New threat monitoring service helps businesses protect their digital footprint

data threat

Traditional cyber defenses are designed to protect assets that exist within an organization's network. But with the growth of the cloud, IoT and more, assets now extend far beyond the network perimeter, increasing the risk of exposure or theft.

FireEye is launching a Digital Threat Monitoring tool that automatically collects and analyzes content on the dark and open web, alerting defenders whenever a potential threat is detected.

Continue reading

Now is the time to embrace Just-in-Time learning

Learning

End user adoption of enterprise software, such as the highly prevalent Office 365, should be a top priority for any IT organization. However, it can sometimes be hard to achieve max adoption through the use of traditional training or eLearning methods alone, which take employees away from their daily tasks for lengthy education sessions. Instead, companies could benefit from implementing tools and policies capable of providing "Just-in-Time Learning" (JITL) that provide workers with answers to their technology questions within their normal workflow. JITL addresses the performance and training needs of the modern technology-focused workplace and the stringent, on-demand information requirements of a rising millennial workforce.

Staying on top of training can be arduous, especially when we consider worldwide spending on information technology is expected to reach near-$4 trillion by the end of 2019 (Gartner). That’s a lot of new tech for employees to learn and leverage, just to get their jobs done. What’s more is that traditional training methods can quickly monopolize annual budgets. In fact, average training expenditures for large companies increased from $17 million in 2017 to $19.7 million in 2018 alone.

Continue reading

Virgin Voyages cruise line lets you order champagne by shaking your phone

shake-4-drink

I'm not a rich man, but I appreciate the finer things in life. For instance, going on cruises is one of my favorite things -- I love to be treated like an important person by the ship's staff for a week or so. I can feel unremarkable for the rest of the year.

Speaking of traveling by sea, Virgin Voyages is a new cruise line from British billionaire Sir Richard Branson. So far, he only has a single ship, but he will undoubtedly expand that if it proves popular. Today, Virgin Voyages announces a fancy feature for those that book travel on its ship -- you can order champagne by shaking your smartphone!

Continue reading

Avoiding expense overpayments in the NHS

UK NHS

With increasing innovation and investment in technology, the UK's National Health Service, the NHS, is currently in the throes of real digital transformation. The move to a paperless NHS is one part of the process that has been well documented but so have the doubts about when it will happen. While many industry voices agree that the NHS needs to cut out the paper, drive efficiencies and harness digital technology, there is a lack of consensus around when this will be achieved -- estimations vary from 2020 to 2027.

However, it’s important to put this into context. As the nation’s single biggest employer, with 1.7 million workers across the UK, the NHS is the fifth-largest workforce in the world. With this size and scale comes a myriad of processes which all need to be automated and digitized, especially for back office functions such as HR and payroll.

Continue reading

New study: Robots might be able to recognize human emotions

Ignore Qualcomm's excitement, the Internet of Things hasn’t arrived in homes Internet of Things IoT

As artificial intelligence, or AI, moves further and further into a future we only dared to dream of before, we now have to find ways to coexist with our robot counterparts.

The robots are shaping up to adapt to our nature in a way only other humans could previously do. Now, we might have robots that are advanced enough to feel the tension in a room.

Continue reading

Microsoft releases Windows 10 20H1 Build 18999 and adds calling to Your Phone

Windows-10 key

The Windows Insider program is currently looking for a new leader, but new Windows 10 builds from the 20H1 branch, due out next May, are continuing to roll out on a weekly basis.

Build 18999 makes the ability to move and resize Cortana’s window available to all Insiders, and calling is now available in the Your Phone app.

Continue reading

'Pass the Hash' attacks highlight need for improved privileged access management

Admin login

Pass the Hash (PtH) attacks which use stolen hashed administrator credentials to breach security are a major risk to businesses.

A new report from One Identity, based on a survey of over 1,000 IT professionals carried out by Dimensional Research, finds 95 percent of respondents say that PtH attacks have a direct impact on their organizations.

Continue reading

Google makes it much easier to shift streaming music and video between devices

Google Home

With more than one Nest device or Google Home speaker in the house, it can be a pain to manually switch music streaming from one speaker to another as you move from room to room.

But now Google has introduced a new feature that makes the process much, much easier. The "stream transfer" option can be accessed with your voice via Google Assistant, or using apps.

Continue reading

Twitter reveals 2FA security data has 'inadvertently been used for advertising purposes'

Twitter on iPhone

Twitter has announced that email addresses and phone numbers provided by users for use with two-factor authentication (2FA) have been "inadvertently" used to deliver tailored ads.

The company says it does not know how many people are affected by the incident, but apologizes for letting private data be used in this way. The timing of the announcement is a little strange. Twitter says that the matter was under control as of September 17, and it is not quite clear why it took three weeks to go public about it -- even though it says "in an effort to be transparent, we wanted to make everyone aware".

Continue reading

Fedora Linux wisely kills 32-bit version

old_computer_32-bit

I fondly remember building my first-ever 64-bit computer with an AMD 3200+ processor. While it seems like only yesterday, the reality is, that was more than 15 years ago! Yes, 64-bit consumer chips have been around that long, showing how asinine it is for operating systems to still support outdated 32-bit hardware in 2019. Shockingly, Microsoft has 32-bit Windows 10, while countless Linux distributions support the antiquated hardware too. Sigh.

Thankfully, the good folks that develop the excellent Fedora Linux distribution have finally had enough. Beginning with the upcoming version 31 of the operating system, i686 32-bit processor support is being dropped by the Fedora Project. While it absolutely is the correct decision, there will undoubtedly be whining from some vocal crybabies in the Linux community. After all, for some Linux users, the act of complaining seems to be a popular pastime.

Continue reading

Google shares top Halloween costumes of 2019 based on search

dog_costumes

Halloween used to be a day for children to collect candy and dress up in costumes, but lately, it seems like adults have hijacked the holiday. More and more grownups are dressing up in costumes -- a trend that is probably due in part to the popularization of nerd culture and events like Comic-Con. Hell, people are even dressing up their pets these days -- something I am guilty of. Don't get me wrong, there's nothing wrong with wearing a costume and having fun, it is just an interesting change culturally.

This year Google is sharing the top Halloween costumes based on search. Personally, I like when Google provides information like this, because the true value in collecting data is being able to tell stories with it. With the search giant slurping up so much data, it would be tragic if it didn't conduct analysis.

Continue reading

Cyberattacks on SMBs becoming more targeted and sophisticated

Attack button

Small and medium sized businesses continue to be a prime target for cybercriminals according to a new study commissioned by password management company Keeper Security from the Ponemon Institute.

It shows that 76 percent of US companies have been attacked within the last 12 months, up from 55 percent in 2016. Globally, 66 percent of respondents report attacks in the same time frame.

Continue reading

Majority of enterprise domains still not protected from email impersonation

Email fraud

Despite growing adoption of DMARC technology, fewer than 10 percent of enterprise email domains are protected from impersonation according to a new report from Valimail.

Valimail found that 850,000 domains worldwide now have DMARC records, a five times increase since 2016. However, fewer than 17 percent of global DMARC records are at enforcement -- meaning fake emails that appear to come from those domains are still arriving in recipients’ inboxes.

Continue reading

Microsoft warns Windows 10 users to upgrade as version 1803 nears end of support

The end

Updates for Windows 10 might have been endlessly problematic of late, but Microsoft is still eager for users to update to the latest version of its operating system.

The company has now started to warn users of Windows 10 version 1803 that their software will soon no longer be supported, and will therefore no longer receive any security updates.

Continue reading

Too many users given access to sensitive information

information shock

Poor privileged access management practices that lead to people having too much access continue to be a critical challenge for many organizations despite significant risks of data breaches and security incidents.

A new report from technology consulting company Sila and the Ponemon Institute surveyed more than 650 North American respondents and finds 70 percent think it likely that privileged users within their organizations are accessing sensitive or confidential data for no discernible business need.

Continue reading

Load More Articles