Windows Virtual Desktop preview goes public

Angled Microsoft logo

Back in September last year Microsoft announced the launch of its Virtual Desktop to allow Windows to be run in the cloud.

At the time, however, it was only a private preview. Today the public preview launches, so anyone with an Azure subscription can try out the service.

Continue reading

Microsoft brings its Windows Defender antivirus software to Mac

Microsoft Defender for Mac

In February, Microsoft announced Microsoft Threat Experts, a new service within Microsoft 365 Security designed to better protect businesses.

Today, the software giant extends its endpoint protection platform to Mac, and in keeping with that move renames the Windows Defender ATP platform to Microsoft Defender ATP.

Continue reading

SoftNAS vulnerability lets attackers bypass authentication

cloud lock

Researchers have uncovered a vulnerability in the SoftNAS Cloud data storage platform that could be used to gain access to the webadmin interface without valid user credentials.

Security technology company Digital Defense found the previously undisclosed vulnerability which arises if customers have not followed SoftNAS deployment best practices and have openly exposed SoftNAS StorageCenter ports directly to the internet.

Continue reading

Insider threats pose the biggest security risk

insider threat

According to a new study 91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions including Google Drive, Gmail and Dropbox.

The report from SaaS operations management specialist BetterCloud also shows 62 percent of respondents believe the biggest security threat comes from the well-meaning but negligent end user.

Continue reading

Organizations not effective at getting value from their data

folder stack

Businesses increasingly understand that staying competitive means making smart use of their data. But a new survey from Syncsort finds that just nine percent of respondents say their organization is 'very effective' at getting value from data while 48 percent responded 'somewhat effective'.

Making data accessible to users across the enterprise is the third most cited IT challenge and only half call their organization effective in getting data insights to business users.

Continue reading

How edge computing is making 5G possible [Q&A]

5G

This month, Verizon announced its intention to increase its use of edge computing technology, having tested edge functions in its 5G network in Houston resulting in massively decreased network latency.

This move is another example of how new technologies will enable and extend digital transformation projects at the edge, and this is only the beginning.

Continue reading

Addressing the skills gap with advanced web attack training now available online

training key

There is a shortage of cybersecurity professionals and coupled with the exponential growth in web applications used within businesses and by consumers around the world, there's a growing risk of flaws being exploited.

To combat this problem penetration testing specialist Offensive Security is making its Advanced Web Attacks and Exploitation (AWAE) training available as an online course.

Continue reading

Analysis of Remote Access Trojans helps understand third-party business risk

Recorded Future RAT header

Remote Access Trojans (RATs) are often used to steal information from enterprise networks. By looking at network metadata, analysts at threat intelligence firm Recorded Future have been able to identify RAT command-and-control (C2) servers, and more crucially, which corporate networks are communicating to those controllers.

This offers insight about third-party organizations that Recorded Future clients can use to get a better understanding of potential third-party risk to their own data.

Continue reading

What is a zombie (comatose) server, and why should I care?

zombie

Whatis.com states that "a zombie server is a physical server that is running but has no external communications or visibility and contributes no compute resources, that it consumes electricity but is serving no useful purpose."

In a time when a server was dedicated to running a particular application or performing a specific function such as the late 1990s or early 2000s, this definition of a "zombie" made sense. Generally speaking, zombie servers happened because they were forgotten, or never configured for the purpose for which they had been acquired (a dirty secret of the IT industry). In many cases, once plugged in, the server operating systems never allowed these servers to enter their sleep state, for fear that they would be too slow to respond. Identifying these systems as zombies was relatively easy -- their power consumption was constant (a flat line).

Continue reading

New platform helps enterprises to deploy and manage microservices networking

Microservices

More and more organizations are moving to a cloud-native, microservices architecture. But doing this at scale can be challenging as businesses lose the ability to trace, debug, and ultimately manage rapidly proliferating services.

New company Tetrate is aiming to shake up the microservices networking market by combining the best of open source technologies with enterprise-grade extensibility, scalability, and performance.

Continue reading

Employees waste two hours a day searching for data

data search

According to new research from data protection specialist Veritas Technologies, employees are losing two hours a day searching for data, and data management challenges are costing businesses as much as $2 million a year.

On the other hand the study of 1,500 IT decision makers across 15 countries, carried out by Vanson Bourne for Veritas, shows organizations that invest in effective day-to-day management of their data have reported cost savings and better employee productivity as a result.

Continue reading

Microsoft to start selling Windows 7 Extended Security Updates from April 1

Windows 7 Professional

While Windows 10 enjoys a significant and growing userbase, there are still many Windows 7 users out there. This includes a large number of enterprise users, and for these customers security is of paramount importance.

Last month we learned about the pricing for Windows 7 Extended Security Updates (ESU) which will be available when support for the aging operating system ends in 2020. Now we know that ESU will go on sale from the beginning of next month.

Continue reading

Creative destruction: Using data skills to rethink business cultures

Datacenter

Data should underlie every business decision. Yet too often some very human cultural artifacts really lead the business down certain routes where it moves away from modelling decisions on the best data. It’s only human. Yet to be a better human guiding the corporate machine we need to transcend the way "we’ve always done it".

In the data age gut, tradition, and inertia shouldn’t be why strategic decisions are made. And yet, hand on heart, we all continue to do it, because that’s part of being human. Well, it’s time to be more than human, time to get creative. Time to smash the way "we’ve always done it." Time to apply some creative destruction to break down the worst parts of making decisions within organizations, and start using the data, technology, and creativity that lies around us, untapped.

Continue reading

How the tech industry is becoming more attractive to women

Female developers

It won't have escaped your notice that today is International Women's Day. The technology sector has traditionally been a male dominated one, but it seems that efforts to attract more women are paying off.

Analysis from Eclat Marketing of speakers at last week's RSA Conference shows a 53 percent increase in female speakers, with 232 compared to 153 in 2018.

Continue reading

New tool aims to improve the effectiveness of workforce communication

communication

At a time when there's intense competition in the jobs market, the importance of workforce communication in employee engagement is often overlooked.

San Francisco-based communications platform SocialChorus is launching a new tool called Content Planner that gives organizations a single place to plan their content strategies and measure the impact of employee communications.

Continue reading

Load More Articles