In a move that represents a growing offensive against cybercriminals, Microsoft, cybersecurity firm Fortra and Health Information Sharing and Analysis Center have taken action to disrupt ransomware groups that have been observed attacking healthcare organizations in more than 19 countries. According to Microsoft, the company’s Digital Crimes Unit (DCU), Fortra and Health Information Sharing and […]
Latest Content
Microsoft Announces Windows 365 Frontline for Shift Workers
Microsoft is expanding its cloud PC offering with Windows 365 Frontline, a new offering designed specifically for shift workers.
Microsoft is expanding its cloud PC offering with Windows 365 Frontline, a new offering designed specifically for shift and part-time workers. The Redmond tech giant calls Windows 365 Frontline an easy and affordable way for organizations to expend the power and security of Cloud PCs to shift workers, giving users access to their personalized Windows […]
Check to See If Your Organization’s Credentials Were on Genesis Market
Dark web initial access marketplace Genesis Market has been seized, and organizations can check to see if they were compromised.
Genesis Market, online criminal marketplace that advertised and sold packages of stolen credentials that threat actors use to compromise accounts in the financial sector, critical infrastructure and federal, state and local government agencies, has been dismantled by a coalition of international law enforcement agencies. According to a news release from the U.S. Department of Justice, […]
Q-SYS Unveils Latest Network Video Endpoint NV-21-HU
Q-SYS' new software-configurable NV-21-HU peripheral adds single-cable option for distribution, bridging and charging.
Costa Mesa, Calif.-based QSC, developers of the Q-SYS networked audio, video and control platform, announced the latest addition to its native network video solutions by introducing the NV Series NV-21-HU. This is a two-input, one-output endpoint with support for HDMI and USB-C. According to the company, the NV-21-HU thus simplifies installation with a single-cable solution […]
Businesses Beware: April is the Most Dangerous Month for Ransomware Attacks
The month of April is expected to be a high-risk month when it comes to ransomware attacks, according to NordLocker research.
The month of April has been identified as the most dangerous period in terms of ransomware attacks, according to research by end-to-end file encryption provider NordLocker. Last year, the month of April saw 294 ransomware incidents, the most attacks per month in all of 2022. Most of these attacks were carried out against U.S. and […]
Rocket Software Launches Rocket Content Automation for Data Modernization
Rocket Content Automation is a new tool designed to enable critical operational connections between disparate systems and data sources.
Enterprise software firm Rocket Software is unveiling Rocket Content Automation, a new tool designed to enable critical operational connections between disparate systems and data sources without introducing mainframe migration or compliance risks. According to the Waltham, Mass.-based company, Rocket Content Automation helps drive collaboration between business and IT by creating seamless automation experiences across the […]
AWS Launches Clean Rooms to Help Companies Collaborate on Datasets
AWS Clean Rooms, an analytics service that enables organizations and partners to collaborate on datasets securely, is now generally available.
Amazon Web Services is launching the general availability of AWS Clean Rooms, an analytics service of AWS Applications designed to help organizations and their partners more easily and securely collaborate on their collective datasets without sharing or copying each other’s data. According to the tech giant, the solution allows customers to quickly create a secure […]
Backup and Storage Devices Contain an Average of 14 Security Issues
Research from cyber resilience company Continuity shows that enterprise backup and storage devices need to be more secure.
With storage and backup devices often representing the last line of defense against ransomware attacks and outages, they should be as secure as possible so organizations can restore their data in a critical time of need. However, new research from cyber resilience company Continuity shows that the average enterprise storage and backup device has 14 […]
Three Considerations Before Deploying Generative AI Tools
Organizations should ensure they are insulated from data security issues, innovation risk and ethical concerns when deploying generative AI.
While ChatGPT and generative AI are largely hailed as tools that will usher in a new era of working defined by intelligent assistants and automation, there are a handful of concerns around the technology’s use, including privacy, security, the pace of innovation and ethics. The technology is exciting and has the power to unlock new […]
The ABCs of Contact Centers: The Tech Driving Modern Customer Experience
Generative AI technology in contact centers is changing the customer experience for good and companies are reaping the benefits.
The contact center industry is booming and for good reason — businesses are catching on to the transformative impact that a high-velocity contact center can have on their bottom line. Emerging technology is making contact centers more effective than ever before, and more importantly, helping to change their historically negative perception. According to Statista, the […]