Industry News Feed

  • eWeek Security
  • eWeek Mobile
  • eWeek Innovation
  • MIT Technology Review

Companies continue to face the possibility of data breaches because they are not adequately protecting their data. They need to take five fundamental steps to boost data security.

NEWS ANALYSIS: For most users of Intel processors, the fix that will prevent Foreshadow attacks from working is already available, but there are still steps that must be taken to be safe.

Facebook has lived up to a pledge made a year ago to invest in cyber-security research that helps to improve the internet.

TrueVault looks to help organizations meet regulatory compliance including GDPR and the upcoming California Consumer Privacy Act.

RSA has released its second-quarter 2018 fraud report, finding increasing risks from mobile apps and devices.

Another set of side-channel, speculative execution vulnerabilities have been publicly reported by security researchers; this time the vulnerabilities take specific aim at SGX secure enclave and hypervisor isolation boundaries.

Research reveals how Americans feel about digital activity monitoring in the workplace and steps public and private sector organizations can take to gain the support of employees and to avoid violating their privacy.

At Defcon, security researchers revealed 37 new vulnerabilities in tracking apps that could have enabled attackers to steal information and track users.

REVIEW: The venerable T-Series line of ThinkPad laptops continues with improvements that keep these computers current and relevant, while retaining their looks and toughness.

DAILY VIDEO: Qualcomm Snapdragon 670 brings AI to mainstream mobile phones, and Dell EMC targets AI workloads with integrated systems.

NEWS ANALYSIS: An investigation by the Associated Press and Princeton University reveals that Google location tracking continues even when you turn it off and stopping it is difficult.

Universal Acceptance (UA) is the concept of removing all technical barriers that might hinder a user from accessing any name in any top-level domain (TLD) from any web browser, email client or other internet application on a connected device.

Lenovo also announced the new ThinkPad P72 laptop with powerful graphics for enterprise professionals.

TradeIt’s home-developed APIs (application programming interface) for app developers are setting the table for highly secure functionality that covers any type of international trade format.

DAILY VIDEO: Samsung's Latest Note 9 Smartphone Gets Bigger Screen, More Storage; Car Hackers Discuss What It Takes to Secure Autonomous Vehicles.

Mobile processors such as Qualcomm’s Snapdragon 670 will be important to support the business applications with built-in artificial intelligence capabilities.

The company's software is designed to automate any process end-to-end and run independently with minimal human intervention.

Machine-learning systems need to be shown video information over and over, so they can remember it all. This new platform creates training data up to 100 times faster than human-only solutions.

Universal Acceptance (UA) is the concept of removing all technical barriers that might hinder a user from accessing any name in any top-level domain (TLD) from any web browser, email client or other internet application on a connected device.

TradeIt’s home-developed APIs (application programming interface) for app developers are setting the table for highly secure functionality that covers any type of international trade format.

The company provides a customer-engagement platform using chatbots that deploys two-way persistent connection via private messaging with AI-backed conversational experiences, or “pypes.”

Disqus adopted Looker in 2015 as its primary BI tool. It immediately became an instrumental tool that allowed the company to operate the business more efficiently.

By 2020, IoT devices are expected to grow to 31 billion in use globally, and by 2025, the number will surpass 75.4 billion devices. That’s a lot of potential attack surfaces. Everything has to be protected.

SOLUTION ANALYSIS: Before Q2 eBanking found AppDynamics, it had been using a patchwork of tools to monitor an IIS and C# backend paired with a Node.js and Docker front end, with a heavy reliance on logs.

These experts say they can divine political preferences you can’t express from signals you don’t know you’re producing.

Increased use of machine learning and cloud services could make the financial world more vulnerable.

To understand how digital technologies went from instruments for spreading democracy to weapons for attacking it, you have to look beyond the technologies themselves.

FiscalNote takes the intuition out of politics. Does it take the democracy out, too?

It’s taken years of work and billions of dollars in venture funding to build a working mixed-reality headset for developers. Now what?

Machine learning and artificial intelligence can help guard against cyberattacks, but hackers can foil security algorithms by targeting the data they train on and the warning flags they look for.

The success shows that advances in artificial intelligence aren’t the sole domain of elite programmers.

It’s taken years of work and billions of dollars in venture funding to build a working mixed-reality headset for developers. Now what?