Get the ECT News Network Editor's Pick Newsletter » View Sample | Subscribe
                    Welcome Guest | Sign In
                    TechNewsWorld.com
                    Salesforce Industries Summit


                    Women in TechWomen in Tech: 20 Trailblazers Share Their Journeys
                    An excellent guide for students considering STEM courses, graduates pondering job choices, and career changers at any stage in life. A useful tool for school and career counselors, recruiters, and HR pros eager to diversify their workplaces. Get the Kindle or Paperback.

                    Controversial Plan Urges DoD to Recruit Tech Pros to WFH
                    October 2, 2020
                    The United States Defense Innovation Board has recommended that the Pentagon hire civilians to work from home who can handle classified information as a way of attracting people with technology expertise. The individuals sought "will have technical degrees and/or highly specialized skills in digital technologies and innovation needed across the U.S. Department of Defense," which is undergoing digital transformation.
                    Cybersecurity Assessment and the Zero Trust Model
                    October 1, 2020
                    Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and when to trust, and acceptable validation methods to confirm a request or transaction is allowed.
                    The Risks and Consequences of Lax Patch Management
                    September 29, 2020
                    Earlier this month, a woman with a life-threatening condition passed away after hackers crashed the IT systems of a major hospital in the city of Dusseldorf. Incidents like this raise the question of why corporations do not patch vulnerabilities as soon as software manufacturers issue a fix.
                    Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?
                    September 24, 2020
                    Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cybersecurity of an IoT network?
                    Do's and Don'ts for SMB Cybersecurity Safety
                    September 17, 2020
                    The stampede from offices to working from home has strained IT security teams to their limits. As a result, SMBs find they need to get more bang for fewer bucks to fight off cybersecurity threats. However, even IT departments with limited resources can implement foundational strategies to address network security issues, and lay the groundwork for future investments.
                    Tech Job Market Hot for the Near Future
                    September 15, 2020
                    Computer systems design and related services added 13,000 jobs, according to the U.S. Department of Labor's August jobs report. IT employment in July was up by more than 203,000 positions since the COVID-19 outbreak; and there were more than 235,000 job postings by U.S. employers, according to the Computing Technology Industry Association.
                    TikTok Enlists Oracle to Evade Trump's Executive Order
                    September 14, 2020
                    A proposal to avoid the banning of the popular social media app TikTok was submitted to the U.S. Treasury Department over the weekend. The plan submitted by ByteDance, which owns TikTok, calls for the company to enlist Oracle as a "trusted technology provider" in order to address national security concerns raised about the video-sharing software by the Trump administration.
                    The Perils of IT Security Hubris
                    September 10, 2020
                    Corporate cybersecurity has been increasingly compromised since organizations began implementing work-from-home policies in March as the pandemic continued its spread. In addition to the risks created by increased stress on personnel and depleted staff, IT leaders might be overconfident about the cybersecurity protocols and procedures they have in place.
                    Reported Data Breaches Decline in H1 2020
                    September 3, 2020
                    Data breaches were rampant in 2019, occurring at an unprecedented pace. However, the first half of this year has seen a reduction in the number of reported events. Reported being the operative word. In all, more than 15 billion records were exposed in nearly 7,100 data breaches last year. This year however, the number of publicly reported data breaches has decreased.
                    Online Business Scams Decline as Consumer COVID Fraud Rises
                    August 26, 2020
                    Online bandits are decreasing their schemes against businesses but increasing COVID-19 scams aimed at consumers, according to a report released Tuesday by TransUnion. Suspected fraudulent digital transactions against businesses worldwide dropped nine percent from the lockdown phase of the pandemic to the reopening phase.
                    Pandemic Gooses Stolen Credentials Prices on Dark Web
                    August 25, 2020
                    After crashing in 2019, Dark Web markets for stolen credentials rebounded during the first half of 2020, largely due to major shifts in consumer behavior caused by the global pandemic. Hacked accounts for delivery services and physical fitness brands are some of the highest priced items on the market, according to a recent report.
                    Return of Remote Workers Brings New Challenges to IT Heads
                    August 18, 2020
                    For those business that got it right reopening their workplaces the first time around, they should be in pretty good shape for round two. But others that struggled to get a handle on operations will likely find themselves again in chaos -- especially where IT is concerned for the transplanted work-from-home employees.
                    Digital Security Is as Easy as PGP
                    August 17, 2020
                    To be sure, there are specialized circles that make regular explicit use of PGP. My aim in treating PGP here is twofold. The first is to shed some light on it for the uninitiated. The second, and more importantly, is to teach the daring among you how to wield this powerful tool.
                    More Consumers Buying Into Digital Payments
                    August 17, 2020
                    As consumers get more acquainted with shopping and banking digitally, it seems logical that more people would be inclined to pay their bills online. A recent survey of more than 3,000 adult consumers shows that nearly 70 percent prefer digital payment options, such as website and mobile app channels, to pay their one-time bills.
                    Digital Sales Boom Puts Spotlight on Fraud Control Systems
                    July 30, 2020
                    The move by retailers to online and mobile selling to survive the pandemic has resulted in a significant increase in digital fraud activity. The "2020 True Cost of Fraud Study: E-commerce/Retail Edition" by LexisNexis Risk Solutions found this to be partly because some fraud control systems are outdated, and partly because of increased transaction volume.
                    Garmin Confirms Services Upended by Ransomware Attack
                    July 28, 2020
                    Garmin on Monday confirmed that many of its online services have been disrupted by a cyberattack on its systems that occurred on July 23, 2020. Services disrupted by the attack, which encrypted data on the systems, included website functions, customer support, customer facing applications, and company communications.
                    The Case Against Full-Disk Encryption
                    July 27, 2020
                    The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't be able to know everything you've got saved on it. I'm here to make the case that most of you are better off not using it.
                    Beware of Counterfeit Network Equipment
                    July 24, 2020
                    Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X series switches. The report highlights challenges facing organizations that discover counterfeit devices in their IT infrastructure.
                    The Past, Present and Future of Attribute-Based Encryption
                    July 21, 2020
                    Encryption is an obscure but critical part of everyday life. That padlock in the address bar of the website you're visiting represents the 's' after 'http' -- which stands for the latest version of Transport Layer Security. Together with Secure Sockets Layer, which TLS replaced, these digital security technologies allow encrypted communication between two parties, such as web sites or servers, and web browsers.
                    Digital Fraud Flourishing During Pandemic: Report
                    July 9, 2020
                    If you conducted e-commerce transactions since the pandemic struck, you have probably been the target, or even a victim, of online fraud. A report from Sift titled "Q2 2020 Digital Trust & Safety Index" details a 109 percent increase in content abuse and growth of the fraud economy from January through May 2020.
                    New DoD Security Regulations Have Ramifications for IT Contractors
                    July 7, 2020
                    With billions of dollars of federal contracts at stake, information technology providers are being swept up in the tide of a new U.S. Department of Defense information security requirement that will become mandatory for IT providers and other companies doing business with DoD. While IT companies already incorporate data protection elements in the products and services they provide to DoD, the department is raising the bar on the way vendors should handle information security.
                    Cybersecurity and Your New Remote Workforce
                    June 30, 2020
                    For most organizations, COVID-19 has been a literal transformative agent. Our organizations have almost overnight gone from environments where teleworking was an exception, to where it's the norm. As any student of human nature will tell you, people tend to view "the new" with reservation. There's a temptation when things are new to assume the worst about them. For security pros, this means we often view new things as riskier than things we're familiar with.
                    Twitter's Security Blunder: More Dangerous Than You Think
                    June 29, 2020
                    Twitter had a data security problem last week that might sound trivial. Email addresses, phone numbers, and the last four digits of the credit cards used to buy ads on Twitter were left in browser cache after the transaction, and that cache was not secured. This may seem trivial, but the consequences could be far more significant than you might think. Let's explore how.
                    Open Source Security Issues Exist: Deal With Them, Report Urges
                    June 25, 2020
                    Open Source Software is becoming much more commonplace within organizations, bringing a different set of risks and perceived challenges compared to closed source or proprietary software. The Information Security Forum has released a report to help security professionals recognize the benefits and perceived challenges of using Open Source Software.
                    Twitter Apologies for Data Security Incident
                    June 24, 2020
                    Twitter on Tuesday notified business clients that their personal information, including email addresses, phone numbers, and the last four digits of their credit card numbers may have been compromised. Self-serve advertisers that viewed billing information on ads.twitter.com or analytics.twitter.com were affected. The issue occurred prior to May 20, 2020. However, Twitter only notified customers about it on June 23.
                    Intel Says 'Tiger Lake' Will Drown Control-Flow Malware
                    June 16, 2020
                    The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legitimate code through control-flow hijacking attacks, which is widely used in large classes of malware.
                    New Flaws in Intel's CPU Software Guard Extensions Revealed
                    June 11, 2020
                    Two separate teams of academic researchers have published papers describing flaws in Intel's Software Guard Extensions. SGX enhances application security by letting developers partition sensitive information into enclaves with hardware-assisted enhanced security protection. The aim is to protect application code and data from disclosure or modification.
                    'New Normal' Security Era Begins for US Agencies, Cloud Providers
                    June 4, 2020
                    U.S. government agencies and cloud technology providers are heading toward a reset in how they cooperate on cybersecurity challenges. The expected growth of cloud use will create a more complex federal security landscape, according to a report from Thales. Federal agencies actually have moved ahead of businesses in cloud adoption, with 54 percent of agency data already embedded in the cloud.
                    How to Stay Safe on the Internet, Part 4: Fighting the Power
                    May 15, 2020
                    Category 2 adversaries are nothing to sneeze at, but their resources are finite. If you armor up enough, they will give up, and move onto an easier comparable target. In confronting the threat of category 3, everything you have learned ratchets up to a whole new level of paranoia. Category 3 adversaries have functionally unlimited resources for pursuing top targets.
                    Abandoned Open Source Code Heightens Commercial Software Security Risks
                    May 13, 2020
                    Outdated or abandoned open source components are persistent in practically all commercial software, putting enterprise and consumer applications at risk from security issues, license compliance violations, and operational threats, concludes the Synopsys 2020 Open Source Security and Risk Analysis Report. The report highlights trends and patterns in open source usage within commercial applications.
                    See More Articles in Cybersecurity Section >>
                    Forrester names NICE inContact CXone a leader in cloud contact center software
                    Do misspellings on a website negatively influence your decision to do business with a product or service provider?
                    Yes -- Spelling errors reflect a lack of attention to detail and diminish my confidence in the provider.
                    Possibly -- One inconspicuous misspelled word is excusable. However, multiple or glaring misspellings are indicators of other problems with the business.
                    No -- If the provider has a product or service I need, their spelling ability is immaterial to my decision to do business with them.
                    Salesforce Industries Summit
                    Forrester names NICE inContact CXone a leader in cloud contact center software
                    Inside TechNewsWorld

                    老师穿旗袍肉丝让我爽翻天