GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

Tech News Recap for the Week of 8/15/2016

Posted by: GreenPages Blog
Read More
All Posts

Tech News Recap for the Week of 8/15/2016

Were you busy this week? Here’s a tech news recap of articles you may have missed for the week of 8/15/2016!

Eddie Bauer is latest retailer to be hit by point-of-sale malware as customer payment card information was stolen. vSphere ESXi 5.0 and 5.1 is end-of-support on August 24th. A data breach at Sage is a reminder that threats aren't just from external hackers but also from internal employees. Macy's is trying to make the shift to its digital business, Salesforce buys analytics startup BeyondCore, and more top news you may have missed this week!

Remember, to stay up-to-date on the latest tech news throughout the week, follow @GreenPagesIT on Twitter.

Tech News Recap

 

Hear from two IT executives on their experience of moving to a Managed Services model

 

By Ben Stephenson, Emerging Media Specialist

 

 

Comments

Related Posts

Tech News Recap for the Week of 03/01/21

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 03/01/21!

Microsoft Exchange Zero-Day Vulnerabilities Being Actively Exploited in The Wild

By Randy Becker, CISO & VP, Network and Security Consulting It isn’t common for Microsoft to release a security update for an 11-year-old server application. So, when they do, people take notice. Especially when tied to Email. Microsoft has just released out-of-band security updates for a zero-day exploit that is actively being exploited in the wild. Of significant importance is that this is for all supported Microsoft Exchange versions plus Exchange 2010.

Zero Trust Does Not Mean Zero Access

By Randy Becker, CISO & VP, Network and Security Consulting Zero Trust is not new, but it has recently started to show up a lot in security circles. A quick search shows that there are a lot of organizations with thoughts on this topic. Given the infamous SolarWinds breach, we are starting to hear more about “Zero Trust,” “Defense in Depth,” and my personal favorite “Assume the Breach.” Last Friday CISA quietly posted the following important guidance on Zero Trust: NSA Releases Guidance on Zero Trust Security Model. This should be on the short list of reading for everyone.