Tuesday, May 17, 2022
Jeep

Are car manufacturers being disingenuous?

1
Car hacking has been back in the news in the last week, that's right, BACK in the news, when Wired Magazine published a story about hackers taking remote control of a...
Centrify State of the Corporate Perimeter Survey

Centrify highlights ex-employees access to data

0
Centrify has released the findings from a survey conducted in April that shows up to a third of ex-employees still have access to data. While some will feel this number is...
F-117A Nighthawk aircraft

US military faces years of ID theft

0
After admitting the loss of 4m records a week ago the Office of Personnel Management (OPM) must The story was first broken by the Associated Press and widely reported over the weekend by the...
US Navy Strategic Plan

US Navy Cyber Warfare plan

0
The US Navy has announced its five year strategic plan for cyberspace. This should come as no surprise as the US looks to retaliate against hacktivists, cyber terrorists and state sponsored...
FreeStor at Dresden

FreeStor aims to unify data services

0
FalconStor has released FreeStor a software defined storage layer that the company claims will deliver unified data services. First announced back in February,  FreeStor is being released in two phases. The first...
IBM Research scientist Jerry Chow

Quantum computing gets a little closer

0
Quantum computing was first mooted by the Nobel Prize winning physicist Richard Feynman in 1981. IBM scientists now believe that they have solved some of the key challenges to bringing Feynman's...
Outsystems Rapid Application Development

Mobility tops business requirements

0
Mobility is one of those areas of IT that most people believe is mainstream. The explosion of smartphones, tablets and laptops has led to a workforce that is more likely to...
Password-stealing-malware

POS and encryption lead 2014 cyber threats

0
A surge in attacks on Point of Sale (POS), payment systems and the increased use of encryption by cybercriminals are among the key findings in the latest Dell Security Annual Threat...

LATEST NEWS

Percona announces general availability of the Percona Platform (Image Credit: Percona)

Percona announces general availability of the Percona Platform

0
At Percona Live, Percona has announced the general availability of the Percona Platform. Percona describes it as "A unified experience for developers and database...
Retail - Image by Megan Rexazin from Pixabay

Retail is transforming with omnichannel and sustainability important

0
In a small survey of 100 respondents, Red Ant, the retail platform vendor, has unearthed some interesting insights into the state of retail. The...
Brits still failing when it comes to password hygiene (Image Credit: Gerd Altmann from Pixabay)

Brits still failing when it comes to password hygiene

0
Brits are still failing badly when it comes to password hygiene according to a new study by Beyond Identity. It seems one in four...
Stork Dawn Image by Mabel Amber from Pixabay

Kantata rises for the new dawn of Kimble and Mavenlink

0
Kantata is the new brand name for the combined organisations comprising Mavenlink and Kimble Applications. Kantata instantly becomes a major force in the professional...
Blockchain Catch-up

Charles Brett’s Blockchain Catch-up 2022-Week 19

0
This is Charles Brett's start-of-the-week Enterprise Times ‘blockchain catch-up’ 2022-Week 19. Necessarily it is idiosyncratic and selective. It is not intended to be comprehensive but...
AwareGO releases Human Risk Assessment for SMEs (Image Credit: Headway on Unsplash)

AwareGO releases Human Risk Assessment for SMEs

0
AwareGO has released its Human Risk Assessment for SMEs. The product is aimed at helping SMEs understand the risk that employees pose to the...
The Formulate team joining RELEX (c) 2022 RELEX

RELEX Formulates promotion planning with an acquisition

0
RELEX Solutions has acquired Formulate, a Swedish firm that delivers an enterprise analytics solution for evaluating, predicting and planning retail promotions. This strengthens its...
Acquia (credit image/Pixabay/Pixelkult)

Acquia Research suggests UK public distrust of social media

0
Research published by Acquia highlight the UK’s public’s distrust of social media due to privacy concerns. 59% of UK consumers are reluctant to part...
LawAdvisor Ventures - Image by TheDigitalWay from Pixabay

Is this the start of something big in Lawtech

0
London headquartered Lawtech firm LawAdvisor Ventures has raised US$5 million in a seed round led by some significant industry angel investors. The funding will...
Immersive Labs Crest Partnership Image by Gerd Altmann from Pixabay

Immersive Labs and CREST partner to develop cybersecurity skills

0
CREST and immersive Labs partner up to improve cybersecurity skills for CREST members. The deal will see CREST members get access to the Immersive...
Apple Linux macOS Image by OpenClipart-Vectors from Pixabay

Pulseway delivers the Glue for Mac and Linux

0
Pulseway recently revealed that they had improved functionality for endpoints using macOS and Linux to their RMM solution and deepened the integration to IT...
Lady Justice Legal Law Image by jessica45 from Pixabay

Icertis streamlines Contract Matter Management

0
Icertis has announced Icertis Matter Management. It's a new application that will be generally available in June and aims to make life easier for...
Sirion Labs funding - Image by TheDigitalWay from Pixabay

SirionLabs doubles funding in Series D round

0
SirionLabs has secured $85 million in a Series D funding round led by the Partners Group. Its existing investors, Sequoia Capital and Tiger Global,...
What is a HEAT attack? (Image Credit: Photo by Tima Miroshnichenko)

What is a HEAT attack?

0
What is a HEAT attack? To get the answer to that, Enterprise Times talked with Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo...