Get the ECT News Network Weekly Newsletter » View Sample | Subscribe
                    Welcome Guest | Sign In
                    TechNewsWorld.com
                    Salesforce Industries Summit


                    Women in TechWomen in Tech: 20 Trailblazers Share Their Journeys
                    An excellent guide for students considering STEM courses, graduates pondering job choices, and career changers at any stage in life. A useful tool for school and career counselors, recruiters, and HR pros eager to diversify their workplaces. Get the Kindle or Paperback.

                    The Risks and Consequences of Lax Patch Management
                    September 29, 2020
                    Earlier this month, a woman with a life-threatening condition passed away after hackers crashed the IT systems of a major hospital in the city of Dusseldorf. Incidents like this raise the question of why corporations do not patch vulnerabilities as soon as software manufacturers issue a fix.
                    Do's and Don'ts for SMB Cybersecurity Safety
                    September 17, 2020
                    The stampede from offices to working from home has strained IT security teams to their limits. As a result, SMBs find they need to get more bang for fewer bucks to fight off cybersecurity threats. However, even IT departments with limited resources can implement foundational strategies to address network security issues, and lay the groundwork for future investments.
                    How to Protect Data From Natural Disasters
                    August 19, 2020
                    With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you have not forgotten that one key thing that many companies forget to protect but regret afterward.
                    Return of Remote Workers Brings New Challenges to IT Heads
                    August 18, 2020
                    For those business that got it right reopening their workplaces the first time around, they should be in pretty good shape for round two. But others that struggled to get a handle on operations will likely find themselves again in chaos -- especially where IT is concerned for the transplanted work-from-home employees.
                    Beware of Counterfeit Network Equipment
                    July 24, 2020
                    Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X series switches. The report highlights challenges facing organizations that discover counterfeit devices in their IT infrastructure.
                    The Current State of Open-Source Testing Tools
                    July 7, 2020
                    Tricentis and three survey project collaborators recently published findings that provide new insights on global trends in open-source testing. The study focused on the open-source tool testing industry, not how or if companies and software developers test their code. The results revealed that a lack of technical skills is the major roadblock to open-source tool adoption.
                    Cybersecurity and Your New Remote Workforce
                    June 30, 2020
                    For most organizations, COVID-19 has been a literal transformative agent. Our organizations have almost overnight gone from environments where teleworking was an exception, to where it's the norm. As any student of human nature will tell you, people tend to view "the new" with reservation. There's a temptation when things are new to assume the worst about them. For security pros, this means we often view new things as riskier than things we're familiar with.
                    Email Scammers Using Old Tricks With New Twists
                    June 26, 2020
                    With much of the workforce conducting business from home to escape the pandemic, scammers have revved up their trickery to scare victims into falling for credential harvesting schemes. Two new reports lay bare the new twists digital scammers are putting on old approaches to get you to unwittingly give up login credentials.
                    Open Source Security Issues Exist: Deal With Them, Report Urges
                    June 25, 2020
                    Open Source Software is becoming much more commonplace within organizations, bringing a different set of risks and perceived challenges compared to closed source or proprietary software. The Information Security Forum has released a report to help security professionals recognize the benefits and perceived challenges of using Open Source Software.
                    Microsoft, Intel Combine Deep Learning and Pixels to Nix Malware
                    May 13, 2020
                    Microsoft and Intel researchers have found a way to combine artificial intelligence and image analysis to create a highly effective means to combat malicious software infections. The researchers call their approach "STAMINA" -- static malware-as-image network analysis -- and say it's proven to be highly effective in detecting malware with a low rate of false positives.
                    Abandoned Open Source Code Heightens Commercial Software Security Risks
                    May 13, 2020
                    Outdated or abandoned open source components are persistent in practically all commercial software, putting enterprise and consumer applications at risk from security issues, license compliance violations, and operational threats, concludes the Synopsys 2020 Open Source Security and Risk Analysis Report. The report highlights trends and patterns in open source usage within commercial applications.
                    Information Security: New Rules
                    May 8, 2020
                    Warren Buffet once said, "Only when the tide goes out do you discover who's been swimming naked." You can cover over a host of sins when times are good, but bad or unsafe practices will be exposed when times are rough. Time and experience have borne out the accuracy of this witticism in the financial arena -- and we're now seeing its applicability to the intersection of infosec and COVID-19.
                    The Tech Industry's Tectonic Shift
                    March 27, 2020
                    As COVID-19 continues to spread, states and cities across the U.S. have imposed restrictions -- from banning large gatherings to lockdowns, with citizens ordered to stay home except for essential jobs and errands, or get outdoor exercise. These steps came as infection numbers mounted, and the World Health Organization stated that COVID-19 was in fact a global pandemic.
                    Loss Prevention 101: Future-Proofing Your Network Begins With Resilience
                    March 20, 2020
                    Critical server outages cost businesses an average of $300,000 hourly, with many cases exceeding $5 million. As network demands increase and maximum uptime becomes a necessity, it is crucial to implement the proper processes and systems to ensure organizations constantly are able to mitigate the threat of outages. A host of factors can cause network or system downtime.
                    COVID-19 and Computer Security, Part 2: Shoring Up Systems for Remote Workers
                    March 19, 2020
                    As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk. There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't compromised by cybercriminals taking advantage of the health crisis.
                    Linux-Powered Azure IoT Security Platform Arrives
                    February 25, 2020
                    After several years of building and testing previews, Microsoft has announced the general availability of its Azure Sphere secure IoT service. Microsoft first introduced Azure Sphere in 2018, opting to use its own version of a Linux operating system instead of Windows 10 to drive its new Azure Sphere OS to securely connect Internet of Things devices.
                    Unsigned Firmware Puts Windows, Linux Peripherals at Risk
                    February 19, 2020
                    Eclypsium has released research that identifies and confirms unsigned firmware in WiFi adapters, USB hubs, trackpads and cameras used in Windows and Linux computer and server products from Lenovo, Dell, HP and other major manufacturers. Eclypsium also demonstrated a successful attack on a server via a network interface card with unsigned firmware used by each of the big three server manufacturers.
                    What's in Your Containers? Try an Open Source Tool to Find Out
                    January 14, 2020
                    As most security pros know, application containers -- Docker, rkt, etc. -- and the orchestration elements employed to support them, such as Kubernetes, are used increasingly in many organizations. Often the security organization isn't exactly the first stop on the path to deployment of these tools. If it was in your shop, consider yourself one of the lucky ones.
                    Tech Firms Join Forces to Create Smart Home Connectivity Standard
                    December 19, 2019
                    Amazon, Apple, Google and the Zigbee Alliance are teaming up on a new Internet Protocol-based standard for smart home device connectivity. Connected Home over IP will be an open source project. A working group will define a specific set of IP-based networking technologies for device certification. The goal is to enable communication across smart home devices, mobile apps and cloud services.
                    Should Discord Be in Your Incident Response Toolbox?
                    December 11, 2019
                    Cybersecurity incident response teams have choices when it comes to communication tools: Microsoft Teams, Slack, Zoom and numerous others. Some require a subscription or commercial license -- others are free. Some are niche tools specifically designed for incident response. Some are generic business communication tools that IR teams have adapted for use during a cybersecurity incident.
                    Amazon Ratchets Up Competition in 5G, Hybrid IT
                    December 5, 2019
                    Among the highlights of Amazon Web Services re:Invent are three announcements that strengthen its presence in the enterprise hybrid IT infrastructure market: AWS is teaming with Verizon to deliver 5G edge cloud computing; the first AWS Local Zone is located in Los Angeles; and AWS Outposts are generally available. These moves "close some huge competitive gaps," observed tech analyst Rob Enderle.
                    Consider Service Mesh as a Security Tool
                    November 26, 2019
                    If you're like most security pros, chances are you're starting to get frustrated with microservices a little -- or maybe a lot. Microservice architectures -- that is, architectures that leverage REST to build a number of small, distributed, modular components -- are powerful from a software architect's point of view. Want to make a change to a component quickly? Add new functionality?
                    5 Things Retailers Can Do Now to Avoid a Cyber Monday Disaster
                    October 29, 2019
                    We may just be turning the calendar to November, but if you're like most retailers, you're already deep into planning for the gift-giving season. Black Friday and Cyber Monday are circled and starred as you anticipate, with a mixture of excitement and trepidation, the spike in sales and massive increase in traffic to your website and mobile app -- with good reason.
                    Adopt a Maintenance Mindset: Protect IT
                    October 18, 2019
                    As part of National Cyber Security Awareness Month, the National Cyber Security Alliance is advising all computer users to "Protect IT" by taking precautions such as updating to the latest security software, Web browser and OS. The nonprofit public-private partnership, which works with DHS and private sector sponsors, advised computer users on ways to protect their personal data.
                    'Serious' Linux Sudo Bug's Damage Potential Actually May Be Small
                    October 16, 2019
                    Developers have patched a vulnerability in Sudo, a core command utility for Linux, that could allow a user to execute commands as a root user even if that root access was specifically disallowed. The patch prevents potential serious consequences within Linux systems. However, the Sudo vulnerability posed a threat only to a narrow segment of the Linux user base, according to Todd Miller, a maintainer of the open source Sudo project.
                    Stop Cyberattacks in Their Tracks: Secure IT
                    October 10, 2019
                    Stopping cyberattacks requires diligent behavior. One of the themes of this year's National Cyber Security Awareness Month, or NCSAM, is that all computer users should take steps to Secure IT. That means shaking up the passphrase protocol by using not just strong passwords but strong and unique passphrases. Everyone should double login protection through multifactor authentication.
                    Tackling Economic Security Governance
                    October 8, 2019
                    If you've ever played chess, you know that each move you make has to be the best move. At one level, this is painfully obvious -- after all, who would choose to make a terrible move instead of a better one? -- but it's illustrative of an important concept. Specifically, the core reason it's true is that each individual move in a game like chess comes with an associated "opportunity cost."
                    Multi-Cloud Strategy May Pose Higher Security Risk: Study
                    September 6, 2019
                    Users of a multi-cloud storage strategy may be twice as likely to face a security breach as those that use hybrid or single clouds, suggests a report from UK-based security specialist Nominet. Fifty-two percent of survey respondents who adopted a multi-cloud approach suffered a data breach over the past 12 months, compared to 24 percent of hybrid cloud users, and 24 percent of single-cloud users.
                    Powerful Enterprise-Class Chromebooks May Make Windows Exit Possible
                    August 27, 2019
                    A new collaboration between Dell Technologies and Google has produced the world's first enterprise-class Chromebook. The companies have announced their partnership to bring new capabilities and services to Dell's Unified Workspace strategy. Google launched its Chrome Enterprise capabilities in 2017 to give enterprises critical features like advanced security protections and fleet management.
                    Cloud Users: Read the Click Agreement Terms
                    August 26, 2019
                    There is no data showing how many people actually read through click agreements, terms of service and privacy policies -- collectively "online terms" -- before clicking the alluring "accept" button. However, there's research that indicates fewer than 1 percent of people report taking the time to review online terms. Most folks consider online terms an annoying speed bump and frankly don't care.
                    See More Articles in Network Management Section >>
                    Forrester names NICE inContact CXone a leader in cloud contact center software
                    Do misspellings on a website negatively influence your decision to do business with a product or service provider?
                    Yes -- Spelling errors reflect a lack of attention to detail and diminish my confidence in the provider.
                    Possibly -- One inconspicuous misspelled word is excusable. However, multiple or glaring misspellings are indicators of other problems with the business.
                    No -- If the provider has a product or service I need, their spelling ability is immaterial to my decision to do business with them.
                    Salesforce Industries Summit
                    Forrester names NICE inContact CXone a leader in cloud contact center software
                    Inside TechNewsWorld

                    老师穿旗袍肉丝让我爽翻天