Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology news stories each week. Microsoft discovers new botnet capabilities Microsoft […]
Latest Content
Microsoft: Basic Auth Will be Disabled Next Month
Microsoft will permanently turn off basic auth for multiple protocols for many Exchange Online tenants next month.
With a holiday break upon us, Microsoft is again warning Exchange customers of deprecation of basic authentication in Exchange, which will take place early in the new year once employees come back from a long break. The Redmond, Wash.-based IT giant has been warning customers of this move for awhile, and the time has finally […]
Microsoft Discovers macOS Security Bypass Bug
Microsoft says it has uncovered a vulnerability in macOS that could allow attackers to bypass Apple’s Gatekeeper security mechanism.
Microsoft says it has uncovered a vulnerability in macOS that could allow attackers to bypass restrictions imposed by Apple’s Gatekeeper security mechanism, which is designed to ensure that only trusted apps run on the company’s devices. According to Microsoft’s Security Threat Intelligence team, the vulnerability, it calls Achilles, could allow attackers to bypass Gatekeeper and […]
Sony Electronics Launches Device Management Platform for Professional Display Solutions
Sony’s new cloud-based Device Management Platform will help managed service providers automate the display provisioning process.
Paramus, N.J.-based Sony Electronics’ new Device Management Platform (DMP), optimized for Sony’s BRAVIA professional displays, is comprised of two solutions. One enables remote device management; a second is for secure and quick device setup and distribution. By defining a device and required applications for a given project, Sony’s DMP helps Managed Service Providers (MSP) automate […]
FBI: Beware of Search Engine Ads
Cybercriminals are using search engine ads to deploy malware and steal credentials, FBI says in new warning.
The FBI is urging organizations and their end users to be careful when using search engines as cybercriminals are using search engine advertisement services to impersonate brands and direct users to fake websites designed to steal credentials and deploy ransomware. According to a public service announcement from the FBI, cybercriminals have been buying advertisements that […]
Gaining Buy-In for Innovation Investment
When the focus is on business transformation through IT innovation, the results can be powerful and lead to growth.
Every organization, regardless of its level of success, must continuously evolve and transform. It is a necessity for any organization that seeks to grow, but when the focus is on transformation through IT innovation, the results are particularly powerful. Leaders driving the digital agenda require a holistic mindset of understanding the market and industry needs […]
NETGEAR Releases New WAX220 WiFi Access Point for SMBs
NETGEAR's WAX220 WiFi 6 Access Point is a new dual-band WiFi access point designed for small business owners.
NETGEAR is releasing the WAX2220 WiFi 6 Access Point, a new dual-band WiFi access point designed for small business owners who want a budget-friendly option, quick configuration, and fast and secure WiFi. According to the San Jose, Calif.-based firm, the WAX220 is designed to be an easy-to-use, budget-friendly WiFi solution for small businesses that delivers […]
Utelogy Attains SOC 2 Type II Standards in Data Security
Utelogy's information security practices, policies, procedures and operations meet the SOC 2 Type II standards for security.
Utelogy Corp., the Los Angeles-based provider of management, monitoring and analytics software for connected workspaces, recently completed its Service Organization Control (SOC) 2 Type II certification. Conducted by Armanino, the audit affirms that Utelogy’s information security practices, policies, procedures and operations meet the SOC 2 standards for security. Armanino is a top 25 accounting and […]
Axonius Updates SaaS Management Offering
Axonius' latest updates further enhance the comprehensive visibility and correlation across SaaS apps, devices and users, streamlining efforts to reduce organizations’ attack surface.
Axonius, the New York-based provider of cybersecurity asset management and SaaS management, released two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk. According to the company, behavioral analytics and SaaS app-to-device correlation allow IT and security teams to gain added visibility and context into the users and […]
The Metaverse Presents Opportunity, but Also Security Risks
The metaverse is emerging as a valuable new business and consumer tool, but it also comes with a new set of security concerns.
The metaverse is emerging as a new technology that both consumers and businesses see as valuable for communication, collaboration, enhanced services, entertainment and real estate, but those hopes also come with the same security concerns any IT professionals have about a new technology. Nearly 70% of organizations are planning to do business in the metaverse […]