Google to Switch on E2EE for All Gmail Users

Google to Switch on E2EE for All Gmail Users

Google today announced a major new initiative set to boost corporate security, compliance and data sovereignty efforts, by making end-to-end encryption (E2EE) available to all users. Announced on the anniversary of the launch of Gmail, the plan is to roll out E2EE in beta – first to users within the same organization, then all Gmail users, and finally users of any email service. The tech giant explained that it has worked hard behind the scenes…

Read More

Building resilient and innovative security teams in the age of AI

Building resilient and innovative security teams in the age of AI

The promised land of AI transformation poses a dilemma for security teams as the new technology brings both opportunities and yet more threat. Threat actors are already using AI to write malware, to find vulnerabilities, and to breach defences faster than ever. At the same time, machine learning is playing an ever-more important role in helping enterprises combat hackers and similar. According to Palo Alto Networks, its systems are detecting 11.3bn alerts every day, including…

Read More

Lightmatter launches photonic chips to eliminate GPU idle time in AI data centers

Lightmatter launches photonic chips to eliminate GPU idle time in AI data centers

“Silicon photonics can transform HPC, data centers, and networking by providing greater scalability, better energy efficiency, and seamless integration with existing semiconductor manufacturing and packaging technologies,” Jagadeesan added. “Lightmatter’s recent announcement of the Passage L200 co-packaged optics and M1000 reference platform demonstrates an important step toward addressing the interconnect bandwidth and latency between accelerators in AI data centers.” The market timing appears strategic, as enterprises worldwide face increasing computational demands from AI workloads while simultaneously…

Read More

Network Visibility Module and Zeek Detections in Secure Network Analytics

Network Visibility Module and Zeek Detections in Secure Network Analytics

Secure Network Analytics version 7.5.2 has been released, offering exciting new features such as the Network Visibility Module (NVM) and Zeek detections. We are expanding our detections across existing and new sources, and our detections engine now ingests NVM telemetry and Zeek logs, introducing nine new alerts prominently displayed in Analytics. These alerts are also aligned with the widely recognized MITRE ATT&CK framework. By integrating a more diverse range of telemetry sources, Secure Network Analytics…

Read More

This Hisense 85-inch TV is still over $1,100 off on Amazon – and I highly recommend it

This Hisense 85-inch TV is still over ,100 off on Amazon – and I highly recommend it

Hisense/ZDNET The TV launch season is here, and while the latest sets from Samsung, LG, and Sony will surely bring the appeal (and premium price tag), consider this Hisense model if you want both an immersively large screen and affordability. Following Amazon’s Spring Sale event, you can still save up to $1,100 on the brand’s flagship U8 series TV.  Also: I tested TCL’s affordable Mini LED TV, and it made me forget about the OLED flagships…

Read More

I tested a subscription-free video doorbell that rivals Ring – and it's better in some ways

I tested a subscription-free video doorbell that rivals Ring – and it's better in some ways

ZDNET’s key takeaways The Eufy Security Video Doorbell E340 is normally available for $180 but is currently on sale. This doorbell features two cameras to give you complete visibility of the person at your door and any packages left on your porch, all with no monthly fees. Although the doorbell comes with 8GB of built-in local storage (enough for up to 60 days of event recordings), you need to add a Eufy Security HomeBase to…

Read More

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

Cybercriminals have ramped up their use of lookalike domains to facilitate a variety of targeted email-based social engineering and financial fraud scams, according to a new report by BlueVoyant. These attacks are particularly challenging to detect and enable attackers to extend the types of organizations and individuals who are targeted in such scams. The researchers found that threat actors target a range of critical sectors via such domains, including finance, legal services, insurance and construction….

Read More

The plan to decentralize TikTok

The plan to decentralize TikTok

Beata Zawrzel/NurPhoto via Getty Images The fight over the future of TikTok’s US operations has been a rollercoaster, to say the least. In January, the Supreme Court upheld the decision to ban the app in the US because its Chinese owner, ByteDance, had failed to sell it to a US-based company. However, President Trump granted the company a 75-day extension to find a buyer.  Now days away from the new deadline of April 5, the popular short-video…

Read More

I switched to a high-end dumbphone for a week, and it put E Ink (and my iPhone) to shame

I switched to a high-end dumbphone for a week, and it put E Ink (and my iPhone) to shame

ZDNET’s key takeaways The Light Phone 3 is available now with support from many major carriers for $599. It’s setting a new standard for simplified phones by combining a sleek, minimal product with a focused purpose. I wish the battery lasted longer, there are still some features in development, and it’s not exactly cheap. Much attention has been paid to the idea of a “dumbphone.” We’ve all had the thought: how liberating it would be…

Read More

Author of the Month: Andrew Pattison – IT Governance Blog

Author of the Month: Andrew Pattison – IT Governance Blog

This month, we are celebrating author Andrew Pattison! His book: NIST CSF 2.0 – Your essential introduction to managing cybersecurity risks was published in February 2025 and covers the latest updates to the NIST framework.   The NIST CSF (Cybersecurity Framework) 2.0 is designed to help organisations prevent and protect themselves from cyber attacks. This book will help you understand how to: Begin implementing the NIST CSF 2.0 in your organisation; Build a cyber security…

Read More
1 187 188 189 190 191 4,349