Get the Tech News Flash Newsletter from TechNewsWorld » View Sample | Subscribe
Welcome Guest | Sign In
ECommerceTimes.com
Women in Tech
'New Normal' Security Era Begins for US Agencies, Cloud Providers
June 4, 2020
U.S. government agencies and cloud technology providers are heading toward a reset in how they cooperate on cybersecurity challenges. The expected growth of cloud use will create a more complex federal security landscape, according to a report from Thales. Federal agencies actually have moved ahead of businesses in cloud adoption, with 54 percent of agency data already embedded in the cloud.
Microsoft, Intel Combine Deep Learning and Pixels to Nix Malware
May 13, 2020
Microsoft and Intel researchers have found a way to combine artificial intelligence and image analysis to create a highly effective means to combat malicious software infections. The researchers call their approach "STAMINA" -- static malware-as-image network analysis -- and say it's proven to be highly effective in detecting malware with a low rate of false positives.
Red Hat's Virtual Summit Crowds Hint at Future Conference Models
May 7, 2020
In what could be a trial run for more of the same, Red Hat last week held a first-ever virtual technical summit to spread the word about its latest cloud tech offerings. CEO Paul Cormier welcomed online viewers to the conference, which attracted more than 80,000 virtual attendees. The company made several key announcements during the online gathering and highlighted customer innovations.
Linux Foundation Leads Initiative for Better Digital Trust
May 5, 2020
The Linux Foundation will host ToIP, a cross-industry effort to ensure more secure data handling over the Internet. This new foundation is an independent project enabling trustworthy exchange and verification of data between any two parties on the Internet. The ToIP Foundation will provide a robust common standard to instill confidence that data is coming from a trusted source.
UK Rejects Apple-Google Contact Tracing Approach
April 29, 2020
The UK's plans to launch a smartphone application to track potential COVID-19 infections won't include Apple and Google. The country's National Health Service has designed its own mobile software to do contact tracing of people exposed to the coronavirus. The NHS reportedly found that its own tech works "sufficiently well." The NHS chose a centralized model for its data collection and storage.
How to Stay Safe on the Internet, Part 2: Take Canaries Into the Data Mine
April 24, 2020
More than any other factor, it is our asset that determines our adversary. For most of us, our asset is the corpus of sensitive personal details used for online transactions. This all comes down to how much data an adversary can glean from you, and how thoroughly it can analyze it. If your data passes through some software or hardware, its developer or maintainer enjoys some measure of control.
Ubuntu 'Focal Fossa' Homes In on Enterprise Security
April 23, 2020
Canonical, the parent company of Ubuntu, has announced the general availability of Ubuntu 20.04 LTS, codenamed "Focal Fossa." This major upgrade places particular emphasis on security and performance. Released once every two years, the new long-term support version provides a platform for enterprise IT infrastructures and workloads across all sectors for five years.
Contact Tracing Phone Apps: Health vs. Privacy
April 14, 2020
Google, Apple and MIT have made headlines with announcements of contact tracing mobile apps in the wings. Their purpose is to identify contacts of people who test positive for COVID-19 so appropriate actions can be taken to stem its spread. However, a Cambridge University professor threw some cold water on those apps. The apps proposed by Google, Apple and MIT all have voluntary aspects to them.
Zoom's Soaring Popularity Is a Double-Edged Sword
April 1, 2020
As the coronavirus pandemic worsened in the U.S., Zoom Video Communications offered free access to its videoconferencing platform and demand skyrocketed. "Zoom has quickly become the de facto for teleconferencing during the COVID-19 pandemic," said James McQuiggan, security awareness advocate at KnowBe4. "A lot of organizations are using it to keep in contact with their employees."
Loss Prevention 101: Future-Proofing Your Network Begins With Resilience
March 20, 2020
Critical server outages cost businesses an average of $300,000 hourly, with many cases exceeding $5 million. As network demands increase and maximum uptime becomes a necessity, it is crucial to implement the proper processes and systems to ensure organizations constantly are able to mitigate the threat of outages. A host of factors can cause network or system downtime.
COVID-19 and Computer Security, Part 2: Shoring Up Systems for Remote Workers
March 19, 2020
As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk. There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't compromised by cybercriminals taking advantage of the health crisis.
6 Signs You May Be Ready for a CRM Switch
March 14, 2020
In today's evolving business environment, every operational decision is critical -- and that includes best practices for managing the customer journey. The CRM platform is an integral part of the process. In fact, 91 percent of companies with more than 11 employees use a CRM system. Because of the time it saves and the structure CRM delivers, it can seem daunting for businesses to make a switch.
VPN, Ad Blocker Provider Caught With Hand in the Data Jar
March 11, 2020
A number of VPN and ad-blocking apps owned by Sensor Tower, a popular analytics platform, have been collecting data from millions of people using the programs on their Android and iOS devices, according to a report. The software involved includes Free and Unlimited VPN, Luna VPN, Mobile Data, Adblock Focus for Android devices, and Adblock Focus and Luna VPN for iOS hardware.
The Dark Art of Turning Mountains of Stolen Data Into Cash
February 28, 2020
We're only two months into a new year and already hundreds of millions of personal records have been compromised, including 123 million records from sporting retailer Decathlon and another 10.6 million records from MGM Resorts hotels. These announcements followed fuel and convenience chain Wawa's revelation that it was the victim of a nine-month-long breach of its payment card systems.
The Architectural Imperative for AI-Powered E-Commerce
February 25, 2020
We've been promised, repeatedly, that AI would revolutionize e-commerce. Think about it for a moment. Has it lived up to expectations for you? If not, the problem may lie not in the technology you've deployed on your site, but in the architecture and data that support it. The effectiveness of AI-powered features ultimately depends on a high level of discipline about data and architecture.
2020: The Year for Custom CX and Privacy
February 24, 2020
With the introduction of the CCPA this year and GDPR in 2018, the age of data privacy has begun, bringing the opportunity for businesses to harness it to gain competitive advantage. There are both challenges and opportunities for those that aim to deliver superior CX while adhering to data privacy regulations. Data privacy protection concerns are driving new regulations around the world.
The Truth About Documents and SMB Security
February 22, 2020
There's a major myth about "going paperless." A paperless office doesn't mean that paper is outright banned. There likely will be a need for physical paper in business for a long time, so don't throw out your printer just yet. Rather, being paperless means being able to embrace a shift from traditional paperwork processes to those that take advantage of documents that can be in a digital state.
Rumblings in the Cloud
February 10, 2020
One of the old sayings is that there are "lies, damned lies and statistics," with the implication being you really can't trust most reported numbers. Still, we've often thought, at least with major vendors, that you could trust rankings. One current set of rankings involves cloud providers. The general impression was that Amazon was first, Microsoft second, and Google third.
COPRA May Be Coming, and It's Not Too Soon to Prepare
January 28, 2020
All eyes are on the West Coast as California reins in the unfettered collection, use and sale of the personal data consumers share as part of the bargain for "free" online services. For years this bargain has been explained in privacy policies that few people read, because there is not a lot of negotiating in the personal data market. The CCPA gives consumers revolutionary rights.
Grabbing the Cybersecurity and Privacy Problems by the Horns: ECT News Roundtable, Episode 3
January 23, 2020
Cybersecurity and privacy threats aren't confined to the tech world. They've cast their pall on the world in general. Computer viruses, malware and data leaks have become commonplace, personal privacy has become a bad joke, and cyberwar looms like a virtual mushroom cloud. What sometimes gets lost in the gloom are the many ways security professionals have been working to shore up cyberdefenses.
Is Congress Finally Ready to Take On Cybersecurity?
January 23, 2020
The United States Congress made some significant progress this session when it comes to data privacy, but cybersecurity remains a blind spot for lawmakers. Congress currently is considering a national privacy law that mirrors legislation enacted in the European Union. It would allow people to access, correct and request the deletion of the personal information collected from them.
Business/Customer Sweet Spots: ECT News Roundtable, Episode 2
January 16, 2020
If you're a small business owner or a key member of an enterprise executive team, you want your firm to succeed. If you're a customer, you want to be treated well. Those goals are not diametrically opposed, but very often it seems that companies and customers are at cross-purposes. ECT News Network recently gathered together five technology experts who did some hard thinking on the subject.
Apple, DoJ Grapple Over Cracking Terrorist's iPhones
January 15, 2020
Apple and the U.S. Justice Department are at it again. This time it's over cracking a brace of iPhones owned by the Saudi Air Force cadet who killed three sailors in a shooting spree last month at the naval air station in Pensacola, Florida. At a news conference on the findings of an investigation into the incident, U.S. Attorney General William Barr called out Apple for refusing to help the FBI.
Cybersecurity 2020: The Danger of Ransomware
January 10, 2020
Ransomware tops the list of cybersecurity threats for 2020. While there have been efforts to convince individuals, corporations and municipalities not to pay ransoms, the simple fact is that whenever one is paid, the attack becomes a success that encourages cyberthieves to try again. Ransomware attacks increased 18 percent in 2019, up from an average 12 percent increase over the past five years.
Tech Strides, Tech Worries and Tech Visions: ECT News Roundtable, Episode 1
January 8, 2020
If you're turned off by the mere thought of talking heads vying to speak the loudest or the longest in a TV "discussion" of some pressing issue of the day, read on for a refreshing dose of sanity. ECT News Network recruited five smart people with plenty to say about the state of technology, and we gave them plenty of time to say it. The result is a far-ranging intercourse.
Is Privacy Possible in 2020?
December 27, 2019
The California Consumer Protection Act goes into effect in 2020, and other state and federal laws are on the horizon -- but is it possible that these state laws will really provide us privacy? How many readers take the time to read the privacy policy, or click agreement, when they download a new version of an app on their smartphone or tablet? Probably none. What are the consequences?
Is Your Health Data at Risk?
December 20, 2019
We've recently seen much breathless news coverage of the Nightingale Project, Google's half-secret partnership with Ascension, the second-largest healthcare system in the U.S. The details of the project -- which involves sharing the healthcare data of tens of millions of unsuspecting patients -- have raised significant concerns. The concerns have centered around issues that by now are familiar.
New 'DNA of Things' Method Stores Digital Memory in Common Objects
December 10, 2019
Researchers at a Swedish university have unveiled a method for mixing genetically encoded digital data into common manufacturing materials. The project, carried out in collaboration with an Israeli scientist, involved embedding artificial DNA in a small plastic 3D-printed plastic bunny, which would allow self-replication, according to a report published in Nature Biotechnology.
EU Digital Czar to Probe Facebook's and Google's Data Wrangling
December 3, 2019
The European Union has launched a probe into how Google and Facebook gather, process, use and monetize data for advertising purposes. The European Commission has begun distributing questionnaires as part of a preliminary investigation into Google's and Facebook's data practices. Facebook and Google join Amazon as targets of the EU's "digital czar," Margrethe Vestager.
HPC and AI Are Changing the World
November 30, 2019
During the recent SC19 supercomputing conference, the top semiconductor and systems vendors discussed and demoed the highest-performance computing solutions in the world. While it's easy to imagine these platforms solving some of the most challenging problems, and simulating everything from the human genome to climate change, there are thousands of other applications that can benefit as well.
See More Articles in Data Management Section >>
Women in Tech
Which technology has the strongest positive or negative impact on race relations?
Smartphone cameras, by holding people accountable.
Twitter, by reporting news as it happens.
Facebook, by providing a platform for discussing the issues.
YouTube, by exposing viewers to other cultures.
Twitter, by fueling antagonisms.
Facebook, by spreading fake news.
download NICE inContact Remote Agent Checklist