(Insider Story)

Read more

New MacBook Pros at work? Here's how to manage them right

Credit to Author: Ryan Faas| Date: Mon, 30 Jul 2018 02:59:00 -0700

Earlier this month, Apple unveiled its newest generation of MacBook Pros; all feature a significant bump in performance, a redesigned butterfly keyboard, the arrival of “Hey Siri” commands and a second generation of Apple’s T-series chips. The T2 chip works to improve performance and includes a Secure Enclave for encryption operations to secure the laptops and power Apple’s TouchID as well as the Touch Bar. (The T2 chip is already in Apple’s iMac Pro.)

To read this article in full, please click here

(Insider Story)

Read more

(Insider Story)

Read more

Q&A: Could blockchain professionalize Gmail?

Credit to Author: Kathryn Cave| Date: Tue, 27 Mar 2018 07:42:00 -0700

Despite the constant announcements that email is dead – or, at least, about to die – it is still the most common form of workplace communication. Now, Swiss company Gmelius, which launched in 2016, believes it has come up with a way to counteract some of email’s shortcomings and make it better.

To read this article in full, please click here

(Insider Story)

Read more

Advice from a CISO: Blockchain still searching for its tipping point

Credit to Author: IDG Connect| Date: Tue, 27 Mar 2018 07:23:00 -0700

To read this article in full, please click here

(Insider Story)

Read more

How to protect Windows 10 PCs from ransomware

Credit to Author: Preston Gralla| Date: Wed, 10 Jan 2018 03:00:00 -0800

CryptoLocker. WannaCry. Petya. Bad Rabbit. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoins, to decrypt them.

To read this article in full, please click here

(Insider Story)

Read more

Blockchain in the real world: 3 enterprise use cases

Credit to Author: Lucas Mearian| Date: Thu, 28 Dec 2017 03:36:00 -0800

While blockchain technology tends to get the most attention for its role in underpinning cryptocurrencies such as Bitcoin and Ether, vertical industries are quickly adopting it for its efficiency and transparency.

To read this article in full, please click here

(Insider Story)

Read more

5 more Windows admin tasks made easy with PowerShell

Credit to Author: Jonathan Hassell| Date: Wed, 13 Dec 2017 03:00:00 -0800

I’ve written a lot about Microsoft PowerShell on this site, but my favorite thing to do is show how to apply the scripting language to various tasks you already have to do as part of your regular role and responsibilities. In a previous article, I demonstrated how to accomplish five common administrative tasks using PowerShell.

To read this article in full, please click here

(Insider Story)

Read more

The top 5 problems with blockchain

Credit to Author: Lucas Mearian| Date: Fri, 10 Nov 2017 03:11:00 -0800

While blockchain appears ready to upend business processes and trust models across a myriad of industries, it’s still in its early days and the various iterations of the distributed ledger already in use are far from vetted.

To read this article in full, please click here

(Insider Story)

Read more

Anatomy of a spambot

Credit to Author: John Brandon| Date: Thu, 19 Oct 2017 03:00:00 -0700

For security pros, spambots are known enemies. For the uninitiated, they are unknown entities. And yet they proliferate like ants at a picnic or teens on messaging apps. You might be receiving countless messages from bots every day, and even worse, a bot might be sending out unwanted emails from your computer right now, making you an unwilling participant in digitized mayhem.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

What Face ID means for iOS and device access

Credit to Author: Ryan Faas| Date: Fri, 29 Sep 2017 03:11:00 -0700

The most obvious difference between the upcoming iPhone X and every iOS device that preceded it is the loss of the iconic Home button. For years, it has served as the fingerprint sensor for Apple’s Touch ID technology, offering easy and secure unlocking of the device as well as authentication for transactions.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more