[Codango™: NOOOOOOOOooooooooooo!] Peter Bright: The ability to boot DOS and other legacy relics is going to disappear. Speaking at UEFI Plugfest, a hardware interoperability testing event held by the Unified Extensible Firmware Interface (UEFI) Forum earlier this month, Intel announced Continue reading The PC BIOS Will Be Killed Off By 2020 As Intel Plans Move To Pure UEFI
Sara Friedman: What: “Shrinking State Data Centers: A Playbook for Enterprise Data Center Consolidation” from the National Association of State CIOs. Why: With states at different stages of data center consolidation, sharing information on potential roadblocks can smooth the transition Continue reading Avoiding Data Center Consolidation Headaches
Joshua Morales: Last month a catastrophic data breach happened to the leading law firm in the offshore market, Appleby. The data breach included roughly 13.4 million leaked documents from the years 1950 to 2016. Among the files were loan agreements, Continue reading Appleby’s Paradise Papers Breach: Is Your Firm Next?
Corine Mbiaketcha Nana: "Beware of the robots! No office job is safe" – or so reads the headline of yet another article about why emerging technologies spell doom for today’s worker. While using such phrases to describe artificial intelligence (AI) Continue reading Technology In The Workplace: Cause For Panic Or Technology Goldmine?
Jamshed Avari: Security research firm Positive Technologies has said it will demonstrate an exploit that allows the running of arbitrary unsigned code on any PC with an Intel 6th Gen ‘Skylake’ Core CPU or later. The security hole exists because Continue reading Intel Management Engine Vulnerability Exposes Millions of PCs to Undetectable Attacks, Claims Security Firm
Extortion-based cyber attacksToday, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has been predicted that cyberattacks are going to get even worse. Recent Continue reading Extortion-Based Cyber Attacks: The Next Evolution In Profit-Motivated Attack Strategies
Asha McLean: A report from the security firm has highlighted a need for ‘SecOps’, where DevOps and security teams work alongside when building out applications. Due to the dynamic nature of DevOps and the business "secrets" they have access to, Continue reading DevOps The Forgotten Team When It Comes To Security: CyberArk
Adarsh Verma: From time to time, the security researchers continue to make us realize that Windows operating system is full of loopholes that can be exploited by hackers to steal our data. One such vulnerability was patched by Redmond in Continue reading Your Windows Login Details Can Be Stolen By Hackers Without User Interaction
Mark Duell: North Korea has been publicly blamed by the UK’s Security Minister for the WannaCry cyber attack which hit the NHS. Home Office Minister Ben Wallace said the Government believed ‘quite strongly’ that a foreign state was behind the Continue reading Attack Could Have Been Prevented If ‘Basic IT Security’ Measures Had Been Taken
Brett Hagler: The No. 1 lesson I’ve learned as the CEO of New Story is that our ability to impact the most people does not have to be a function of how much we can fundraise. I used to think Continue reading How Organizations Can Achieve A Bigger Impact With An Open-Sourced Pursuit