Microsoft Edge Browser Coming To Android And IOS

Since ditching its beleaguered Internet Explorer browser, Microsoft’s latest offering, Edge, which is bundled with Windows 10, has been struggling to gain a foothold in the market.

Yes, it comes preloaded on Windows 10 machines, and that fact alone has prompted significant use. However, the browser has its share of weaknesses and limitations, one of the largest being that it has, until now, completely lacked a cross-platform, multiple device experience.

That has changed. Users can now install the Edge browser on iOS and Android devices, which makes it easier to surf the web seamlessly across multiple devices.

It should be noted, however, that “smartphone Edge” is Microsoft Edge in name only. The variants created for iOS and Android devices have little in common with Microsoft Edge for the PC, other than the name, and a similar look and feel.

In the case of the iOS version, this is because Apple doesn’t allow the development of third-party browsers, so iOS Edge is essentially the Safari browser, wrapped in a different skin.

Google’s Android platform doesn’t have rules quite as restrictive, and as such, Edge for the Android platform is built around Chromium, which is an open source Chrome variant.

Even with these limitations, though, the multi-platform, multi-device Edge does get the job done, allowing for basic tab syncing across devices.

This development, while encouraging, is likely to do little to change the equation much. Most users are pretty happy with whatever browser they’re currently using, and unless there’s a truly compelling reason to switch, they simply won’t.

This development, while certainly a nice addition, is not something most people are likely to find compelling enough to switch browsers for. However, it may have some impact at the Enterprise level, if and where there are applications and web portals that have been optimized for use with Edge. If your company has one of these, then this is welcomed news indeed.

Used with permission from Article Aggregator

Microsoft’s rebranded Azure Container Service shifts its focus to Kubernetes

 As far as container orchestration goes, Kubernetes is quickly becoming the de facto standard, even as Docker Swarm and Mesos/Mesosphere DC/OS continue to find their own niches. For the longest time, Microsoft argued that one of the advantages of its managed Azure Container Service (ACS) was its support for multiple orchestration tools, but that’s shifting a bit today. Read More

Google and Cisco announce hybrid cloud partnership

 Google and Cisco today announced a new partnership around helping their customers build more efficient hybrid cloud solutions. Unsurprisingly, given Google’s recent focus, this partnership centers around the Google-incubated Kubernetes container orchestration tool, as well as the Istio service mesh for connecting and securing microservices across clouds. “Google Cloud and Cisco… Read More

Spotinst delivers spot cloud infrastructure services at discount prices

 Cloud infrastructure vendors offer a range of prices for their services including aggressively priced virtual machines available on the spot market on an as-available basis. The catch is that the vendor can shut down these VMs whenever they happen to need them. Spotinst, a Tel Aviv-based startup, developed a service to buy and distribute that available excess capacity. Today, the company… Read More

Techstars alums will now get discounted WeWork space

 WeWork and Techstars are buddying up, the organizations announced today. TechStars, the global accelerator program responsible for companies like ClassPass, Sphero and Digital Ocean, will be bringing its program into the WeWork community by running its curriculum at WeWork locations in Toronto, Boston, Kansas City, and New York City. As a part of the deal, TechStars alumni will now get a… Read More

More than Just Antivirus

Ransomware attacks are on the increase, with the first part of 2017 showing a 250 percent increase in infections. It is only a matter of time before a business under attack by an advanced persistent threat will be hacked, so it’s important to prepare the proper defense to make it as difficult as possible. Gone are the days where you could install a simple antivirus program and then continue doing business as usual. You need solutions that covers as many threat vectors as possible.

Antivirus software still has a place at the table to prevent low level infections on computers but it’s no longer a case of install and forget. Antivirus software has to be constantly updated to ensure that it has the latest definitions of recent cyber software attacks. Historically Antivirus would run according to a set schedule, but now it needs to be a real time component of your security defense, actively scanning for assaults.

 

Malware Scanning

Antivirus has a very narrow focus of scanning for known viral signatures and patterns, and although vendors are adapting their software to recognize malware signatures, a dedicated malware scanner is another necessary tool in your arsenal. A malware scanner is similar in structure to an antivirus, but has a dedicated focus on active and passive malware signatures. Malware scanners also have extensions that allow active web scanning to ensure you don’t suffer from a watering hole attack or active extensions that are prone to infection like Flash and Java.

 

Data Assurance

Ransomware attacks your data and bets its business model on the fact that your data is precious to you and that you would be willing to pay a ransom to have it unlocked and returned. To be proactive, add a data backup and recovery module to your infrastructure. If you identify your key data during a risk management analysis you can prioritize your data based on the value of it to the business. From there you can determine what and when to backup. You also need to test your recovery at least semi annually to ensure that you can recover the data as fast as possible.

 

People are the Target

All of the security solutions in the world mean nothing if your users click on any extension or attachment they get in an email. Ensure that you conduct specific and general training for all staff who use the internet. Human Resources needs very specific training about recognizing ransomware attacks because they are one of the easiest attack vectors for hackers due to their need to open resumes as well as their privileged access to network resources. Consider a cloud based recruitment solution to protect your HR department from infection and putting in place the right of least privilege. Also ensure that your executive level is involved in the training as whale phishing, or attacks targeting C level users is very common and often successful.

 

One Ring to Bind Them All

Ideally, you can find a tool that will provide full protection in a single solution. This was the idea behind SentinelOne. It provides multilayered endpoint protection that is remarkably efficient in preventing even some of the most advanced zero day attacks. You can see a video of that here.

SentinelOne was recently rated Most Visionary by Gartner in the 2017 Magic Quadrant for endpoint protection as well as the highest Return on Investment and lowest Total Cost of Ownership by NSS Labs.

Click Here if you would like to learn more about SentinelOne or schedule a private demo.

The post More than Just Antivirus appeared first on SentinelOne.

Sonic Drive-In Latest Company With Credit Card Breach

Another week, another data breach, and this time, popular fast food chain Sonic found itself in the crosshairs.

The breach came to light when a Brian Krebs, a journalist for Infosec, spotted a large batch of credit card data for sale on an underground website.

IBM’s “X-Force” division confirmed Krebs’ findings, and later that same day, Sonic confirmed the report, offering all of its customers two years of free fraud and identity theft protection.

At this point, the company has released no details on how many of their 3600 locations were impacted, or how many customers might have been affected. However, Krebs noted that the cache he saw contained some five million records, which at least gives us some indication as to the scope and scale of the attack.

Given the relative lack of information about the incident so far, the best thing you can do if you frequent any Sonic location is to monitor your credit and debit card statements closely and take advantage of the free credit monitoring service offered.

It’s no great surprise why hackers are so interested in credit card data. Each record sells for between $25 and $50, so that cache of five million records represents a significant payday.

The fear, as pointed out by numerous security experts of late, is that given how easy it has been for hackers to breach company POS systems, the hackers will up the ante and begin introducing ransomware to the payloads they install on these systems.

Without a functioning POS system, business grinds to a complete halt, so the thinking is that most businesses facing this kind of attack would pay the ransom immediately, making the hackers’ payday even sweeter.

While this type of attack hasn’t been seen yet, most experts agree that it’s just a matter of time, making it one more thing to worry about. This is all the more reason to make sure your own POS terminals are as secure as you can possibly make them. You definitely don’t want to be next!

Used with permission from Article Aggregator

Primer helps governments and corporations monitor and understand the world’s information

 When Google was founded in 1998, its goal was to organize the world’s information. And for the most part, mission accomplished — but in 19 years the goalpost has moved forward and indexing and usefully presenting information isn’t enough. As machine learning matures, it’s becoming feasible for the first time to actually summarize and contextualize the world’s… Read More

LinkedIn boosts its messaging with smart replies, pre-written, AI based interactions

 LinkedIn — the Microsoft-owned platform for those who want to network with professional contacts and advance their own careers — has been in the middle of a long-term makeover of its social tools, as it looks to drive more usage. Today comes the latest chapter in that story: the site is unveiling a new smart reply feature in its messaging app, which gives users prompts with… Read More

HashiCorp raises $40M for its cloud infrastructure automation services

 HashiCorp is probably best known for Terraform, its open source tool for automatically provisioning infrastructure by describing it as code.  But the company also offers a whole range of additional open source security tools and products that enable multi-cloud deployments, as well as enterprise versions of these tools that add features for larger teams on top of these free version. Today,… Read More