Category: IT Management

Trending topics on The Resilience Post

A new Twitter feature to make life easier for emergency managers! Top 5 misconceptions of IoT network and device security Nintendo offers $20K to hack the Switch Adidas and Amazon re-write the rules on supply chain management When your mojo drops by Paul Kudray And many more posted daily! Follow us on your favorite social network: ...

Apps vs. Chatbots: The fight for the Supply Chain future

Apps mean a simpler Supply Chain; Bots mean a more personal one The user end of the supply chain has a huge effect on the whole thing. It’s for this reason that the current fight between apps and chatbots is so important. When shopping evolved into its online form, so too did the supply chain. ...

Report: 95% of businesses have migrated critical applications to the cloud

SolarWinds recently released its 2017 IT trends report, examining the effects of increasing cloud adoption on IT and the shift to a hybrid infrastructure. The SolarWinds IT Trends Report 2017: Portrait of a Hybrid IT Organization, released Wednesday, highlights IT's continual move to the cloud, especially for key workloads. According to the report, 95% of ...

Catastrophic blackout a real possibility unless critical infrastructure improvements are made…

The connected world in which we live could suffer a catastrophic blackout unless critical infrastructure is secured, warns Eugene Kaspersky founder and CEO, Kaspersky Lab. The ramifications of a blackout, like the one recently experienced in Ukraine, are deep reaching. During a blackout none of the devices connected to the Internet of Things would be ...

Why the humble router remains one of the most insecure devices in your home

For all the time that we spend thinking about the security of our phones and laptops — about encryption, strong passwords and two-factor authentication — comparatively little attention is paid to the humble internet router. The tiny box is probably one of the most important pieces of technology you have in your home. It's the ...

Facebook updates its platform policy to forbid using data for surveillance

Facebook today announced changes to its platform policy that forbid developers from using the company’s data for surveillance purposes. The changes include language “to more clearly explain that developers cannot ‘use data obtained from us to provide tools that are used for surveillance,’” the company said in a blog post. “Our goal is to make ...

Hundreds of mobile websites and apps are found to leak personal info

Using apps and mobile websites is normal for smartphone users, but applications you trust could be leaking your personal information — and it can be surprisingly easy for a hacker to find it. "There are so many very popular, recognizable brands out there producing apps and websites that are leaking personally identifiable information," said Michael ...

Verifone confirms corporate network was hacked

US stores hit. Global payments processor Verifone has confirmed its corporate network was hacked by unknown attackers targeting the company's merchants. Verifone spokesperson Andy Payment told iTnews the "cyber incident" took place around two months ago, and affected two dozen American service station convenience stores. The attack was revealed by infosec journalist Brian Krebs, whose ...

WikiLeaks to help shield tech firms from CIA’s hacking tools

WikiLeaks will work with technology companies to help defend them against the CIA's hacking tools, founder Julian Assange said Thursday. The move sets up a potential conflict between Silicon Valley firms eager to protect their products and an intelligence agency stung by the radical transparency group's disclosures. In an online news conference, Assange acknowledged that ...

How Google secures Gmail against spam and ransomware

Though there was at least one successful high-profile phishing attack against a Gmail user in 2016, Google is aggressively defending its millions of Gmail users. SAN FRANCISCO—Google's Gmail web email service is used by millions of companies and consumers around the world, making it an attractive target for attackers. In a session at the RSA ...

Amazon’s server outage highlights the major problem with today’s internet

When the world’s biggest websites go down, people start noticing who holds the plug. For a few hours yesterday, Amazon’s Simple Storage Solution (S3) cloud service experienced what the company called “high error rates”. In practice, this meant two things. Firstly, many of the world’s biggest websites – such as Medium, Business Insider, Imgur, and ...

How did an Amazon glitch leave people literally in the dark?

Tuesday's Amazon Web Services mega-outage knocked offline not only websites big and small, by yanking away their backend storage, but also knackered apps and Internet of Things gadgets relying on the technology. In fact, the five-hour breakdown was so bad, Amazon couldn't even update its own AWS status dashboard: its red warning icons were stranded, ...