- Welcome Guest
- Sign In
IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tues...
New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month sp...
Cybercriminals are deliberately targeting phones, tablets, and Chromebooks to increase their odds of finding a vulnerable entry point. The Financial Services Threat Report from Lookout disclosed that 20 percent of mobile banking customers had a trojanized app on their devices when trying to sign int...
Twitter is adding some new powerful features to its repertoire that users will be able to access for a price. The new premium offering, called Twitter Blue, will allow users to "undo" tweets, as well as create collections of their favorite tweets, according to independent researcher Jane Manchun Won...
For anyone that still believes that Apple can be more than an incredibly profitable company; but one you can also be proud of for how it treats its people and customers, incoming VP of worldwide communications Stella Low could be the critical remedy for what ails the firm. Let's talk about Apple thi...
As the digital health space continues to expand, new opportunities are emerging that enable companies to act in the public good by making healthcare accessible online. Along with the emerging opportunities available in this industry it's important to understand the dynamics that have, historically, ...
Advancements in 5G connectivity and accelerated digital transformation of business operations creates heightened risk and expanded attack surfaces for security teams to harden and protect. Now, efforts by several internet industry groups are focused on new measures to fix inherent security weaknesse...
In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...
The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted th...
If you are looking to expand your sales territory and have not yet put Latin America on your bill of lading, you're missing a golden opportunity. Latin America offers the fastest-growing regional e-commerce marketplace in the world. Last year, the total retail e-commerce sales to the LATAM region gr...
More than 90 percent of U.S. users of the latest version of Apple's mobile operating system iOS 14.5 are taking advantage of a new feature to block an application's ability to track their activity on their phones. Worldwide, 88 percent of users shut down app tracking on their iPhones. This is bad ne...
Last week at Dell Technologies World, the most significant announcement was a massive as-a-service offering called Dell Technologies Apex. This promises to return the IT market to its long lost but fondly remembered IBM past. Let's talk about Apex this week. We'll then close with the product of the ...
Livestream shopping delivers an interactive experience for brands, influencers, or celebrities to promote and sell products and for consumers to participate by asking questions and shopping during the event. The E-Commerce Times checked in with experts in the field to see what's driving this shoppin...
Picking the ideal Linux distribution takes research and planning. Not because Linux is a challenge. Rather, the Linux OS offers a seemingly unending selection of distributions to meet general computing as well as special needs for enterprise, SMBs, and personal use.