News

Overflow  >  Pouring more binary water into a glass than it can hold causing overflow.
calendar and hourglass

binary code jira breach hacker disheveled disrupted breached hacked broken by valerybrozhinsky gett

Atlassian expands Jira roadmaps for better project status visibility

The function has proved popular with users since last year’s big overhaul of Jira.

medical network h/ ealthcare IoT / hospital connections and communications

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications.

hacker presence on a network

Cisco issues firewall, SD-WAN security warnings

The warning about Cisco Firepower management software is rated critical among 26 other less urgent security advisories it issued.

Jigsaw puzzle pieces coming together.

VMware targets SD-WAN management with Nyansa acquisition

VMware said the Nyansa technology will be targeted at boosting monitoring and troubleshooting for LAN/WAN deployments within its SD-WAN package -- VMware SD-WAN by VeloCloud.

plus symbol globe communication network digital transformation concept abstract

Survey: Digital transformation can reveal network weaknesses

When enterprises embraced digital transformation, some found their existing networks had a limited ability to address cloud connectivity or access for mobile users.

p1200655

Feeling revenue squeeze, Mozilla lays off 70

The Firefox browser maker had more trouble creating revenue-generating products in 2019 than it expected, leading to the job cuts. Mozilla has set aside $43 million to pay for building new products.

Automation  >  A team of robotic arms welding components.

Cisco adds proactive problem solving to data-center software

Additions to Cisco's Data Center Network Assurance and Insights suite of software can detect problems in network switch fabric before they affect network services.

iPhone security / unlocking, hacking or breaking into iPhone

Feds may already have found a way to hack into Apple iPhones

By refusing to put a permanent backdoor in its iOS platform, Apple wants to protect millions of users from future threats by both governments and hackers, privacy advocates said.

Brexit / GDPR  >  Cutting connections / United Kingdom / European Union / global security shield

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

US elections remain vulnerable to attacks, despite security improvements

Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements.

Google offers IBM AS/400 apps new home in its cloud

Search giant follows Microsoft in offering route to legacy workload modernization via new Power Systems service in Google Cloud Platform.

Not dead yet: Windows Server 2008 users have options

With support for Windows Server 2008 ending, there’s still time to examine alternatives to upgrading.

cryptojacking / cryptocurrency attack

Former U.S. regulator leads effort to create digital dollar

The project will explore how a cryptocurrency could produce a more efficient and safer means of cross-border trade, clearance and settlement.

keyboard laptop microsoft edge logo web browser by urupong getty images 1200x800

FAQ: Microsoft's new Edge explained

Microsoft's Chromium-based browser has officially arrived, no doubt bringing questions from users about what it means for them. We've got answers.

cryptocurrency blockchain digital financial security by just super getty

Kadena launches a hybrid platform to connect public, private blockchains

The JP Morgan startup's blockchain braids together multiple interoperable chains via smart contracts over which users can transact business via cryptocurrency.

Abstract blockchain concept  >  Blocks / nodes / connections / transactions

EEA opens sandbox for blockchain development and collaboration

The Enterprise Ethereum Alliance TestNet offers the nodes, management infrastructure and ability to gather granular results for members.

binary code vortex

Serverless computing: Ready or not?

Like any disruptive technology, serverless computing is surrounded by plenty of hope and hype. Getting at the truth and deciding if the technology is right for your organization requires an objective attitude and careful planning.

windows 7 logo on mirrors man with derby hat on dock

Microsoft to Windows 7: Beat it, you bum

In case the message isn't clear, Windows 7 PCs will soon show a full-page nag screen reminding users that they could fall victim to cyber criminals by running unpatched software.

Load More