Microsoft takes security to the Edge with Windows Defender Application Guard

microsoft_logo_magnified

With many cyber attacks now initiated through the browser, endpoint security is something all businesses need to take seriously.

Among today's announcements at Ignite, Microsoft trailed security enhancements across a range of its products, including the Edge browser. Windows Defender Application Guard will be available to Windows 10 Enterprise users from next year and aims to make Edge the most secure business browser.

Continue reading

Russian hacker collective targets over 85 leading US companies

Hacker laptop

A group of hackers speaking Russian and using Russian servers are out hunting for American companies' user credentials, an exclusive story published on The Epoch Times claims.

This group, allegedly not tied to any government and basically operating on its own, is targeting "at least" 85 companies, including Amazon, American Airlines, AT&T, Best Buy, Wells Fargo, DropBox, Dunking Donuts, Ebay, GoDaddy, Uber, Match.com, McDonald’s, Office Depot, PayPal, Pizza Hut, Steam, and Apple Pay.

Continue reading

Failed projects prompt companies to move to cloud analytics

cloud network

While there is huge interest in data analytics among the business community many organizations are struggling with failed projects according to a new study which reveals 88 percent of respondents have suffered failures with recent initiatives.

Reasons for the failure of analytics projects include low end-user adoption, projects going over budget, systems not providing the analytics users were expecting, and too many initiatives evolving into 'zombie' projects that were almost completed but not ready for end-users.

Continue reading

Watch Microsoft's major Ignite keynotes here live

Ignite

Microsoft Ignite, the software giant’s enterprise focused tech event, starts today, September 26, in Atlanta, Georgia.

The five-day event, previously hosted in Chicago, will cover all of the hot tech topics, including cloud, productivity and collaboration, machine learning, and the Internet of Things.

Continue reading

Most employees don't want to share passwords

man beach summer remote work

For many people, both business owners and employees, remote working is the future of business. It’s at the very heart of business transformation, together with cloud computing, automation and artificial intelligence. However, a new poll by OneLogin seems to suggest that certain workers aren’t really fond of the idea of remote working.

Half of full-time workers believe employees below mid-manager level shouldn’t be allowed remote access to the corporate network. This remote access refers to both work-owned devices (47 percent) and private devices (54 percent).

Continue reading

BT to offer customers Microsoft Azure services

Cloud handshake collaboration

British telecommunications company BT has announced  a new offering, expanding the cloud choice for its customers. BT Computer for Microsoft Azure allows BT’s customers to order Microsoft Azure together with BT’s cloud.

With the new offering, according to BT, customers will be able to create hybrid cloud infrastructure with a single service wrap, on a single bill.

Continue reading

Knowing your unknowns

minority report

On a daily basis, the news is filled with stories about things that "should never have happened".  Last weekend’s headline, "Improvised Explosive Device Explodes in New York City’s Chelsea Neighborhood", is one tragic example. No one could have anticipated the attack, but through the use of cameras placed throughout the area, law enforcement was able to identify a suspect and track his movements within hours.

In the real world, no one can know every single threat that could exist in the future, or when it might happen. You can make educated guesses with the right intelligence and data, but you can’t predict with certainty. This is why New York, London, and other metropolitan areas have installed surveillance cameras. They’ve done this so that if a situation does unfold, they can quickly triage and provide authorities with immediate and accurate information to inform response and investigation.

Continue reading

Benchmark report reveals effectiveness of marketing emails

Email magic

Email is still among the most popular ways of delivering marketing messages to customers, but it can be hard to measure how well it works.

A new study from delivery platform SendGrid measures the engagement numbers for the average percentage of male and female recipients, the percentage of emails that are opened on mobile and non-mobile devices, open rates, click rate, click-to-open rates and monthly send rates across 10 industries.

Continue reading

Office workers want the latest technology, or else they'll quit

office workers

Business owners, pay attention. If you don't step up your technology game, your employees might leave you. This is according to a new global report from Dell and Intel, entitled Future Workforce.

Based on a poll of 4,000 full-time employees all over the world, it tried to understand how modern technologies are shaping the office world.

Continue reading

Leaked credentials affect the largest 1,000 organizations worldwide

credential hacker

Data breaches have become the norm in recent years with 2014 earning the nickname the "year of the data breach" and 2015 being known as the "year of the breach". So far in 2016, even more data breaches have been made public, including LinkedIn, MySpace and Dropbox and we will likely see more before the year comes to a close.

For companies, being the victim of a breach is unnerving enough, but there also implications to their reputation, brand and finances. However, breaches also have an indirect impact on organizations and some end up facing the "collateral damage" of such an attack for some time after the initial breach.

Continue reading

More than half of IT pros don't erase data properly

Delete button

A new study reveals that 53 percent of IT professionals use common, but ineffective, methods to erase data on corporate computers, external drives and servers.

The survey by Blancco Technology Group of over 400 professionals worldwide found that 31 percent report dragging individual files to the Recycle Bin and 22 percent reformat the entire drive.

Continue reading

Enterprises are learning from cyber attacks but bad habits persist

Attack protection

A majority of enterprises (79 percent) say they have taken action to improve their security in response to major cyber attacks. However, 40 percent of organizations still store privileged and admin passwords in a Word document or spreadsheet, while 28 percent use a shared server or USB stick.

This is among the findings of the 10th annual Global Advanced Threat Landscape Survey from cyber security company CyberArk which looks at whether organizations are learning lessons from cyber attacks.

Continue reading

Number of data breaches rises by 15 percent

data breach

The number of breaches and their severity are both growing, a new report by digital security company Gemalto is saying.  Titled Breach Level Index, it says there has been 15 percent more data breaches in the first half of 2016, compared to the last six months of 2015.

A total of 974 data breaches were reported worldwide, amassing 554 million compromised data records, in the first half of 2016. It is also interesting that in more than half of cases (52 percent), the number of compromised records were not disclosed at the time of reporting. Looking specifically at the UK, there have been 61 breaches, most of which happened at the government sector (14). Finance and healthcare sectors were close second and third.

Continue reading

Data lake management solution helps stop companies drowning in big data

hand water bye so long goodbye

While businesses are keen to get the benefits of big data, analysts find it hard to harness information across the enterprise and find relationships between data sets.

This can result in labor-intensive manual processes and a pool of unmanageable data that soaks up more and more resources in the quest for something useful.

Continue reading

Adaptiva launches serverless software distribution from the Azure cloud

network connections

Deploying software and updates to computers across a global enterprise from the cloud can be slow and expensive using traditional methods.

Systems management specialist Adaptiva is launching OneSite 6.0, a serverless option for distributing software from the cloud using Microsoft System Center Configuration (ConfigMgr) and Microsoft Azure.

Continue reading

Load More Articles