- Welcome Guest
- Sign In
Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and w...
Earlier this month, a woman with a life-threatening condition passed away after hackers crashed the IT systems of a major hospital in the city of Dusseldorf. Incidents like this raise the question of why corporations do not patch vulnerabilities as soon as software manufacturers issue a fix.
At Microsoft Ignite last week, the breadth and focus that Microsoft demonstrated were arguably well beyond what any other company is capable of doing. This lesson is worth remembering because Microsoft, unlike its peers facing antitrust action, is showing how to become powerful without becoming a th...
Even in these changing times of shuttered shops and pandemic-driven corporate layoffs, a flood of tech jobs goes unfilled due to a lack of Linux skills among IT workers. That combination is contributing to a slowdown or delay in enterprise plans to migrate their local computing base to public cloud ...
Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cyb...
As the next step in its Linux expansion program, Lenovo has launched Linux-ready ThinkPad and ThinkStation PCs pre-installed with Canonical's Ubuntu technology. The company also now brings Linux certification to its ThinkPad and ThinkStation Workstation portfolio, along with easing deployment for d...
Nvidia last week announced they are buying Arm, which will result in some exciting changes. This merger will open up opportunities for the company to create new, innovative, and compelling products across the technology ecosystem. Let's talk about that this week, and we'll close with my product of t...
The stampede from offices to working from home has strained IT security teams to their limits. As a result, SMBs find they need to get more bang for fewer bucks to fight off cybersecurity threats. However, even IT departments with limited resources can implement foundational strategies to address ne...
Computer systems design and related services added 13,000 jobs, according to the U.S. Department of Labor's August jobs report. IT employment in July was up by more than 203,000 positions since the COVID-19 outbreak; and there were more than 235,000 job postings by U.S. employers, according to the C...
Corporate cybersecurity has been increasingly compromised since organizations began implementing work-from-home policies in March as the pandemic continued its spread. In addition to the risks created by increased stress on personnel and depleted staff, IT leaders might be overconfident about the cy...
Tech and finance professionals are joining the ranks of workers in other industries by delaying their return to in-person office work. According to thousands of employees and managers polled about their companies' plans regarding working from home, many U.S. employers have postponed return-to-office...
Since its early inception open source has been embraced by technologists the world over. Let's examine five ways that Fortune 1000 and Global 2000 enterprises can take advantage of open source software to provide technology solutions to the enterprise -- and best practices for corporate IT to cons...
A new coalition is building a low-cost solution to save lives in earthquake-threatened regions, rather than garnishing a profit from a new early-warning system. OpenEEW is an open-source IoT project with the goal to save lives by reducing the cost of earthquake early-warning systems and accelerating...
With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you ha...