Monthly Archives: February 2018
How to Select a Reliable, Secure Data Recovery Firm
Routine data storage, data backup and data recovery after a system breakdown—whether the latter is caused by internal or external sources—are all distinctly different...
New Google Programs Vets Android Devices as Suitable for Enterprises
Google has launched a new program under which it will certify Android devices that meet certain security and other requirements as being suitable for...
Qualcomm Offer to Buy NXP Complicates Broadcom’s Hostile Takeover Bid
Qualcomm shareholders may still be unsure what exactly they’ll be asked to vote on when they gather for the company March 6 annual meeting....
SnapLogic Adds New AI Capabilities to Citizen-Developer Platform
SnapLogic, which specializes in a hard-to-do-well product—self-service application and data integration that uses pre-sets called Snaps—on Feb. 22 announced updates to its Enterprise Integration...
‘Sensitive’ Tesla Data Exposed in Cloud Breach, Researchers Say
Today’s topics include Redlock Security revealing a Tesla cloud account data breach; Google consolidating Android Pay and Google Wallet; Samsung producing 32TB solid-state storage...
Zoom.ai’s Intelligent Assistant Comes to Microsoft Office 365
Zoom.ai, a Toronto-based maker of chat-based productivity tools, has announced an integration that extends the startup's AI virtual assistant technology to Microsoft Teams and...
Global Cost of Cyber-Crime Reached a New High of $600 Billion in 2017
The global costs associated with cyber-crime have grown in recent years, according to a report released Feb. 21 by McAfee and the Center for...
What Online Shoppers Gain From the Streamlined Google Pay
What Online Shoppers Gain From the Streamlined Google Pay
Google has consolidated its mobile and online payment applications into a single service and brand called...
IBM Discovers Business Email Compromise Attack Tied to $5M in Loses
IBM reported on Feb. 21 that its' X-Force Incident Response and Intelligence Services (IRIS) unit discovered a large Business Email Compromise (BEC) attack that...
Number of DDoS Attacks Continues to Grow, Akamai Reports
Number of DDoS Attacks Continues to Grow, Akamai Reports
In the fourth quarter of 2017, the number of cyber-attacks once again grew, according to Akamai’s...