Carphone Warehouse suffers serious cyber attack

What has Carphone Warehouse lost?

Over the weekend, Carphone Warehouse admitted that it had suffered a data breach and that the records of a number of customers "may have been accessed." The problem here is the inexact...
Carpentry Tools

Chris Lalonde on carpentry and analytics

Chris Lalonde is a founder and the CEO of ObjectRocket, now a Rackspace company. He has held several senior technology roles during his career including eBay, Meraki Networks and Apptera. Enterprise Times spent...
Jeep

Are car manufacturers being disingenuous?

Car hacking has been back in the news in the last week, that's right, BACK in the news, when Wired Magazine published a story about hackers taking remote control of a...
Centrify State of the Corporate Perimeter Survey

Centrify highlights ex-employees access to data

Centrify has released the findings from a survey conducted in April that shows up to a third of ex-employees still have access to data. While some will feel this number is...
F-117A Nighthawk aircraft

US military faces years of ID theft

After admitting the loss of 4m records a week ago the Office of Personnel Management (OPM) must The story was first broken by the Associated Press and widely reported over the weekend by the...
US Navy Strategic Plan

US Navy Cyber Warfare plan

The US Navy has announced its five year strategic plan for cyberspace. This should come as no surprise as the US looks to retaliate against hacktivists, cyber terrorists and state sponsored...
FreeStor at Dresden

FreeStor aims to unify data services

FalconStor has released FreeStor a software defined storage layer that the company claims will deliver unified data services. First announced back in February,  FreeStor is being released in two phases. The first...
IBM Research scientist Jerry Chow

Quantum computing gets a little closer

Quantum computing was first mooted by the Nobel Prize winning physicist Richard Feynman in 1981. IBM scientists now believe that they have solved some of the key challenges to bringing Feynman's...
Outsystems Rapid Application Development

Mobility tops business requirements

Mobility is one of those areas of IT that most people believe is mainstream. The explosion of smartphones, tablets and laptops has led to a workforce that is more likely to...
Password-stealing-malware

POS and encryption lead 2014 cyber threats

A surge in attacks on Point of Sale (POS), payment systems and the increased use of encryption by cybercriminals are among the key findings in the latest Dell Security Annual Threat...

LATEST NEWS

Linking ; Image credit -Unsplash.com/bryson-hammer

Linking spreadsheets in Excel 19

A while ago I wrote a tip on how to consolidate two or more spreadsheets together. It occurred to me that maybe some of...
LogChain

LogChain completes international blockchain shipment

LogChain has completed, as part of its pilot program, a full cycle international blockchain-backed maritime shipment. This executed on its end-to-end, digital and tamper-proof...
gpi Link SWIFT r3

SWIFT’s ‘gpi Link’ meets Corda DLT for trade ecosystems

Back in January (2019) SWIFT added a proof of concept (PoC) to trial a new gateway - the 'gpi Link' - with R3's Corda....
Casting Aluminium at Norsk Hydro

Norsk Hydro shutdown by ransomware

Norsk Hydro, one of the largest aluminium producers in the world has been hit by a ransomware attack. The attack has forced the company...

Council of Clerks of Commercial Courts (NCC) deploys IBM-developed blockchain

The French National Council of Clerks (NCC) and IBM have developed a blockchain-based commercial court solution devoted to the clerks of commercial courts' commercial...
SAS invests $1 billion into AI

SAS to invest $1 billion in AI

Analytics vendor SAS is to invest US$1 billion in Artificial Intelligence (AI) over the next three years. The money will be spread across three...
2nd Watch selects RiverMeadow for cloud migration

RiverMeadow helps 2nd Watch migrate to the cloud

2nd Watch is to use RiverMeadow to help migrate client data and apps to the cloud. This deal sees 2nd Watch take advantage of...
Tide Protocol

Tide launches blockchain-based data marketplace 

Tide is a non-profit foundation with a blockchain protocol which seeks to address costly GDPR compliance, compensation and data accuracy issues. Its objective is...
Qlik donates 18 more courses to Data Literacy Project

Qlik boosts Data Literacy Project course library

The Data Literacy Project has just expanded its course library after data analytics vendor Qlik made 18 of its courses available. The project was...
BITC highlights problems with cyber security in SMBs

BITC claims small businesses key to preventing data breaches

Business in the Community (BITC) is claiming that small businesses are the key to preventing data breaches in the future. It's relatively easy to...
NAO slams UK Cyber Security Programme

NAO calls UK Government Cyber Security Programme a farce

In 2016, the government announced it was to invest £1.9 billion in a National Cyber Security Strategy. The announcement came with a lot of...
Certik

CertiK to audit smart contracts on LTO Network

CertiK is introducing an LTO Network Live Contract Audit. The relevant, auditable, Live Contracts run on LTO Network, a hybrid blockchain platform for decentralised...
EQT completes acquisition of SUSE

EQT completes aquisition of SUSE from Micro Focus

EQT Partners has completed its acquisition of SUSE from Micro Focus. The deal was first announced in July 2018 with EQT paying US$2.5 billion...
Columns - image credit / unsplash.com/Héctor J.Rivas

Change and keep column settings in Explorer 10

You would be amazed how many times I get asked this question. “How do I keep the settings of particular columns in Explorer for...