- Welcome Guest
- Sign In
With billions of dollars of federal contracts at stake, information technology providers are being swept up in the tide of a new U.S. Department of Defense information security requirement that will become mandatory for IT providers and other companies doing business with DoD. While IT companies alr...
Two separate teams of academic researchers have published papers describing flaws in Intel's Software Guard Extensions. SGX enhances application security by letting developers partition sensitive information into enclaves with hardware-assisted enhanced security protection. The aim is to protect app...
U.S. government agencies and cloud technology providers are heading toward a reset in how they cooperate on cybersecurity challenges. The expected growth of cloud use will create a more complex federal security landscape, according to a recent report from Thales Group. Federal agencies actually have...
Microsoft and Intel researchers have found a way to combine artificial intelligence and image analysis to create a highly effective means to combat malicious software infections. The researchers call their approach "STAMINA" -- static malware-as-image network analysis -- and say it's proven to be hi...
In what could be a trial run for more of the same, Red Hat held a first-ever virtual technical summit to spread the word about its latest cloud tech offerings. CEO Paul Cormier welcomed online viewers to the conference, which attracted more than 80,000 virtual attendees. The company made several key...
Canonical has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloa...
Google, Apple and MIT have made headlines with announcements of contact tracing mobile apps in the wings. Their purpose is to identify contacts of people who test positive for COVID-19 so appropriate actions can be taken to stem its spread. However, a Cambridge University professor threw some cold w...
Critical server outages cost businesses an average of $300,000 hourly, with many cases exceeding $5 million. As network demands increase and maximum uptime becomes a necessity, it is crucial to implement the proper processes and systems to ensure organizations constantly are able to mitigate the thr...
In today's evolving business environment, every operational decision is critical -- and that includes best practices for managing the customer journey. The customer relationship management platform is an integral part of the process
A number of VPN and ad-blocking apps owned by Sensor Tower, a popular analytics platform, have been collecting data from millions of people using the programs on their Android and iOS devices, according to a report. The software involved includes Free and Unlimited VPN, Luna VPN, Mobile Data, Adblo...
We've been promised, repeatedly, that AI would revolutionize e-commerce. Has it lived up to expectations? If not, the problem may lie not in the technology you've deployed on your site, but in the architecture and data that support it. The effectiveness of AI-powered features ultimately depends on a...
With the introduction of the CCPA this year and GDPR in 2018, the age of data privacy has begun, bringing the opportunity for businesses to harness it to gain competitive advantage. There are both challenges and opportunities for businesses that aim to deliver superior customer experiences while adh...
One of the old sayings is that there are "lies, damned lies and statistics," with the implication being you really can't trust most reported numbers. Still, we've often thought that you could trust rankings. One current set of rankings involves cloud providers. The general impression was that Amazon...
All eyes are on the West Coast as California reins in the unfettered collection, use and sale of the personal data consumers share as part of the bargain for "free" online services. For years this bargain has been explained in privacy policies that few people read, because there is not a lot of neg...
Social CRM
See all Social CRM