Spy chips on servers? Lessons learned (and questions to ask)

Credit to Author: Ryan Faas| Date: Sat, 06 Oct 2018 04:17:00 -0700

On Thursday, Bloomberg Businessweek published an in-depth report alleging that Chinese suppliers for server hardware company Supermicro had placed microchips onto motherboards ordered by the San Jose-based company that were later sold to fill orders from as many as 30 customers. 

To read this article in full, please click here

(Insider Story)

Read more

Get serious about privacy with the Epic, Brave and Tor browsers

Credit to Author: Barbara Krasnoff| Date: Fri, 24 Aug 2018 03:00:00 -0700

Privacy is one of the hardest things to find today — and one of the most prized, especially online. Most people, even those not technologically adept, are concerned about the amount of personal information that is being harvested by governments, corporations, third-party advertising agencies and/or unethical hackers.

To read this article in full, please click here

(Insider Story)

Read more

(Insider Story)

Read more

New MacBook Pros at work? Here's how to manage them right

Credit to Author: Ryan Faas| Date: Mon, 30 Jul 2018 02:59:00 -0700

Earlier this month, Apple unveiled its newest generation of MacBook Pros; all feature a significant bump in performance, a redesigned butterfly keyboard, the arrival of “Hey Siri” commands and a second generation of Apple’s T-series chips. The T2 chip works to improve performance and includes a Secure Enclave for encryption operations to secure the laptops and power Apple’s TouchID as well as the Touch Bar. (The T2 chip is already in Apple’s iMac Pro.)

To read this article in full, please click here

(Insider Story)

Read more

FAQ: How Edge's Application Guard and isolated browsing work

Credit to Author: Gregg Keizer| Date: Wed, 16 May 2018 03:23:00 -0700

Microsoft two weeks ago quietly added a security feature to Windows 10 Pro that initially was available only in the operating system’s most expensive edition.

To read this article in full, please click here

(Insider Story)

Read more

Q&A: Could blockchain professionalize Gmail?

Credit to Author: Kathryn Cave| Date: Tue, 27 Mar 2018 07:42:00 -0700

Despite the constant announcements that email is dead – or, at least, about to die – it is still the most common form of workplace communication. Now, Swiss company Gmelius, which launched in 2016, believes it has come up with a way to counteract some of email’s shortcomings and make it better.

To read this article in full, please click here

(Insider Story)

Read more

Advice from a CISO: Blockchain still searching for its tipping point

Credit to Author: IDG Connect| Date: Tue, 27 Mar 2018 07:23:00 -0700

To read this article in full, please click here

(Insider Story)

Read more

How to protect Windows 10 PCs from ransomware

Credit to Author: Preston Gralla| Date: Wed, 10 Jan 2018 03:00:00 -0800

CryptoLocker. WannaCry. Petya. Bad Rabbit. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoins, to decrypt them.

To read this article in full, please click here

(Insider Story)

Read more

Blockchain in the real world: 3 enterprise use cases

Credit to Author: Lucas Mearian| Date: Thu, 28 Dec 2017 03:36:00 -0800

While blockchain technology tends to get the most attention for its role in underpinning cryptocurrencies such as Bitcoin and Ether, vertical industries are quickly adopting it for its efficiency and transparency.

To read this article in full, please click here

(Insider Story)

Read more

5 more Windows admin tasks made easy with PowerShell

Credit to Author: Jonathan Hassell| Date: Wed, 13 Dec 2017 03:00:00 -0800

I’ve written a lot about Microsoft PowerShell on this site, but my favorite thing to do is show how to apply the scripting language to various tasks you already have to do as part of your regular role and responsibilities. In a previous article, I demonstrated how to accomplish five common administrative tasks using PowerShell.

To read this article in full, please click here

(Insider Story)

Read more

The top 5 problems with blockchain

Credit to Author: Lucas Mearian| Date: Fri, 10 Nov 2017 03:11:00 -0800

While blockchain appears ready to upend business processes and trust models across a myriad of industries, it’s still in its early days and the various iterations of the distributed ledger already in use are far from vetted.

To read this article in full, please click here

(Insider Story)

Read more