First Technology

CIOs, you’re doing blockchain wrong

IT leaders who've taken the plunge into blockchain are mainly deploying it in proofs-of-concept tests to address the same problems a conventional database could handle, according to research firm Gartner. Relying on a survey of consulting firms whose clients had ...

IT security: Five essential steps to keep the hackers at bay

From malware and ransomware through to internal espionage and onto state-sponsored hacking, businesses face cybersecurity threats across a broad range of vectors. As the appointed guardians of enterprise IT, how can CIOs help ensure great information security in a digital ...

Stolen email credentials being used to pry into cloud accounts

Malicious actors are using the massive supply of previously stolen login credentials to help brute force their way into high-profile cloud-based business systems that cannot easily use two-factor authentication for security. Proofpoint researchers found the availability of these tools has powered ...

How CDOs are supporting the business transformation agenda

The role of the chief data officer (CDO) has become intrinsically linked with long-term business success. It’s a complex job, but an essential one. CDOs are the holders of the key when it comes to unlocking insight from data — insight ...

This Trojan exploits antivirus software to steal your data

A new strain of the Astaroth Trojan has been given the capability to exploit vulnerable processes in antivirus software and services. Cybereason's Nocturnus Research team said in a blog post published on Wednesday that the variant is able to utilize modules in ...

10 productivity-boosting apps for Microsoft Teams

Teams is Microsoft’s chat-based collaboration tool that connects employees via group chat, direct messaging and file sharing. Teams has a big advantage over rivals because it can hook into Microsoft’s various office productivity apps, including Word, Excel and PowerPoint. But users still ...

Cyber blitzkrieg replaces cyber Pearl Harbor

There has been a shift in thinking about cyberwar, according to professor Greg Austin from the University of New South Wales Canberra Cyber. Since 2006, the US Department of Homeland Security (DHS) and allied nations have run exercises based on the ...