Month: June 2017

ComputerWorldIndependent

Blockchain integration turns ERP into a collaboration platform

Credit to Author: Lucas Mearian| Date: Fri, 09 Jun 2017 03:06:00 -0700

As the blockchain continues to mature and find adoption in areas other than cryptocurrency, ERP vendors are working to integrate the distributed ledger technology as a trackable, immutable record for everything from shipping manifests and supply chains to equipment maintenance and dispute-resolution systems.

“This is very real and something we’re aggressively excited about,” said Brigid McDermott, vice president of Blockchain Business Development at IBM. “What blockchain does is provide a trust system of record between disparate companies.”

To read this article in full or to leave a comment, please click here

Read More
IndependentSecuriteam

SSD Advisory – IDERA Uptime Monitor Multiple Vulnerabilities

Credit to Author: SSD / Maor Schwartz| Date: Thu, 08 Jun 2017 07:23:23 +0000

Vulnerabilities Summary The following advisory describe three (3) vulnerabilities found in IDERA Uptime Monitor version 7.8. “IDERA Uptime Monitor is a Proactively monitor physical servers, virtual machines, network devices, applications, and services across multiple platforms running on-premise, remotely, or in the Cloud. Uptime Infrastructure Monitor provides a unified view of IT environment health and a … Continue reading SSD Advisory – IDERA Uptime Monitor Multiple Vulnerabilities

Read More
ComputerWorldIndependent

How to fix Android's Smart Lock Trusted Places feature

Credit to Author: JR Raphael| Date: Thu, 08 Jun 2017 09:33:00 -0700

Android’s Smart Lock feature is spectacular — that is, when it actually works.

Smart Lock has been around since 2014’s Android 5.0 era. The basic idea behind it is to make securing your smartphone less inconvenient, thus making it more likely that you’ll actually use a pattern, PIN, or passcode to keep your data safe. The sensational headlines about big, bad malware monsters lurking in the dark and waiting to pounce on unsuspecting victims may be scary, after all — but here in the real world, you’re far more likely to suffer from your own self-made security shortcomings than from any sort of theoretical threat.

To read this article in full or to leave a comment, please click here

Read More