The first rule of edge compute thought leadership is: don’t overuse the term edge. Over the course of my blog series on the topic, I have defined the edge, explained edge computing, and discussed the economics of edge computing.
Consulting Firm Data Breach Impacts MSU
Michigan State University affected by ransomware attack on contractor’s law firm
IT Pros Share Work Devices with Household
Nearly a quarter of IT security professionals let household members use their work devices
Phishing Emails Most Commonly Originate from Eastern Europe
The five countries sending the highest proportion of phishing emails are from Eastern Europe
Chemical Weapon Shopping Sends Dark Web User to Prison
Broken-hearted American locked up for 12 years for trying to buy chemical weapon on dark web
Privacy Concern Over Scotland’s New #COVID19 Check-In App
Check In Scotland uploads and stores venue check-in data to a centralized database
Cybersecurity Industry Must Find Solutions for Third Party Data Security
The growing use of third parties has thrown up major data security challenges
Wormable Netflix Malware Spreads Via WhatsApp Messages
Check Point says threat is designed to phish for log-ins and card details
CISA: Patch Legacy SAP Vulnerabilities Urgently
Onapsis report claims some exploited bugs date back to 2010
CISA: Patch Legacy SAP Vulnerabilities Urgently
Onapsis report claims some exploited bugs date back to 2010