Monday, August 15, 2022

EDITOR'S TOP TECH NEWS

Latest News

Best of the Web

Microsoft fixes UEFI bootloads that bypass Windows Secure Boot feature

Microsoft has identified three UEFI bootloads that can bypass the Windows Secure Boot feature and execute unsigned code.

Hacker gain root access to John Deere tractors

At the DefCon security conference in Las Vegas on Saturday, a hacker named Sick Codes jailbreak John Deere & Co tractors.

Organizations report 1,980 breaches in first half of 2022

According to a Flashpoint report, 1,980 breaches were reported by organizations in the first half of 2022, a 15 per cent decrease compared to the same period in 2021.

YouTube to launch streaming video service

According to a report in the Wall Street Journal, YouTube is working on launching an online store for streaming video service.

Microsoft withdraws Microsoft 365 version 2206 after crash reports

Microsoft has withdrawn the Microsoft 365 version 2206 updates after user crash reports.

Three ransomware gangs breached an automotive supplier in 2 weeks

LockBit, Hive, and ALPHV/BlackCat affiliates breached an automotive supplier’s systems within two weeks, with two of the attacks occurring within just two hours.

SENIOR CONTRIBUTORS

5G: improving network security end to end

The roll-out of 5G across the country could be considered one of the most highly anticipated technology advancements in recent memory. While many are focused on the advantages for consumers, organizations are also poised to reap the benefits.

Your organization’s security revolves around one thing: your people

Data and IT systems security are often viewed as the responsibility of the CIO. In truth, data security is the domain of everybody in the organization. Not focusing on the human side of security can put everything at risk.

Digital transformation benefits (Article 1)

A series of articles created to enhance your understanding of digital transformation.

Drones pose new threats to data centre security

A new threat has emerged in the form of unmanned drones, and a different type of perimeter is necessary to protect data centre operations.

Will Web3 disrupt our net zero transition?

The unique properties of Web3 and its applications, platforms, and assets have the potential to overcome some of the biggest challenges to global sustainability, and exciting new projects are demonstrating just how powerful Web3 could be for building a net zero future. 

How automated technologies can improve accounts payable

Time and money are valuable resources. Modern businesses must remove the dependance on outdated technologies and work to automate key functions. Here are four technologies CIOs can leverage to effectively eliminate tedious manual processes in accounts payable.

Coffee Briefings

Coffee Briefing August 9, 2022-AWS launches new training; BMO launches Pre-Authorized Payments Manager; LG...

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. Today’s Coffee Briefing is delivered by IT World Canada’s editorial team! Missed last week’s Coffee...

TRENDING THIS WEEK

Beware of simultaneous cyber attacks, warns Sophos

The key drivers of multiple exploitations are vulnerabilities and misconfigurations going unaddressed after a first attack, says report

Hootsuite to lay off 30 per cent of its staff

Hootsuite Inc. announced yesterday that it will lay off 30 per cent of its staff due to global restructuring. The...

Many North American firms have no cyber insurance coverage: Survey

One-third of respondents said their firm was denied coverage for not meeting EDR requirements, says survey by BlackBerry and Corvus Insurance

Bell’s ESG performance in corporate responsibility and environmental standards recognized

Bell has been recognized as a leader in corporate responsibility by Corporate Knights. It has also achieved an important...

Featured Downloads

ITWC's Top Technology PODCASTS

Cyber Security Today, Aug. 15, 2022 – Watch for patches from Palo Alto Networks, Microsoft and others

This episode reports on important security updates IT administrators should be aware of

Cyber Security Today, Week in Review for August 12, 2022

The theme of this week's discussion is why employees do risky things like click on malicious links that defeat multifactor authentication

Hashtag Trending August 12 – Facebook is not popular with teens; misinformation continues to spread; FCC rejects Starlink’s application for $885 million subsidy

Teens are not using Facebook, research reveals people are seeing misinformation weekly, and the FCC rejects Starlink’s request for $900 million in...

Hashtag Trending August 10 – Ferrari recall; Google outage; Meta’s new chatbot and its problems

Ferrari is recalling almost every car it has sold since 2005, Google suffered an outage, and Meta’s new chatbot is already spewing...

Deeper Dive: Ready, Set, Go (Episode 5)

Following a brief refresher on classic scenario planning, hosts Jim Love, CIO of ITWC, and Doug Sparkes, a lecturer at the Conrad School of Entrepreneurship and Business, riff collegially on how to avoid functional fixedness while identifying and developing scenarios.

When Two Hats are Better than One – Interview with Bobby Singh

Some leaders pay lip service to the notion of lifelong learning, opting instead to settle for what they already know. Bobby Singh...

The symbol Forrester uses to describe CIO-CMO relations in 2015 says it all

The analyst firm publishes an infographic that suggest improvement in the partnership between IT and marketing, but there's one gaping hole

Innovative Calgary information technology startups

Calgary’s tech innovators and entrepreneurs are leading digital transformation across the province and the world. Calgary is growing alongside Alberta into a global tech hub.

International Women’s Day: Five tech training courses that aim to break gender inequality in Canadian tech sector

women are still largely underrepresented in the tech industry. This slideshow details education and training resources to help women advance in the IT field.

International Women’s Day: Seven women who changed technology

You may find it difficult to believe in today's male-centric tech industry, but in the early days of IT, it was often the women who were the pioneers

25 crazy, wacky gadgets at CES 2022 [Part 3]

Will you use any of these eight gadgets from CES 2022?

ITWC TALKS

Securing OT from cyber attacks

By Graham Bushkes The geopolitical climate has far-reaching implications for cybersecurity. Warnings from governments, including those of the Five Eyes, indicate that situations like the...

Canadian farm and ranch retailer flying into open skies

While the easing of pandemic restrictions may have softened the business climate only slightly for many businesses, one Alberta-based retailer is preparing to scale...

Leveraging the power of interactive experiences in retail

Product imagery, done right, can drive retail sales into the stratosphere. But as many companies know, product imagery “done right” is done for less....

Hugely popular clothing brand evolving through technology

Surprised that the company behind one of the freshest and most exciting clothing brands in Canada was established way back in 1957? According to...

People focus is key to strong security in hybrid office era

Report after report tells us hackers are thriving in the emerging hybrid office era. Theo van Wyk, Head of Cybersecurity and Solutions Development at...

President to President VIDEOS

Featured Partner Content