newsCrowdStrike failure: What you need to knowA flawed update to CrowdStrike Falcon sent Windows servers and PCs across the globe into an endless reboot cycle that IT organizations are still working to remediate.By CIO staffJul 24, 20241 minWindows SecuritySecurity how-to Android security checkup: 18 steps to a safer phoneBy JR RaphaelJul 24, 202429 minsSmall and Medium BusinessGoogle PlayMobile Securityhow-to 8 ways to prep your Windows PC for disasterBy Chris HoffmanJul 24, 20249 minsLaptop SecurityLaptopsWindows 10 opinionPut not your trust in Windows — or CrowdStrikeBy Steven J. Vaughan-Nichols Jul 20, 20244 minsWindows SecurityLinuxMacOS newsCrowdStrike CEO apologizes for crashing IT systems around the world, details fixBy Peter Sayer Jul 20, 20241 minSecurity newsBlue screen of death strikes crowd of CrowdStrike serversBy Peter Sayer Jul 19, 20241 minSecurity opinionGet ready for Olympic-size threats during the Paris gamesBy Mike Elgan Jul 19, 20246 minsCyberattacksGenerative AISecurity news briefData about millions of Trello users leaks onlineBy Mikael Markander Jul 17, 20241 minCyberattacksData PrivacyCollaboration Software opinionFor July, Microsoft’s Patch Tuesday update fixes four zero-day flawsBy Greg Lambert Jul 12, 202411 minsWindows SecurityMicrosoftWindows ArticlesbrandpostSponsored by Optimum BusinessWhy Business Internet Security Is Important for YouNo business is too small to be safe from cyber criminals. The repercussions of an attack can be devastating, but these practical tips will help keep you protected. Jul 22, 2024 7 minsSecurityfeatureWhat is UEM? Unified endpoint management explainedUEM has emerged as the next step in the development of enterprise mobility software, offering better management of a wider range of devices. By extending EMM capabilities to laptops and desktops, UEM tools helped enterprises make the quick move to remote work.By Matthew Finnegan Jul 11, 2024 9 minsSmall and Medium BusinessEnterprise Mobile ManagementMobile Application Managementhow-toWhat is Contact Key Verification and how is it used?Apple’s iMessage offers a secure identity verification system that enterprise professionals might want to use. Here's everything you need to know about Contact Key Verification.By Jonny Evans Jul 05, 2024 6 minsAppleiOSMessaging Appshow-toHow to make the most of Google's Find My Device Android networkGoogle's freshly upgraded Find My Device system makes it easy to track down and deal with a missing business phone — but it's up to you to figure out how to use it.By JR Raphael Jul 04, 2024 7 minsSmall and Medium BusinessSmartphonesGooglenewsProton launches ‘privacy-first’ alternative to Word and Google DocsEnd-to-end encryption in its new document editor means that user data is kept private and won’t be used to train AI algorithms, the company says.By Matthew Finnegan Jul 03, 2024 3 minsData PrivacyCollaboration SoftwareProductivity Softwarenews analysisTop 5 AI employee fears and how to combat themA new study revealed that employees have real fears about AI's intrusion into their workplace. Companies can alleviate many of those anxieties by being more transparent around how they plan to use the technology.By Lucas Mearian Jul 02, 2024 7 minsData PrivacyGenerative AIIT JobsopinionCongress warns Microsoft about foreign hackers again — will it matter this time?After a Chinese-government sponsored espionage group hacked into US government email accounts last year, it seemed as if Microsoft might be in hot water. But so far, little has changed.By Preston Gralla Jun 26, 2024 7 minsGovernment ITGovernmentCyberattacksopinionThe rise of AI-powered killer robot dronesGPS jamming is creating demand for cheap drones that use AI to navigate, target and attack. It's only a matter of time before this will be a worldwide danger.By Mike Elgan Jun 18, 2024 8 minsGovernment ITMilitarySecuritynews analysisMicrosoft delivers a light Patch Tuesday for JuneThis month's Patch Tuesday release included 49 updates, but no major zero-day flaws.By Greg Lambert Jun 14, 2024 8 minsWindows SecurityMicrosoftWindowsfeatureWhat is Tor Browser? Software for protecting your identity onlineTor Browser offers the best anonymous web browsing available today, and researchers are hard at work improving Tor’s anonymity properties. By J.M. Porup Jun 14, 2024 2 minsBrowsersInternetPrivacynews analysisIT pros find generative AI doesn’t always play well with othersAI is often difficult to integrate with existing enterprise system and leaves open doors to security and privacy concerns, according to a SolarWinds IT Trends Report.By Lucas Mearian Jun 12, 2024 5 minsRegulationGenerative AISystem IntegrationopinionMicrosoft’s Copilot+ AI PCs: Still a privacy disaster waiting to happenThe company’s new Recall feature will record everything a PC user does, a potential treasure trove of information and data for hackers.By Preston Gralla Jun 12, 2024 7 minsData PrivacyGenerative AIWindows 11 Show more Show less View all Upcoming Events21/Oct-23/Oct awards CSO Conference + AwardsOct 21, 2024Phoenix, AZ CSO and CISOCybercrimeSecurity View all events Resources whitepaper Keeping Financial Services Organizations Secure in an AI World When we talk about financial services and technology, security and regulatory compliance are always top of mind. And now, GenAI Has entered the chat, so to speak. The post Keeping Financial Services Organizations Secure in an AI World appeared first on Whitepaper Repository –. By Splunk 26 Jul 2024Artificial IntelligenceBusiness OperationsFinancial Services Industry whitepaper The Pharma Technology Playbook By Salesforce 25 Jul 2024Business OperationsEmerging TechnologyHealthcare Industry whitepaper Grounded in Data: One Connected Platform for Improved Patient Engagement By Salesforce 25 Jul 2024Big DataBusiness OperationsHealthcare Industry View all Video on demand videoFormer Secret Service agent explains the security mistakes we continue to makeDespite security training and improved security systems that aim to keep the bad guys out, ransomware and other malware continue to invade our systems due to human mistakes. Keith chats with Tulsa University Professor Justin Miller, a former Secret Service agent, about the top mistakes that end users, companies and governments continue to make in the realm of cybersecurity. Jul 25, 2024 48 minsCyberattacksCybercrimeSecurity New hacks keep summer heat on businesses Jul 23, 2024 41 minsHackingArtificial IntelligenceSecurity Does AI need to be for ‘everyone’? Jul 18, 2024 35 minsGenerative AIArtificial Intelligence It’s OK to call Apple Vision Pro a flop Jul 16, 2024 55 minsAugmented RealityAppleVirtual Reality See all videos Explore a topic Generative AI Office Suites Collaboration Software Productivity Software Windows Android Apple Augmented Reality Emerging Technology Mobile Remote Work Artificial Intelligence Operating Systems Careers View all topics All topics Close Generative AI Office Suites Collaboration Software Productivity Software Windows Android Apple Augmented Reality Emerging Technology Mobile Remote Work Artificial Intelligence Operating Systems Careers IT Leadership IT Management IT Operations Industry Cloud Computing Computers and Peripherals Data Center Enterprise Applications Networking Vendors and Providers Show me morePopularArticlesPodcastsVideos news analysis Apple is ready for government — and your business By Jonny Evans Jul 26, 20244 mins MacAppleiOS how-to Download our unified endpoint management (UEM) platform enterprise buyer’s guide By Bob Violino Jul 26, 20241 min Mobile Device ManagementMobile SecurityUnified Endpoint Management news brief Google's new AI system reaches a mathematical milestone By Viktor Eriksson Jul 26, 20241 min Generative AITechnology Industry podcast Is it fair to call the Vision Pro a flop? Jul 16, 202455 mins Augmented RealityAppleVirtual Reality podcast Podcast: Why a TikTok ban makes sense Jul 09, 202458 mins Government ITGovernmentInternet Security podcast Podcast: Are audio AI companies infringing on musicians' rights? Jul 01, 202433 mins MusicArtificial Intelligence video What will spatial computing look like in 2030? Jul 11, 202439 mins AppleAugmented RealityFacebook video Why a TikTok ban makes sense Jul 09, 202458 mins Government ITAerospace and Defense IndustryGovernment video Music companies strike back against audio AI Jul 01, 202433 mins MusicArtificial Intelligence