Most businesses today that want an app have an app. But having one is not the entire process. The app maker and the business behind the mobile application still need to get it to actually work effectively. Because more people are using apps, many businesses are focusing on the bells and whistles to ...

That old adage about crime never pays could not be more false, at least when it comes to modern-day cybercriminals. For those bad actors using ransomware as their weapon, crime is paying more than ever. A new report by the eSentire security research team found that six ransomware gangs claimed at le...

IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tues...

New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month sp...

For anyone that still believes that Apple can be more than an incredibly profitable company; but one you can also be proud of for how it treats its people and customers, incoming VP of worldwide communications Stella Low could be the critical remedy for what ails the firm. Let's talk about Apple thi...

Advancements in 5G connectivity and accelerated digital transformation of business operations creates heightened risk and expanded attack surfaces for security teams to harden and protect. Now, efforts by several internet industry groups are focused on new measures to fix inherent security weaknesse...

The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted th...

Last week at Dell Technologies World, the most significant announcement was a massive as-a-service offering called Dell Technologies Apex. This promises to return the IT market to its long lost but fondly remembered IBM past. Let's talk about Apex this week. We'll then close with the product of the ...

The software industry fueled jobs and GDP growth in the United States in 2020, according to a report by Software.org: the BSA Foundation. The software industry supported more than 15.8 million jobs in 2020. While the largest concentrations of software jobs remain in traditional tech hubs, such as Wa...

A recent study by Kaspersky revealed that nearly one quarter of PCs still run Microsoft Windows 7, which stopped receiving mainstream support in January 2020. Using an end-of-life operating system that no longer receives security updates is akin to driving a car with a brake light on, suggested Oli...

An ecosystem is being created where cars and robots are autonomous and connected so they will be able to connect to other devices, sensors, and data repositories available to them. Let's explore some safety risks associated with this future connectivity on our roadways. We'll then close with the pr...

Red Hat concluded its April two-day Summit 2021 Virtual Experience with a hefty list of announcements and presentations by the company's innovative customers driving the latest open-source technologies and trends. One of the event's most significant announcements was Red Hat's plan to deliver the fi...

Some 400 million patients worldwide are affected by more than 7,000 rare diseases; yet treatments for rare genetic diseases remain an underserved area. The father of a boy born with a rare disease created the RareCamp project and the OpenTreatments Foundation to enable patients to create gene therap...

Jonathan Cran, founder and CEO of Intrigue, a cybersecurity startup based in Austin, Texas, used his company's network security tools to compile a list of Fortune 500 companies still exposed to last month's Microsoft Exchange breach. Potentially, many of those companies may not know their networks a...

How does the quality of customer service delivered by government compare to that of the private sector?
Loading ... Loading ...

CRM Buyer Channels