Logitech unveils Pebble M350 wireless mouse
A week ago, Logitech launched some new products -- the K580 wireless keyboard and M355 mouse for Chrome OS. While it made sense that the K580 with its specialized Chrome OS keys was designed for Chromebooks and other Chrome devices, many were quick to wonder how a basic mouse could be designed for Google's desktop operating system. It turns out, that was only marketing -- obvious to most seasoned computer users.
To highlight this, today, Logitech announces the exact same mouse in three additional colors -- blue-grey, rose, and off-white. The trio of mice, called "Pebble M350," will work with pretty much any operating system -- including Chrome OS. Just like the M355 (which is a graphite-colored M350, really), these mice offer both Bluetooth and USB dongle wireless connectivity.
The challenges of data analytics in healthcare
The healthcare industry had long embraced traditional data collection methods such as public medical records, inpatient monitoring, or administrative filing systems as the only mechanism for advancing patient-care. But an overpowering trend of collecting data from seemingly disparate and unconnected sources has been recently on the rise. Whether we approve or not, the smartwatches we wear, social media platforms we use, smartphones we carry, and genetic data we bear are slowly but surely painting the future of the healthcare we receive.
But how successful is this trend in delivering on its hopeful promises? And what obstacles are encumbering its progress?
Bugcrowd launches crowd-driven approach to understanding the attack surface
According to a recent Gartner report a third of successful attacks on enterprises will come via shadow It by 2020.
It's therefore more important than ever for organizations to understand the risks and properly assess the attack surface they present. Bugcrowd is launching a new Attack Surface Management (ASM) tool to allow them to do this.
Organizations build 'security debt' by focusing on new flaws
A focus on fixing new issues while neglecting ageing flaws leads to increasing security debt according to a new report.
The study -- the 10th such report from security testing specialist Veracode -- analyzed more than 85,000 applications across more than 2,300 companies worldwide and finds that fixing vulnerabilities has become just as much a part of the development process as improving functionality.
Nok Nok Labs brings FIDO-based authentication to smartwatches
As smartwatches take on more and more functions they are more likely to access business and personal data, so focus turns to their security.
Consumer authentication specialist Nok Nok Labs is launching the industry's first FIDO-based authentication solution for smartwatches in the form of its Nok Nok App SDK for Smart Watch.
IT teams are keen to automate identity management
Managing user accounts involves a range of tasks from access approvals to user credentials, compliance reviews and the perennially popular password reset.
Identity management company SailPoint is releasing results of its annual Market Pulse survey which finds many IT teams don't have enough time to get everything done and are looking to automate identity tasks.
81 percent of consumers would stop engaging with a brand after a data breach
With growing consumer awareness of data breaches and the potential for businesses to misuse data, a new survey looks at how this is affecting behavior.
The study from Ping Identity surveyed over 4,000 people around the world and finds 49 percent of respondents are more concerned about protecting their personal information than they were a year ago.
Microsoft buys cloud migration tool Mover to simplify switching to OneDrive
With a seemingly endless array of cloud storage services to choose from, you may well find that you want to switch allegiances at some point. Jumping from one service to another can be a pain, but with its purchase of Mover, Microsoft has just made it much easier to make the move to OneDrive.
Details of the deal have not been revealed, but Microsoft is keen for people to use the service to migrate from one several supported cloud providers to either OneDrive or SharePoint.
Firefox 70 unveils major privacy reporting tools, promises further performance improvements
Mozilla has released Firefox 70.0 for desktop, along with Firefox for Android 68.2 and Firefox ESR 68.2.0.
Despite the landmark version number, Firefox 70’s most visible change is a refreshed icon and new welcome screen. Better support for your OS’s system dark mode is also unveiled, while Enhanced Tracking Protection (ETP) has now been made the default for all platforms and users.
How will AI disrupt the sales and marketing sector? [Q&A]
The Sales and Marketing (SaM) environment has undergone a fundamental shift over the past decade, driven largely by the proliferation of accessible artificial intelligence (AI) toolsets. According to recent research, 40 percent of marketing and sales teams today recognize the importance of AI, and in particular machine learning (a subset of AI) in ensuring they are able to pursue and accomplish their growth goals.
But what makes this technology so powerful? The answer lies in automation. Namely, AI has the ability to automate tedious, complicated, and time-consuming tasks (which would otherwise be left to SaM professionals), leaving professionals to focus on more value-adding activities such as managing projects and making high-level strategic decisions.
Microsoft teams up with chipmakers to create Secured-core PCs with unhackable firmware
Microsoft is partnering with PC manufacturers and chip-makers on a new initiative designed to make systems with firmware that cannot be hacked.
Called Secured-core PCs, the systems apply the security best practices of isolation and minimal trust to the firmware layer. This helps to protect systems from low-level interference by malicious code.
Apple warns users to upgrade their old iPhones and iPads or face GPS and time issues
Apple has issued a warning to owners of some iPhones and iPads, advising them to update their operating system within the next two weeks. The company warns that devices that do not upgrade iOS will experience problems with GPS and incorrect date and times -- which in turn could cause problems with iCloud, email and other services.
The cut-off date is 12:00 a.m. UTC on November 3, 2019 and Apple is eager for users to upgrade as soon as possible as when the date rolls around it may not be possible for affected devices to receive OTA updates.
Kingston launches KC600 SATA SSD
Believe it or not, there are people still running computers without a solid state drive. With prices so low nowadays, there is really no reason for your operating system to be installed on a mechanical hard drive. Seriously, folks, an SSD is one of the best -- and most cost effective -- upgrades you can make.
Today, Kingston unveils its new line of solid state drives. Called "KC600," the drives are designed for upgrades, as they feature a 2.5-inch form factor and SATA connectivity. In other words, it should be a simple drop-in when removing the old hard drive. Best of all, it is very affordable, with pricing starting under $50!
Enterprises look to replicate the consumer mobile experience -- but circumvent the breaches
Folks involved in enterprise mobility and security have witnessed a long and growing list of breaches of consumer mobile devices. One in three organizations admitted to suffering a compromise due to a mobile device, according to a study by Verizon.
Today, it’s past the time for enterprises to become concerned, and nearing the time to become alarmed, as they’re forced to consider the possibility of similar breaches of the apps and devices they provision for their employees. "The popularity of mobile apps in conjunction with the emergence of their security flaws means that mobile is prime to be the next attack vector that threatens corporate data and user privacy," said Adam Ely, founder and COO of Bluebox. In these circumstances, enterprises have to confront their attitudes, and maybe their complacency, and determine if it’s time for a major overhaul of their mobile initiatives.
Motive doesn't matter: The three types of insider threats
In information security, outside threats can get the lion's share of attention. Insider threats to data security, though, can be more dangerous and harder to detect because they are strengthened by enhanced knowledge and/or access.
Not only is it vital, therefore, to distinguish and prepare for insider threats, but it is just as vital to distinguish between different types of insider threats. A lot has been written about the different profiles for insider threats and inside attackers, but most pundits in this area focus on insider motive. Motive, however, doesn't matter. A threat is a threat, a breach is a breach. A vulnerability that can be exploited by one party for profit can be exploited by another for pleasure, by another for country, and so on. Instead of analyzing motives and reasons, it is far more useful to compare insider threats by action and intent.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.