IT professionals think Apple devices are easier to manage, according to new survey

A recent survey has found that your IT department thinks a Mac is more manageable than a PC or Chromebook.According to a survey of IT professionals, Macs and iOS devices are easier to manage when it comes to security, device configuration, software deployment, and support. Of those surveyed, 62 percent said the Mac is as easy or easier to deploy than PC, and 93 percent said it’s as easy or easier to deploy an iPhone or iPad over another device.While most IT professionals found Apple’s products easier to manage overall, that was not the case when it comes to Mac integration. Only 36 percent of IT professionals claimed that it was easy or easier to integrate Macs into other environments. The survey is based on responses from 300 IT professionals and was commissioned by Jamf, the software management firm that focuses solely on Apple devices.To read this article in full or to leave a comment, please click here

How pay transparency and equity help employers retain workers

More than ever, companies are updating their compensation strategy and practice to build more trusting relationships with their workforce, emphasizing pay transparency and equity, according to the 2017 Compensation Best Practices Report from cloud compensation services company PayScale.The 2017 Compensation Best Practices Report (CBPR) is based on data from 7,700 executives, line of business managers, human resource leaders and compensation practitioners, and reflects current attitudes about compensation, business growth, hiring and retention. The latest annual report shows a shift is underway at many companies as key talent markets are becoming increasingly competitive.To read this article in full or to leave a comment, please click here

What’s the value in attack attribution?

For those who pursue forensic analysis with the hope of identifying and prosecuting an attacker, they likely will find that the time spent on attack attribution is fruitless.If, however, they are looking to use what they gain through attack attribution to inform their overall security procedures from prevention to response, the effort yields valuable results.Many experts in the industry have questioned whether there is any value to attribution. SafeBreach CTO & co-founder Itzik Kotler said, "The only interesting aspect in attribution itself is to classify and put information in a box and use it over and over again."Kolter offered a hypothetical in which right now CNN gets hacked by the Chinese. "That someone can or cannot attribute it to the Chinese doesn't matter. It does matter if we can say we think this is from China," Kolter said.To read this article in full or to leave a comment, please click here

What’s the value in attack attribution?

For those who pursue forensic analysis with the hope of identifying and prosecuting an attacker, they likely will find that the time spent on attack attribution is fruitless.If, however, they are looking to use what they gain through attack attribution to inform their overall security procedures from prevention to response, the effort yields valuable results.Many experts in the industry have questioned whether there is any value to attribution. SafeBreach CTO & co-founder Itzik Kotler said, "The only interesting aspect in attribution itself is to classify and put information in a box and use it over and over again."Kolter offered a hypothetical in which right now CNN gets hacked by the Chinese. "That someone can or cannot attribute it to the Chinese doesn't matter. It does matter if we can say we think this is from China," Kolter said.To read this article in full or to leave a comment, please click here

Smackdown: Office 365 vs. G Suite collaboration

Ever since I can remember, Silicon Valley has been enamored with the idea of group editing of documents. Very little good writing gets done that way, of course. It’s like the joke that a camel is a horse designed by committee. Office 365 vs. G Suite: Meeting collaborationTo read this article in full or to leave a comment, please click here(Insider Story)

Ryzen CPUs explained: Everything you need to know about AMD’s disruptive multicore chips

After a decade of fielding ho-hum FX-series processors, AMD’s finally released its highly disruptive Ryzen chips, throwing down the gauntlet and challenging Intel’s supremacy in high-end computing.AMD’s new Ryzen chips include several CPUs (and CPU families) of various levels of potency. What’s more, Ryzen introduces a completely new motherboard platform, and the processors require different memory and coolers than their predecessors. There’s a lot to sift through—so let’s sift!Here’s everything you need to know about AMD’s Ryzen.Meet AMD’s Ryzen CPUs AMD Details about the AMD Ryzen chips announced thus far.To read this article in full or to leave a comment, please click here

Here’s how Microsoft has rethought its approach to email

Two years ago, Microsoft made a massive shift in the way it approached the email market. In January 2015, the company launched Outlook for iOS and Android, free professional-grade email apps for two platforms that Microsoft previously underserved in that regard.Outlook for iOS and its Android sibling were special, because they supported Gmail, Yahoo and iCloud email, in addition to Microsoft’s Outlook.com, Office 365 and Exchange email offerings. While connecting to third party email providers isn't new for Outlook, offering one-click support for different email providers at launch sent a message that this wouldn't be locked to the Microsoft ecosystem.To read this article in full or to leave a comment, please click here

Consumer Reports decision to rate cybersecurity is a huge deal

Conventional wisdom has it that most consumers simply don’t pay much attention to computer security and privacy issues. Perhaps worse, they don’t think they can do much to protect themselves without foregoing many of the benefits of our digital, connected age. Consumer Reports is trying to change both of those things. Consumer Reports’ new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here

Consumer Reports decision to rate cybersecurity is a huge deal

Conventional wisdom has it that most consumers simply don’t pay much attention to computer security and privacy issues. Perhaps worse, they don’t think they can do much to protect themselves without foregoing many of the benefits of our digital, connected age. Consumer Reports is trying to change both of those things. Consumer Reports’ new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here

6 cloud computing savings you may be missing out on

Hidden costs?Image by ThinkstockAs more organizations deploy applications in the cloud to meet demand spikes, cost is a major consideration. Often, businesses start comparing service charges and the cost of renting or buying nodes, making a list of all of the things that matter to each option: computing in the cloud, renting compute capacity for some amount of time, or adding servers to the permanent arsenal. While these contributing factors may seem obvious and the math relatively straightforward, those who have taken the leap into the cloud have often cited that crucial cost considerations are easily overlooked.To read this article in full or to leave a comment, please click here

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.Bill Nelson, a Florida Democrat, wrote in a letter Tuesday to CEO Mark Meyers that the breach raises serious questions concerning how well the company protects the information it collects, particularly from children.Nelson also said that the incident raises questions about the vendor's compliance with the Children’s Online Privacy Protection Act that requires covered companies to have reasonable procedures to protect the confidentiality, security and integrity of personal information collected from children.To read this article in full or to leave a comment, please click here

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.Bill Nelson, a Florida Democrat, wrote in a letter Tuesday to CEO Mark Meyers that the breach raises serious questions concerning how well the company protects the information it collects, particularly from children.Nelson also said that the incident raises questions about the vendor's compliance with the Children’s Online Privacy Protection Act that requires covered companies to have reasonable procedures to protect the confidentiality, security and integrity of personal information collected from children.To read this article in full or to leave a comment, please click here

US Senate resolution aims to roll back privacy rules for ISPs

A resolution introduced in the U.S. Senate on Tuesday aims to roll back privacy rules for broadband service providers that were approved by the Federal Communications Commission in October.The rules include the requirement that internet service providers like Comcast, AT&T, and Verizon should obtain "opt-in" consent from consumers to use and share sensitive personal information such as geolocation and web browsing history, and also give customers the option to opt out from the sharing of non-sensitive information such as email addresses or service tier information.The rules have been opposed by internet service providers who argue that they are being treated differently from other Internet entities like search engines and social networking companies.To read this article in full or to leave a comment, please click here

US Senate resolution aims to roll back privacy rules for ISPs

A resolution introduced in the U.S. Senate on Tuesday aims to roll back privacy rules for broadband service providers that were approved by the Federal Communications Commission in October.The rules include the requirement that internet service providers like Comcast, AT&T, and Verizon should obtain "opt-in" consent from consumers to use and share sensitive personal information such as geolocation and web browsing history, and also give customers the option to opt out from the sharing of non-sensitive information such as email addresses or service tier information.The rules have been opposed by internet service providers who argue that they are being treated differently from other Internet entities like search engines and social networking companies.To read this article in full or to leave a comment, please click here

It pays to be a technology architect

You seriously might want to consider negotiating to get the word "architect" in your title if you're a technology professional. About a quarter of the titles on the latest Glassdoor report on the highest paying jobs in America are tech architect roles. Medical and legal professionals rank at the very top of the list, with physicians pulling down nearly $188K for a median base salary, based on information supplied by employees in the online job and recruiting marketplace's database. But tech jobs are well represented too, with Enterprise Architect, at #6, commanding a median base salary of $112,560 and more than 1,300 such jobs up for grabs in Glassdoor's listings (at least 100 salary reports needed to be shared for jobs to make this list).To read this article in full or to leave a comment, please click here