In 2019, look for AI-enabled mobile devices – and a UEM push

Credit to Author: Lucas Mearian| Date: Mon, 07 Jan 2019 03:00:00 -0800

This year, artificial intelligence will continue its push into mobile hardware and enterprise communication devices, challenging IT shops’ enterprise mobility management (EMM) capabilities while at the same time offering potential security benefits.

To read this article in full, please click here

(Insider Story)

Read more

What Apple's T2 security chip brings to the enterprise table

Credit to Author: Ryan Faas| Date: Tue, 20 Nov 2018 03:00:00 -0800

There’s been a lot of discussion about Apple’s T2 security chip, particularly the restrictions it places on repairs not sanctioned by Apple. The controversy centers on an Apple utility needed to make changes like swapping out the built-in SSD drives. The overall argument ties into the right-to-repair fight, allowing hardware owners to make changes to their own devices.

To read this article in full, please click here

(Insider Story)

Read more

Spy chips on servers? Lessons learned (and questions to ask)

Credit to Author: Ryan Faas| Date: Sat, 06 Oct 2018 04:17:00 -0700

On Thursday, Bloomberg Businessweek published an in-depth report alleging that Chinese suppliers for server hardware company Supermicro had placed microchips onto motherboards ordered by the San Jose-based company that were later sold to fill orders from as many as 30 customers. 

To read this article in full, please click here

(Insider Story)

Read more

Get serious about privacy with the Epic, Brave and Tor browsers

Credit to Author: Barbara Krasnoff| Date: Fri, 24 Aug 2018 03:00:00 -0700

Privacy is one of the hardest things to find today — and one of the most prized, especially online. Most people, even those not technologically adept, are concerned about the amount of personal information that is being harvested by governments, corporations, third-party advertising agencies and/or unethical hackers.

To read this article in full, please click here

(Insider Story)

Read more

Blockchain phase 2: Will it scale?

Credit to Author: Lucas Mearian| Date: Wed, 15 Aug 2018 03:11:00 -0700

More than one organization has been working on solving a major blockchain conundrum: how to improve sluggish transaction performance.

To read this article in full, please click here

(Insider Story)

Read more

New MacBook Pros at work? Here's how to manage them right

Credit to Author: Ryan Faas| Date: Mon, 30 Jul 2018 02:59:00 -0700

Earlier this month, Apple unveiled its newest generation of MacBook Pros; all feature a significant bump in performance, a redesigned butterfly keyboard, the arrival of “Hey Siri” commands and a second generation of Apple’s T-series chips. The T2 chip works to improve performance and includes a Secure Enclave for encryption operations to secure the laptops and power Apple’s TouchID as well as the Touch Bar. (The T2 chip is already in Apple’s iMac Pro.)

To read this article in full, please click here

(Insider Story)

Read more

FAQ: How Edge's Application Guard and isolated browsing work

Credit to Author: Gregg Keizer| Date: Wed, 16 May 2018 03:23:00 -0700

Microsoft two weeks ago quietly added a security feature to Windows 10 Pro that initially was available only in the operating system’s most expensive edition.

To read this article in full, please click here

(Insider Story)

Read more

Q&A: Could blockchain professionalize Gmail?

Credit to Author: Kathryn Cave| Date: Tue, 27 Mar 2018 07:42:00 -0700

Despite the constant announcements that email is dead – or, at least, about to die – it is still the most common form of workplace communication. Now, Swiss company Gmelius, which launched in 2016, believes it has come up with a way to counteract some of email’s shortcomings and make it better.

To read this article in full, please click here

(Insider Story)

Read more

Advice from a CISO: Blockchain still searching for its tipping point

Credit to Author: IDG Connect| Date: Tue, 27 Mar 2018 07:23:00 -0700

To read this article in full, please click here

(Insider Story)

Read more

How to protect Windows 10 PCs from ransomware

Credit to Author: Preston Gralla| Date: Wed, 10 Jan 2018 03:00:00 -0800

CryptoLocker. WannaCry. Petya. Bad Rabbit. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoins, to decrypt them.

To read this article in full, please click here

(Insider Story)

Read more

Blockchain in the real world: 3 enterprise use cases

Credit to Author: Lucas Mearian| Date: Thu, 28 Dec 2017 03:36:00 -0800

While blockchain technology tends to get the most attention for its role in underpinning cryptocurrencies such as Bitcoin and Ether, vertical industries are quickly adopting it for its efficiency and transparency.

To read this article in full, please click here

(Insider Story)

Read more