New platform brings together technologies to improve enterprise cybersecurity
Cybersecurity tools are often designed to work in isolation from each other and that can leave enterprise security operations fragmented as well as difficult and expensive to manage.
A new integrated platform called GreyMatter from ReliaQuest, launched today, aims to bring together technologies, processes and teams to provide greater visibility and control over enterprise security operations.
Preparing for the rise of AI in the workforce
The impact of data privacy on the healthcare industry
Healthcare companies are constantly consuming and sharing information to build better patient profiles and improve outcomes. Yet a new report reveals that only 70 percent are very or extremely confident in knowing exactly where their sensitive data is.
The study from data privacy specialist Integris shows that of these 50 percent update their inventory of personal data once a year or less, and a mere 17 percent of respondents are able to access sensitive data across five common data source types.
Google is bringing RCS messaging to users directly instead of waiting for carriers
There has been much talk about SMS successor RCS (Rich Communication Service) over the last year or so, but there has been little in the way of action. But this is about to change.
Seemingly tired of carriers and handset makers dawdling, Google is bringing RCS messaging to Android users in the UK and France. With Google taking control of RCS, the service could become the company's version of iMessage before long, and it means users will be able to experience it sooner than they might have expected.
BitDefender releases free decryption tool for GandCrab ransomware
Security firm BitDefender has teamed up with the FBI, Europol and other agencies and created decryption software that enables ransomware victims to get their data back for free.
The tool can be used to retrieve files encrypted by the GandCrab family of ransomware which is thought to have originated in Russia. GandCrab has been active for around a year and a half, and hundreds of thousands of people have fallen victim to it.
Netflix discovers SACK Panic and other Linux security flaws
A number of Linux and FreeBSD servers and systems are vulnerable to a denial of service vulnerability dubbed SACK Panic, as well as other forms of attack.
A total of three security flaws were discovered by Jonathan Looney of Netflix Information Security. A series of malicious packets sent to vulnerable system is all it takes to crash or slow them down -- a remotely-triggered kernel panic. Patches and workaround have been released to help plug the holes.
Win a Roku Streaming Stick
Smart televisions are kind of... stupid. While TV makers love to advertise all of the integrated streaming services, the truth is, the interfaces are often slow and clunky. Ultimately, it is a much better experience to use a streaming device, such as Amazon Fire TV, Roku, or Apple TV. Hell, connecting your smart TV to the internet could even put your home network at risk!
The best thing about streaming media boxes and sticks, however, is they are typically very affordable. Well, with the exception of the pricey Apple TV. For instance, you can buy a quality Roku Streaming Stick for less than $40. You know what’s better than spending a little money? Spending no money. You see, Roku is giving away five devices (one per winner) to celebrate the summer.
How to center Windows 10 taskbar icons
Microsoft To-Do comes to Mac
Apple makes great hardware and operating systems, but when it comes to applications, the company has plenty of room for improvement. For productivity, Microsoft still reigns supreme. Apple's iWork, for instance, is passable, but it is largely garbage compared to Microsoft Office. Pages, Numbers, and Keynote may look great, but smart professionals will invest in Word, Excel, and PowerPoint -- they are far more powerful. Even the totally free LibreOffice bests Apple's iWork.
With all of that said, macOS users should be very happy that Microsoft supports Apple's operating system. Quite frankly, without Microsoft's excellent productivity software -- such as Office and OneNote -- Mac computers would be far less attractive to power users and professionals. Today, Microsoft brings another fine app to the macOS platform -- To-Do. It is chock-full of useful features, including the ability to add tags/hashtags by simply typing a #.
Feast your eyes on how Apple's iPhone 11 should look
We’ve still got a few months to wait before Apple unveils the follow-up to the iPhone XS, although there have already been a number of leaks and a lot of speculation regarding the next iteration of the iPhone.
It’s believed that Apple will add under-display cameras, allowing for notch-less full screen, introduce reverse-wireless charging -- so users can charge AirPods directly from the handset -- and swap the Lightning connector for USB-C.
The biggest data breaches of the last 15 years
We've become pretty well accustomed to large scale data breaches over recent years. But that doesn’t mean that the numbers involved aren't still significant.
Web hosting comparison site HostingTribunal has put together an infographic looking at the 15 biggest breaches of the last 15 years.
Microsoft advises Azure customers to update Exim to avoid a Linux worm
Genius.com uses clever entrapment technique and accuses Google of stealing song lyrics from its site
Ask Google what the lyrics to a particular song are and the chances are that the search results will display them in an info pane as well as links to lyrics sites. But where does Google get these lyrics from? Have Googlers sat and manually transcribed the words to songs ready or when people search for them?
No. Actually, there's a high chance that Google has simply scraped the lyrics from other sites, and one lyrics website says it caught the company red-handed. Genius.com used "Morse code" to catch the company lifting content directly from its lyric database.
3 attacks you'd miss without AI
There has been a lot of hype around AI to the point where some people are simply tuning it out. I think this is a mistake. While there are limits to what AI can do, there also are sophisticated attacks that we’d miss without it.
The need for AI is driven by three fundamental yet significant changes in the enterprise computing environment.
Humans are still the weakest link in information security
According to a new report, more than half of all C-suite executives (53 percent) and 28 percent of small business owners who suffered a data breach say that human error or accidental loss by an external vendor/source was the cause.
The annual data protection report from information security service Shred-It also finds 21 percent of executives and 28 percent of small business owners admit deliberate theft or sabotage by an employee/insider was the cause of the data breach.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.