About Shane Berger

This author has not yet filled in any details.
So far Shane Berger has created 169 blog entries.

IT leader’s guide to cyberattack recovery

Cybersecurity prevention efforts shouldn’t overshadow your ability to respond and recover in the event of an attack. This ebook offers advice from security experts on how to recover from a cyberattack with the least amount of damage and disruption. From the ebook: Suffering a data breach can be catastrophic for a company—and for the people [...]

By | 2018-03-21T18:55:39+00:00 March 21st, 2018|Uncategorized|0 Comments

How companies can monetize big data with IoT data control

The oil and gas industry, auto manufacturers and more can maximize the value of IoT deployments with IoT data control. A Cisco exec explains how to manage data control and why it's necessary. IoT data control is a key way that companies can maximize the value of their Internet of Things deployments. It allows [...]

By | 2018-03-14T18:15:11+00:00 March 14th, 2018|Uncategorized|0 Comments

Salesforce launches conversational queries with Einstein Analytics

The new capability allows business users to type phrases related to their data and instantly view answers in automatically configured charts. Salesforce's new conversational queries will allow business users to 'have a conversation with their data.' It understands queries based on the type of data you are viewing and displays data in automatically configured [...]

By | 2018-03-12T13:25:43+00:00 March 12th, 2018|Uncategorized|0 Comments

Intel’s new Optane 800P SSD brings super fast storage at a hefty price

The new Intel Optane 800P is a next-gen drive that's faster than the typical SSD, but that performance boost comes at a cost. Intel has announced a new Optane 800P SSD, which uses Intel's Optane technology to speed up app loading times and reduce latency. The high performance of the Optane 800P comes at [...]

By | 2018-03-09T20:15:25+00:00 March 9th, 2018|Uncategorized|0 Comments

New vulnerability in Exim software allows hackers to gain control of your mail server

The popular mail server software has an off-by-one buffer overflow that can be exploited to run arbitrary code. A critical vulnerability in Exim allows attackers to remotely run arbitrary code without authentication. The vulnerability has been patched in version 4.90.1. A critical vulnerability has been discovered in Exim, a widely deployed mail transfer agent. With [...]

By | 2018-03-07T18:07:57+00:00 March 7th, 2018|Uncategorized|0 Comments

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because [...]

By | 2018-03-05T21:47:38+00:00 March 5th, 2018|Uncategorized|0 Comments

GDPR: Regulatory compliance is just the beginning

Joel Benavides, managing director of global legal services at Box, explains the policies enterprise companies can anticipate with cloud data management after the GDPR. We have just a few months until the GDPR hits. The road map has now become a very short sprint. TechRepublic met with Joel Benavides, managing director of global legal [...]

By | 2018-03-02T18:13:37+00:00 March 2nd, 2018|Uncategorized|0 Comments

How to protect Macs from malware threats

Read tips on how to secure Macs from malware, including ransomware, phishing, rootkits, viruses, and more. As malware threats increase in number and frequency, the next big attack could be looming just beyond the horizon. Which OS is the safest? I will give you a hint: If you believe it is Apple, that type [...]

By | 2018-02-28T20:22:22+00:00 February 28th, 2018|Uncategorized|0 Comments

Six tips to help you avoid targeted marketing

Do you ever get that feeling that advertisers are stalking your every move? At this point, most of us can recite a story from our own personal experience or that of a close friend or family member, where an ad had a particularly spooky kind of relevance. This sort of targeted marketing is not necessarily [...]

By | 2018-02-26T15:33:16+00:00 February 26th, 2018|Uncategorized|0 Comments

Series of critical bugs in NPM are destroying server configurations

A new version of NPM causes file permissions to be broken under certain circumstances, breaking other applications in the process. A combination of bugs and communication failures from NPM developers has resulted in an outbreak of headaches for system administrators. In version 5.7.0, running sudo npm will result in file permissions being reset across the filesystem, breaking [...]

By | 2018-02-23T17:27:11+00:00 February 23rd, 2018|Uncategorized|0 Comments