- Welcome Guest
- Sign In
Sundar Pichai, CEO of Google and parent company Alphabet, called for government regulation of artificial intelligence technology in a speech at Bruegel, a think tank in Brussels, and in an op-ed. There is no question in Pichai's mind that artificial intelligence should be regulated, he said. The que...
Cybersecurity risks for 2020 stretch far beyond the alarming spike in ransomware. In addition to the daily concerns of malware, stolen data, and the cost of recovering from a network intrusion, there is the very real danger of nefarious actors using cyberattacks to interfere with the 2020 U.S. gener...
If you're a small business owner or a key member of an enterprise executive team, you want your firm to succeed. If you're a customer, you want to be treated well. Those goals are not diametrically opposed, but very often it seems that companies and customers are at cross-purposes. ECT News Network ...
Apple and the DoJ are at it again. This time it's over cracking a brace of iPhones owned by the Saudi Air Force cadet who killed three sailors in a shooting spree last month at the naval air station in Pensacola, Florida. At a news conference to announce the findings of an investigation into the Pen...
After 10 years of fully supporting Windows 7, Microsoft ended its official support for the out-of-date Windows operating system on Tuesday. The popular classic Windows 7 OS still runs on some 200 million PCs around the globe, according to industry estimates. Users include small business owners, some...
As most security pros know, application containers -- Docker, rkt, etc. -- and the orchestration elements employed to support them, such as Kubernetes, are used increasingly in many organizations. Often the security organization isn't exactly the first stop on the path to deployment of these tools.
CES is the show I look forward to returning from, and the primary reason is that getting around Las Vegas during the event is a nightmare. One evening I wanted to go to the In-N-Out Burger place, and even though it was only a mile or two from my hotel, the traffic was so bad that I doubted I'd make...
Ransomware tops the list of cybersecurity threats for 2020. While there have been efforts to convince individuals, corporations, and municipalities not to pay ransoms, the simple fact is that whenever one is paid, the attack becomes a success that encourages cyber thieves to try again. Ransomware at...
If you're turned off by the mere thought of talking heads vying to speak the loudest or the longest in a TV "discussion" of some pressing issue of the day, read on for a refreshing dose of sanity. ECT News Network recruited five smart people with plenty to say about the state of technology, and we g...
Every year I look forward to CES being over. That's not because it isn't interesting -- it is. It's because the place is a nightmare to get around, thanks to some incredibly stupid decisions that turn Las Vegas into a gridlocked mess. Coming right after the holidays, it is oddly timed, ensuring tha...
As we get to the end of December, I typically pick my product of the year, but this is also the end of the decade, so I'll name my pick for this year and then pick my product of the decade.
Google has released an update to its Chrome browser with a slew of new features that are heavy on security. The new version offers improved password protection over earlier versions, real-time phishing protection, and predictive phishing tools. Fifty-one security fixes is high compared with past Chr...
Cybersecurity incident response teams have choices when it comes to communication tools: Microsoft Teams, Slack, Zoom and numerous others. Some require a subscription or commercial license -- others are free. Some are niche tools specifically designed for incident response. Some are generic busines...
Facebook has rejected a request from the U.S., the UK and Australia for a "backdoor" in its encrypted messenger apps to help law enforcement agencies combat crime and terrorism. "Cybersecurity experts have repeatedly proven that when you weaken any part of an encrypted system, you weaken it for ever...