Microsoft Updates Edge With New Features To Challenge Chrome

Forbes looks at new features Microsoft added to Edge “as it looks to beat Chrome in the browser wars.” It’s now going to be possible to search for work files directly inside the Edge browser directly from the address bar. To use this you need Microsoft Search configured, then type “work” and press the Tab key to search your company’s network for your work files. Another work-related Microsoft Edge update is also about to launch to let IT admins manage specific work related apps on user devices as well as the browsing users do from their Work Profile in Edge.

Integration with other Microsoft products is a key factor as the IT giant looks to entice more business users to use the updated Edge browser. Edge now supports native policies for Microsoft Endpoint Data Loss Prevention, which are used to find and protect sensitive items across Microsoft 365 services, Microsoft said in a blog highlighting the firm’s security credentials. Another soon to launch feature of note highlighted by Bleeping Computer is Sleeping Tabs, which Microsoft says can improve memory usage by up to 26%. It can also reduce CPU usage by 29% potentially resulting in battery savings…

Gartner forecasts RPA software growth, $1.58B market

Burgeoning demand opens opportunities for IT service providers in RPA … AWS-certified managed services personnel with Alert Logic's MDR platform. MDR has become an increasingly important service offering for channel … Contributors · Reprints · Answers · Definitions · E-Products · Events · Features.

PCI DSS Part 2: Unify, Manage, & Secure Assets

Previously in Part 1: PCI DSS – Where to Start?, we dove into the technicalities and scope of PCI DSS and strategies for planning for audits and compliance. Within this article, we’ll introduce JumpCloud® and the capabilities it provides, bringing IT administrators a simple way to unify, manage, and secure their environments. The JumpCloud directory platform combines an organization’s resources into a centralized IT management platform, extending identities to countless resources such as devices, networks, applications, files, and more. 

How cybercriminals launder money stolen from banks

For some cybercriminal groups, attacks on banks and other financial institutions are like an assembly line. Many people know tracing stolen funds is usually impossible, but not everyone knows why. A joint report by BAE Systems and researchers from the payment system SWIFT details how cybercriminals launder stolen money.

ISPs Can and Should Protect Users Against DDoS Attacks

  • Household IoT devices face an ever-increasing risk without proper security
  • Hackers compromise IoT devices and integrate them into botnets responsible for major DDoS attacks
  • ISPs can do much more to protect their customers and infrastructure

IoT makes people’s lives more comfortable, but for all the good it does, it’s also a prime target for botnets and threat actors. Compromised IoT devices launch DDoS attacks against online services, companies, or even people. There’s an entire industry built around the DDoS-as-a-Service principle, and the potential victims don’t have many options for protection. A possible solution lies in the hands of ISPs when they choose to provide IoT security to their customers.