Day: February 20, 2020

Best rugged laptops for business in 2020: Dell Latitude, Panasonic Toughbook, Lenovo ThinkPad, and more

Which rugged laptop is the best fit for your business? Whether you need a notebook that can handle run-of-the-mill drops and spills, or one that can operate in extreme conditions, one of these nine rough-and-tough laptops should fit the bill. …read more Source:: ZDNet


UK Google users to lose EU data protection due to Brexit – CNET

The tech giant is reportedly transferring control of UK Google accounts to the US and out of the jurisdiction of EU privacy regulators. But the GDPR will still apply. …read more Source:: CNet


No Huawei gear in vital 5G project to bring virtual-reality Robin Hood to Sherwood Forest

Rural trials will not use equipment ‘from high risk vendors’ says Ministry of Fun The UK’s Department for Digital, Culture, Media and Sport (DCMS, aka the Ministry of Fun) has barred Huawei gear from rural 5G trials.… …read more Source:: TheRegister


Sony’s budget Xperia L4 goes the triple camera route – CNET

Sony has revealed its entry-level Xperia L4 phone will have three cameras including an ultra-wide lens and will also boast a 6.2-inch screen. …read more Source:: CNet


Samsung Sparks Confusion After Sending Out Mysterious ‘1’ Notification To Smartphones

Users of Samsung’s Galaxy smartphones got a surprise Thursday morning as they were sent a random notification for its mobile tracking app . From a report: The notification, which some CNBC employees also received, was for Samsung’s own “Find My Mobile” app and showed the number “1” twice, with no other information. Once clicked on,…


5 Strategies to Secure Cloud Operations Against Today’s Cyber Threats

With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud’s many benefits: …read more Source:: DarkReading


The Linux Foundation Identifies Most Important Open-Source Software Components and Their Problems

The Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH) have revealed — in “Vulnerabilities in the Core, a preliminary report and Census II of open-source software” — the most frequently used components and the vulnerabilities they share. From a report: This Census II analysis and report is the…


Keen to check for ‘abnormal’ user behaviours? Microsoft talks insider risk, AWS imports and compliance at infosec shindig RSA

Before you remove the mote from thy hacker’s eye, remove the beam from the eyes of your, er, Teams RSA As IBM’s crew cancels their hotel rooms, Microsoft’s infosec staffers are still set to attend the decades-old RSA conference and pulled the covers off a raft of security releases and previews for the event today.……


10 Tough Questions CEOs Are Asking CISOs

CEOs today are prepared with better questions than ‘Are we secure,’ and chief information security officers had better be ready to answer. …read more Source:: DarkReading


Fortnite Chapter 2 season 2 Top Secret adds spies and Deadpool – CNET

Make my Slurp Juice shaken, not stirred. …read more Source:: CNet