We enable business and digital transformation decisions through the delivery of cutting-edge ICT solutions and products...
The security of business applications is often overlooked, despite the fact that exploitation of vulnerabilities in software is one of the key attack methods of cyber criminals and that application breaches… Continue reading
Get ready to patch every piece of computing gear in your home and company to deal with this CPU nightmare. You can’t get away from Meltdown and Spectre. These chip bugs will make your life miserable. Everything you run — and I mean everything — PCs, Macs, iPhones, tablets, cloud computing, and servers — use vulnerable CPUs. Apple, Linux developers, and Microsoft have all released patches. And all of them will slow down at least some of your programs.-Meltdown and Spectre security
While Intel gets most of the heat for these hardware vulnerabilities, it’s not alone. According to Red Hat, ARM, IBM System Z, POWER8 (Big Endian and Little Endian), and POWER9 (Little Endian) processors are all open to attack. AMD claims its chips are largely invulnerable, but it concedes there’s a near zero — but not zero — the risk of exploitation from one class of attack.
So, what does that mean for you? Here’s what the experts say you can expect from your devices and services. Continue reading
Today, business is digital. Data of all kinds is speeding across worldwide networks to and from data centers and cloud services, even as data quantities steadily increase, fueled by low-cost storage and a burgeoning array of Internet-of-Things (IoT) devices. But as digital business opportunities expand, companies face a number of daunting challenges. Foremost among them is the growing number of cyber attacks, as threat actors proliferate across a variety of attack vectors. In addition, the interdependence of business and data has spawned new regulatory guidelines that span industries and geographic regions. To survive and thrive, businesses must meet the twin challenges of IT security and compliance.
Today’s IT security threats come from a wide array of perpetrators who are responsible for ever-more dangerous attacks. Continue reading