The recent leak of National Security Agency files by Shadow Brokers calls into question the security of virtual private networks, particularly in the case of weaknesses associated with Cisco's PIX product, which was discontinued in 2009, Thomas Fox-Brewster writes.
Courts may not uphold the coverage of phishing incidents under companies' existing cyberrisk policies, writes Peri Mahaley. "Frequently, insurers assert that there is no coverage because the loss did not proximately result from the fraudulent hack, but rather from the intervening actions of duped individuals," Mahaley writes.
VMware has established alliances with Dell, PTC, Deloitte Digital, Bayshore Networks, Intwine Connect and V5 Systems in an effort to bridge the gap between developers and IT. "Our work with these companies will be important in helping businesses meet their strategic needs for IoT applications, analytics, hardware and services, ultimately extending their reach from the data center and cloud to the edge," says VMware's Bask Iyer.
Stores that don't adequately secure their customer data will feel it in their bottom line, per a KPMG survey that found that consumers react to retail breaches by taking their business elsewhere. Nearly 20% of survey respondents said they would not shop at a retailer that had been hit by a breach.
The Holographic Processing Unit inside Microsoft's HoloLens augmented-reality headset has 24 Tensilica digital signal processor cores and 8 megabytes of cache memory, the company disclosed at this week's Hot Chips conference in Cupertino, Calif. The chip is fabricated by Taiwan Semiconductor Manufacturing Co. with a 28-nanometer process.
Dell aims to prepare its enterprise customers with technology for a "future-ready workplace" and equip channel partners with the ability to do the same for their customers, said Dell's Moe Klan. The company is focusing its offerings on workplace devices, cloud-client computing and endpoint security suites.
A majority of IT professionals foresee a data breach at their company within a year if they do not evolve away from old security platforms, an Okta survey says. Among respondents, 80% say passwords and access controls are not up to par, while 85% say they are not sure who can access business apps.
The majority of recent cyberattacks against health care and other industries, such as transportation, services and manufacturing, are being attributed to a new strain of the Locky ransomware, cybersecurity vendor FireEye Labs reports. The attacks were most common on Aug. 9, 11 and 15, FireEye Labs reports.
Safeguard your customers' information by regularly updating your software, switching up your passwords and using a customer relationship management platform to gather customer information in one place, Marc Prosser writes. Consult with IT experts when necessary and establish safety protocols with employees.
IBM is releasing Storwize V7000F and Storwize 5030F, a "Flash In" migration system for small and midsized buisnesses. With the product, which touts starting costs of $19,000, IBM hopes to target Dell and EMC customers, Larry Dignan writes.
- Page 1