD) and Azure Active Directory (AAD) to control user permissions and access, this has become one of first places attackers look for weakness.
Add to this an acceleration of digital transformation projects due to the pandemic and more and more companies are looking to implement zero trust to stay secure. But a new report from One Identity suggests this transition may prove challenging.
Millions of medical images openly available online
The analyst team at digital risk protection firm CybelAngel has discovered that more than 45 million medical imaging files, including X-rays and CT scans, are freely accessible on unprotected servers.
The findings are the result of a six-month investigation into Network Attached Storage (NAS) and Digital Imaging and Communications in Medicine (DICOM), the de facto standard used by healthcare professionals to send and receive medical data.
Microsoft releases Windows 10 Build 20279
Last week, Microsoft released two different Windows 10 builds to the Dev Channel, giving Insiders a chance to choose if they wanted to stay on the FE_RELEASE branch or switch to the more experimental RS_PRERELEASE branch.
For those who stuck with the FE_RELEASE branch, Microsoft now has another new build to try out (those on RS_PRERELEASE won’t get this).
E-merchants: Secure your online sales from cybersecurity threats during Christmas and beyond
The Christmas shopping season is in full swing. This year, online retailers pushed the boundaries with "Black November" in the hopes of improving their online sales, thanks to the uncertainty around in-store shopping due to COVID-19, leading many customers to make their purchases from the safety of their own homes.
As a result, e-commerce merchants have witnessed a significant uptick in users and devices connecting to websites than in recent years.
What cloud transformation means for your legacy systems
With Salesforce purchasing Slack for $27.7 billion and Microsoft Teams reporting over 115 million daily users, the market for collaboration tools is proving that they are here to stay. With the ubiquity of remote work, companies are reliant on sharing data outside of the traditional, on-premises network to reach employees in their homes. Accordingly, for organizations to optimize their communication platforms’ utility, data policies should allow remote access to files. Consequently, lots of organizations have been forced into accelerating their cloud adoption to meet the needs of their remote workforce, leaving the question: what is to become of legacy systems?
While there is a lot of thought being given to new cloud initiatives, this narrow focus can sometimes let legacy data and systems fall by the wayside. Data regulations do not only pertain to the storage of new information, but they also mandate the proper storage of data from recent years past. Consequently, while it is critical during cloud transition to consider how to defensibly govern data remotely, consideration must also be given to how to scrub, remove, change, delete, and recall data in legacy systems as well. If you cannot access user records, personal data, corporate regulatory data, and legal requirements, then simply storing it is pointless as it fails to meet the demands of regulators. As we have recently seen from the EU’s General Data Protection Regulation and the California Consumer Privacy Act, any customer may request that an organization produce their stored personal data, and not meeting these requests can cost millions.
What does the future of shopping hold in the fashion industry?
Over the course of 2020, the way we shop has changed forever. Although many new shopping trends are a direct result of COVID-19 and brands adapting to life in lockdown, countless changes in the fashion industry were already underway. An overwhelming switch to e-commerce, for example, has only been accelerated by the pandemic. Today, over 25 percent of the world's population shops online. The numbers of consumers flocking to landing pages is only set to increase.
With this dynamic shift to online shopping and exciting technological innovations becoming available to brands all the time, the world of fashion and e-commerce is evolving and adapting at an impressive rate. Gone are the days of mass shopping in the traditional way. Instead, brands are utilizing tech to create personal, immersive, and remote shopping experiences. 80 percent of online consumers stating that new tech is improving their shopping experience. So, it appears that the fashion world is certainly heading in the right direction.
Overcoming COVID-19: What finance leaders at recently-funded tech startups have learned so far
There’s no doubt that 2020 has been a testing year for everyone. According to data from PwC, 53 percent of CFOs expect a decrease in revenue and/or profits of up to 25 percent as a direct result of COVID-19. For many tech startups, that’s the difference between staying alive and closing for good.
With such uncertainty in the air, leadership teams have had to act fast and rethink their entire strategy.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.