The plan to decentralize TikTok

The plan to decentralize TikTok

Beata Zawrzel/NurPhoto via Getty Images The fight over the future of TikTok’s US operations has been a rollercoaster, to say the least. In January, the Supreme Court upheld the decision to ban the app in the US because its Chinese owner, ByteDance, had failed to sell it to a US-based company. However, President Trump granted the company a 75-day extension to find a buyer.  Now days away from the new deadline of April 5, the popular short-video…

Read More

I switched to a high-end dumbphone for a week, and it put E Ink (and my iPhone) to shame

I switched to a high-end dumbphone for a week, and it put E Ink (and my iPhone) to shame

ZDNET’s key takeaways The Light Phone 3 is available now with support from many major carriers for $599. It’s setting a new standard for simplified phones by combining a sleek, minimal product with a focused purpose. I wish the battery lasted longer, there are still some features in development, and it’s not exactly cheap. Much attention has been paid to the idea of a “dumbphone.” We’ve all had the thought: how liberating it would be…

Read More

Author of the Month: Andrew Pattison – IT Governance Blog

Author of the Month: Andrew Pattison – IT Governance Blog

This month, we are celebrating author Andrew Pattison! His book: NIST CSF 2.0 – Your essential introduction to managing cybersecurity risks was published in February 2025 and covers the latest updates to the NIST framework.   The NIST CSF (Cybersecurity Framework) 2.0 is designed to help organisations prevent and protect themselves from cyber attacks. This book will help you understand how to: Begin implementing the NIST CSF 2.0 in your organisation; Build a cyber security…

Read More

In turbulent political times, IT can be a difference maker

In turbulent political times, IT can be a difference maker

The always-evolving global economy has become hyper-politicized. Despite the old line that the US government is, in all actuality, little more than a military attached to an insurance company, the seldom-of-the-same-mind three anchors on CNBC’s Squawk Box recently stated that they can’t talk about the economy without talking about American politics — specifically tariffs and White House/agency interventions. CEOs at Big Tech, Big Media, Big Agriculture, and Big Manufacturing and other important societal actors are…

Read More

Why no small business is too small for hackers – and 8 security best practices for SMBs

Why no small business is too small for hackers – and 8 security best practices for SMBs

PM Images/Getty Images I have given hundreds of cybersecurity-related webcasts and presentations, written hundreds of cybersecurity-related articles, and been involved in hundreds of one-on-one cybersecurity-related meetings with clients. Someone will always respond, comment, or protest that their business is too small for a hacker’s attention. Small target illusion But none of these folks understand the economics of a hack when it comes to small businesses. There isn’t a random guy out there who’s decided to…

Read More

Help! I clicked on a phishing link – now what?

Help! I clicked on a phishing link – now what?

ZDNET When you think of phishing emails, you probably think of the crude, grammatically flawed, easy-to-spot samples that go straight to your junk folder. I regret to inform you that those weak “spray and pray” campaigns are yesterday’s news. The crooks haven’t gotten smarter, but their tools have. Also: These phishing attacks are targeting Mac browsers – how to protect yourself With the help of generative AI, online scammers have become dramatically better at crafting and…

Read More

Cyber Security and Resilience Bill Will Apply to 1000 UK Firms

Cyber Security and Resilience Bill Will Apply to 1000 UK Firms

A major new cybersecurity law set to come into force later this year will demand new compliance requirements of 1000 UK organizations, the government said today. The Cyber Security and Resilience Bill is the government’s long-awaited answer to the EU’s NIS2 – a new piece of legislation that builds on the European NIS Directive of 2016. The UK’s interpretation of that directive, known as NIS Regulations 2018, has been due an update for several years….

Read More

Japan Passes Active Cyber Defense Bill

Japan Passes Active Cyber Defense Bill

Over the past few years, many countries have made considerable efforts to bolster cybersecurity preparedness. These efforts are understandable when put into a geopolitical context: global relationships in the past five years have been among the most tumultuous in decades, cybersecurity threats are more sophisticated than ever, and the world is increasingly reliant on digital technologies. However, many of these cybersecurity preparedness efforts are remarkably alike, with most of them including risk management frameworks, incident…

Read More

Top Cybersecurity Considerations When Moving Commercial Premises

Top Cybersecurity Considerations When Moving Commercial Premises

When relocating office locations domestically or internationally, organizations must ensure the safe passage and management of more than just their physical assets and hardware.   The complex cybersecurity obstacles before, during, and after an operational overhaul can outnumber the physical difficulties of getting operations moving. On the digital side, failing to maintain proper cyber hygiene can disrupt operational consistency and pose several regulatory compliance concerns, which no organization wants to endure.   A lack of cybersecurity awareness and training has…

Read More

Your Phone Is the #1 Target in a New Wave of IRS Scams, McAfee Finds | McAfee Blog

Your Phone Is the #1 Target in a New Wave of IRS Scams, McAfee Finds | McAfee Blog

As Tax Day looms and last-minute taxpayers feel the pressure, a surge of IRS scams is on the rise.   Research by our McAfee Labs team projects a fresh wave of sophisticated tax scams as the stress of peak filing season sets in, with bogus text messages leading the way.   Nearly half of taxpayers complete their taxes between mid-March and April 15, which gives scammers ample opportunity to cash in as people rush their filings with…

Read More
1 189 190 191 192 193 4,350