Archive

INSIGHTS

How Do You Build a Software Company?

How do you build a software company? It's a trick question. There are certainly things you need to do and not do on the way to building a successful software company, but there are no recipes, especially in CRM where demand changes all the time. In my career, I've seen firsthand some of the ways tha...

Ford Motor Puts Design Strategy Under the HoloLens

Ford Motor Company has unveiled details about its use of Microsoft's HoloLens augmented reality technology in the automotive design process. Ford's design teams have swapped out their clay-sculpting tools -- a staple of the automotive world since the 1930s, when Harley Earl introduced them at Genera...

DoT Refreshes Rule Book to Include Self-Driving Cars

U.S. Transportation Secretary Anthony Foxx on Tuesday introduced new federal guidelines for the emerging highly automated vehicle industry -- including self-driving and semi-autonomous vehicles -- creating a framework that will help drive one of the most important new sectors in the national economy...

SPOTLIGHT ON SECURITY

Election Season Spawns Scams With Political Twist

Dirty tricks during political campaigns are nothing new, but the Internet and the proliferation of mobile devices have allowed tricksters to up their games a notch. It came to light last week, for example, that Donald Trump's campaign app was hoovering the address books on his supporters' phones. Tr...

SPOTLIGHT ON SECURITY

To Protect Enterprise Data, Secure the Code

Responsibility for securing enterprise applications has been moving down the development lifecycle, and for good reason. It not only makes the enterprise more secure, but also saves companies time and money. For example, the average time to fix a vulnerability in IBM's application security solution ...

SPOTLIGHT ON SECURITY

Old Tech Can Create New Security Woes

"Patch your systems in a timely manner" is a mantra of security experts, but what happens when the patch well runs dry because a product's maker no longer supports it? That is a situation many large enterprises find themselves in, and it's one that poses security risks. Between 30 percent and 50 per...

SPOTLIGHT ON SECURITY

Civil Rights Office Issues Ransomware Guidance

Ransomware infections are on the rise, and healthcare organizations are ripe targets, which may be why the federal government addressed the subject last week. Ransomware attacks have risen from about 1,000 a day last year to 4,000 a day this year, Symantec has reported. Many of those attacks are for...

SPOTLIGHT ON SECURITY

Mobile Ransomware Has Mushroomed: Report

The number of mobile ransomware victims across the globe has increased fourfold compared to a year ago, suggests a Kaspersky Lab report released last week. Kaspersky software protected 136,532 users targeted by ransomware from April 2015 to March 2016 -- up from 35,413 in the year-ago period, the co...

SPOTLIGHT ON SECURITY

Hackers Home in on Health, Education, Government Sectors

A New York healthcare provider, California's higher education system and the U.S. Department of Energy have become the latest targets of data bandits. The latest massive data breach at a healthcare provider reportedly took place at Excellus BlueCross BlueShield, which last week revealed that the per...

SPOTLIGHT ON SECURITY

Netflix Move Prompts Premature Antivirus Software Obit

Netflix reportedly is in the process of dumping its antivirus software and placing all its faith in an alternative solution to protect its more than 60 million subscribers from online nastiness, a move that prompted one pundit to pronounce the death of antivirus software yet again. Such dire pronoun...

SPOTLIGHT ON SECURITY

An Insider Betrayed Ashley Madison – Go Figure

When the giant data breach at infidelity website Ashley Madison made headlines last month, the CEO of the site's owner was quick to claim the caper was an inside job. He had the attacker's profile and work credentials, Avid Life Media's CEO Noel Biderman told ace cybersecurity blogger Brian Krebs. T...

SPOTLIGHT ON SECURITY

Shadow IT Feeds ‘Man in the Cloud’ Attacks

Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified. A new attack vector on business systems leverages the synchronization fe...

SPOTLIGHT ON SECURITY

Study: Chinese Hackers Are Savvy, Surgical

A clandestine group of sophisticated Chinese hackers have infected scores of sites on the Web and stolen documents from industrial and government organizations with surgical precision, according to a Dell SecureWorks study released last week. Dubbed "Threat Group 3390," the cybergang has used infect...

SPOTLIGHT ON SECURITY

Cyberwarrior Demand Outpaces Supply

Demand for cybersecurity professionals continues to far outpace supply, according to a Burning Glass Technologies report released last week. Cybersecurity hiring remains concentrated in government agencies and among defense contractors, the third annual cybersecurity job market report notes, but hir...

LinuxInsider Channels