- Welcome Guest
- Sign In
More than any other factor, it is our asset that determines the kind of adversary we face. For most of us, our asset is the corpus of sensitive personal details consequent to online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze ...
Canonical has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloa...
Google, Apple and MIT have made headlines with announcements of contact tracing mobile apps in the wings. Their purpose is to identify contacts of people who test positive for COVID-19 so appropriate actions can be taken to stem its spread. However, a Cambridge University professor threw some cold w...
Critical server outages cost businesses an average of $300,000 hourly, with many cases exceeding $5 million. As network demands increase and maximum uptime becomes a necessity, it is crucial to implement the proper processes and systems to ensure organizations constantly are able to mitigate the thr...
As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk. There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't ...
A number of VPN and ad-blocking apps owned by Sensor Tower, a popular analytics platform, have been collecting data from millions of people using the programs on their Android and iOS devices, according to a report. The software involved includes Free and Unlimited VPN, Luna VPN, Mobile Data, Adblo...
We're only two months into a new year and already hundreds of millions of personal records have been compromised, including 123 million employee and customer records from sporting retailer Decathlon and another 10.6 million records of former guests of MGM Resorts hotels. These announcements followed...
We've been promised, repeatedly, that AI would revolutionize e-commerce. Has it lived up to expectations? If not, the problem may lie not in the technology you've deployed on your site, but in the architecture and data that support it. The effectiveness of AI-powered features ultimately depends on a...
One of the old sayings is that there are "lies, damned lies and statistics," with the implication being you really can't trust most reported numbers. Still, we've often thought that you could trust rankings. One current set of rankings involves cloud providers. The general impression was that Amazon...
Cybersecurity and privacy threats aren't confined to the tech world. They've cast their pall on the world in general. Computer viruses, malware and data leaks have become commonplace, personal privacy has become a bad joke, and cyberwar looms like a virtual mushroom cloud. What sometimes gets lost i...
The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. Congress currently is considering a national privacy law that mirrors legislation enacted in the European Union. It would allow people to access...
If you're a small business owner or a key member of an enterprise executive team, you want your firm to succeed. If you're a customer, you want to be treated well. Those goals are not diametrically opposed, but very often it seems that companies and customers are at cross-purposes. ECT News Network ...
Apple and the DoJ are at it again. This time it's over cracking a brace of iPhones owned by the Saudi Air Force cadet who killed three sailors in a shooting spree last month at the naval air station in Pensacola, Florida. At a news conference to announce the findings of an investigation into the Pen...
Ransomware tops the list of cybersecurity threats for 2020. While there have been efforts to convince individuals, corporations, and municipalities not to pay ransoms, the simple fact is that whenever one is paid, the attack becomes a success that encourages cyber thieves to try again. Ransomware at...