A massive data hack affecting Weebly and Foursquare is just coming to light, with the tech companies both appearing on breach alert site LeakedSource. More than 43 million accounts could be affected by the attack, which brings the firms under close scrutiny regarding their security practices.
Too many business are handing cybersecurity responsibility off to their IT departments, when senior managers and directors should be actively involved, experts said at the CyberMaryland Conference.
Dell EMC is providing a group of endpoint security and management offerings to aid enterprises with securing mobile devices as more users go mobile. The tools utilize both companies' products.
Apple is joining Google and Amazon in a race to control smart-home networks by partnering with builders on test houses to hook iPads and iPhones up to web-connected appliances. The company is betting that consumers will be more likely to pay for smart wireless devices when contractors build them into the furnishings as they do marble-tiled bathrooms, a report states.
A Russian man accused of cyberattacks in the US has been arrested in the Czech Republic. The US has two months to request extradition, while Russia insists the man be returned to his home country.
Starting Dec. 1, more employees will be eligible for overtime pay for hours worked in excess of 40 per week. Laura Vanderkam offers eight ways employers can minimize overtime pay, including re-evaluating work processes, offering flex time and tracking hours.
Hewlett Packard Enterprise has confirmed plans to cut more jobs as rumors about selling to private equity firms swirl, Barb Darrow writes. HP Inc., the other half of what used to be Hewlett-Packard, made a similar announcement last week.
Companies are scaling back their spending on cybersecurity, and investors are responding to the softening demand for the technology. In this year's third quarter, venture capital investment in cybersecurity startups was down 24% from the same quarter in 2015.
As cloud computing continues to become more popular, the security of third-party platforms is worrying some members of the supply chain, Chris King writes. To protect against potentially catastrophic data breaches, King recommends looking to alternatives such as in-house developers and conducting proper background checks to ensure that cloud service providers have an unflinching commitment to protecting data.
- Page 1