Qlik outlines 10 areas that technology leaders will need to consider to get the most out of their data strategy.
Nordics
What will happen after the end of cookies?
Google will start phasing out third-party cookies this summer. What technologies will be needed to continue to learn about customers and improve customer satisfaction in this new cookie-free era?
Microsoft Monitors 100 Active Ransomware Groups
They attack their victims with more than 50 ransomware families. The cybercriminals often gain access to networks via phishing. Ransomware-as-a-service contributes to the success of the cyber extortion business model.
Router Update Cripples Microsoft’s Online Services
Actually only an IP address should be changed. A command used for this purpose paralyzes parts of Microsoft's Wide Area Network via a router. Systems for automatic error correction are also affected.
Gartner: PC Market Expected to Shrink by 6.8 Percent in 2023
Sales figures for tablets and cell phones are also likely to decline this year. Gartner bases its forecast on weakened demand due to inflation.
AI-based Analyses of Disease Symptoms
EU privacy-compliant voice biomarker research platform for faster diagnosis of health conditions.
One in 10 Large Companies Has Mature Zero Trust Program in 2026
Gartner: Zero trust is an important strategy for reducing risk, however few companies have actually implemented zero trust to date.
Windows 11: Microsoft Tests Third-Party Widgets
The widget for Facebook Messenger is available as a preview. Developers need version 1.2 of the Windows App SDK.
Online Banking with Video Avatar
EVA supports customers of Sparkasse Rhein Neckar Nord with questions about online banking.
IT Education in Schools: Germany Lagging Behind in Europe
Education alliance of SMEs warns: Collapse of all digitization projects is looming.
After Hacker Attack: PayPal Reports Loss of Customer Data
Around 35,000 accounts are affected. Unknown persons capture names, addresses and social security numbers, but no financial data. The trigger is a credential stuffing attack.
Twitter: Data Leak Not Due to System Error
However, a small part of the currently offered data originates from an earlier security incident. Twitter assumes that the leak was compiled from sources already publicly available.
Crypto-Inspired Magecart Skimmer
Malwarebytes has discovered a skimmer that uses the "Mr.SNIFFA" framework and targets e-commerce websites and their customers.
Vulnerabilities in the Medical IT Infrastructure
Serious security vulnerabilities in the medical sector. Hospitals are increasingly falling victim to cyberattacks.
Salesforce Lays Off More Than 10,000 Employees
CEO Mark Benioff takes responsibility for a misguided staffing policy during the Corona pandemic. Salesforce is also reducing its office space.
LastPass: Hackers Also Capture Customers’ Password Safes
The safes also contain non-encrypted data. However, these are in a proprietary format. LastPass emphasizes that all passwords are secured by 256-bit AES encryption.
Unauthorized Use of Location Data: Google to Pay Another $29.5 Million
The money will go to the states of Washington DC and Indiana. They do not join the settlement reached in November with about 40 US states.
Learning From Your Own Digital Transformation
PwC advises companies on their digital transformation. What insights have the consultants gained on their own journey?
High-Security, Quantum-Resistant Networks
Munich Quantum Network at the University of the Federal Armed Forces Munich achieves milestone with newly developed key management system.
Certificate for Sustainable Data Centers
TÜV Rheinland "Sustainable Data Center" certificate attests to the sustainability of data centers. Uniform standards for energy efficiency.
Hornetsecurity Aims to Turn Employees into Human Firewalls
Launches Security Awareness Training service to raise corporate cybersecurity awareness.
Trends Episode 15: Connected Cars Increasingly Targeted by Cyber Attacks
Increase in cyberattacks in the home office, software supply chain and cloud.
Couchbase and Amazon Team up in the Cloud
A multi-year partnership agreement will drive technology integrations and commercial activities, facilitating the migration to Couchbase Capella on AWS.
Laserway, Furukawa’s Solution for Hotel Connectivity
Laserway is designed to cover large areas such as exhibition centres, tourist areas and hotel complexes.
Microsoft Closes Six Critical Security Gaps
The December patchday also brings a fix for a zero-day vulnerability. In total, Microsoft eliminates 56 vulnerabilities. Windows, Edge, Office, SharePoint, Azure and Hyper-V are among those affected.
Trends Episode 10: Future of Work
Real experienced collaboration: shifting from task-oriented to interaction-oriented workspaces.
The 5 Most Common Cyberattacks in 2022
Vulnerabilities in 2022 have increased by 23% compared to 2020.
Jeroen Hoogland becomes CEO of Trust
The new CEO completes the board alongside CFO, COO and CCO Allard Boer, Martijn Lutgerink and Dorothee de Backer.
Qatar World Cup sparks cyber-attacks
Messages offering last-minute tickets or communicating supposed winnings from a bet are some of the threats detected.
Cyber Deception – One of the Most Powerful IT Security Approaches
Cyber-Deception is one of the most effective and powerful approaches the computer security industry has perhaps ever seen.