About Shane Berger

This author has not yet filled in any details.
So far Shane Berger has created 217 blog entries.

Why the human factor is an evergreen problem in cybersecurity

Employee errors in business are a critical threat to nearly half of organizations. Here's how they are trying to solve it.   The human factor is a key concern for businesses trying to keep networks secure, according to Kaspersky Lab's State of Industrial Cybersecurity 2018 survey. With 40% of Internet Connection Sharing (ICS) computers [...]

By |2018-08-17T12:48:50+00:00August 17th, 2018|Uncategorized|0 Comments

Data recovery do’s and don’ts for IT teams

Operational data recovery is often overlooked for disaster recovery, but it's probably more important. If your organization's approach to everyday data recovery is "wing it," you're doing it wrong.   It's easy for IT staffers to get bogged down in the daily business of making backups or in the long-term concerns for disaster planning while [...]

By |2018-08-15T19:29:30+00:00August 15th, 2018|Uncategorized|0 Comments

Black Hat: Protecting Industrial Control System

Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days. While industrial control protocols themselves are horribly insecure, there is an attempt to bolt on security hardware [...]

By |2018-08-13T15:41:14+00:00August 13th, 2018|Uncategorized|0 Comments

5 ways machine learning makes life harder for cybersecurity pros

While many companies are turning to machine learning tools to fight hackers, they may not be as helpful as they seem thanks to a talent shortage and a lack of transparency.   By the end of 2017, some 61% of businesses had implemented artificial intelligence (AI) into their organizations—a 23% jump from the [...]

By |2018-08-10T14:27:28+00:00August 10th, 2018|Uncategorized|0 Comments

Installing Windows apps on Linux is about to get easier with Winepak   If you've ever wanted to make the switch to Linux, but the idea of leaving behind Windows apps always seemed to be a stumbling block, you might know about Wine. Wine is a compatibility layer capable of running Windows applications on Linux and other POSIX-compliant operating systems. However, to many users, Wine itself [...]

By |2018-08-08T13:18:14+00:00August 8th, 2018|Uncategorized|0 Comments

5 reasons IT struggles to innovate and keep core business systems running

The expanding role that business leaders expect from IT comes with many challenges, according to an Insight Enterprises report.   The IT function is evolving to meet business needs. But 87% of IT decision-makers said that the department struggles to adapt to an expanding role that includes leading innovation initiatives while also keeping [...]

By |2018-08-06T13:25:13+00:00August 6th, 2018|Uncategorized|0 Comments

Less than 30% of SMBs have an IT security pro on staff

While cybersecurity is vital in SMBs, most remain unequipped to handle concerns and threats, according to a recent report.   While SMBs realize they face several security risks, resource constraints keep them from acting on those worries, according to an Untangle report published on Thursday. Untangle surveyed more than 350 global businesses, and 80% said security [...]

By |2018-08-03T12:47:22+00:00August 3rd, 2018|Uncategorized|0 Comments

HP offers hackers $10,000 to find bugs in its printers

HP announced the industry's first printer security bug bounty program to improve IoT security.   On Tuesday, HP announced a bug bounty program that will give hackers and researchers up to $10,000 if they can find security flaws in the company's printers. The move is the industry's first print security bug bounty program, according to [...]

By |2018-08-01T13:38:21+00:00August 1st, 2018|Uncategorized|0 Comments

10 more PowerShell cmdlets you can use instead of CMD commands

Learning PowerShell from scratch may seem daunting, but if you have a solid understanding of CMD, migrating your skill set over to the newer management framework might be simpler than you think.   The Windows command line, preceded by DOS in pre-Vista versions of Windows, still holds a lot of power for seasoned IT professionals. [...]

By |2018-07-30T17:33:09+00:00July 30th, 2018|Uncategorized|0 Comments

IT concerns for breaches have doubled since last year: Here are the biggest threats

New reports from Neustar reveal system compromises and ransomware are the biggest worries for many businesses.   As the threat of cybercrime continues to rise, IT leaders are looking to make changes to their security strategies. The attacks, according to a new report from Neustar, are not expected to end any time soon. [...]

By |2018-07-27T12:51:59+00:00July 27th, 2018|Uncategorized|0 Comments