This new open source project could be key to securing database applications

Commentary: Cyral has been on a roll with two open source projects designed to make security a natural part of the development workflow. Image: metamorworks, Getty Images/iStockphoto Moving database applications…

Continue ReadingThis new open source project could be key to securing database applications

AI tool lets startups determine the value of their e-commerce business in 24 hours for free

Valuation was developed by the co-founder of alternative capital firm Clearbanc, who spent six years on the Canadian version of "Shark Tank." Pinkypills, Getty Images/iStockphoto Trying to figure out the…

Continue ReadingAI tool lets startups determine the value of their e-commerce business in 24 hours for free

Why companies want people to take vacation time now and how managers are encouraging them to do it

Intel's Staycation Challenge is one example of how talking about taking time off can encourage people to disconnect from work. Image: Aleutie/Getty Images/iStockphoto If managers want people to take vacation…

Continue ReadingWhy companies want people to take vacation time now and how managers are encouraging them to do it

Business leaders: Your employees may not be following the rules if you operate in these sectors

A survey of several different industries found inconsistencies in how well employees follow proper procedure, and varying reasons why they don't. Image: Getty Images/iStockphoto A study of how well employees…

Continue ReadingBusiness leaders: Your employees may not be following the rules if you operate in these sectors

Mobile customers who use Wi-Fi calling are more satisfied with their coverage

More than 40% of wireless customers using Wi-Fi calling are happier with their network quality than those not using it, says J.D. Power. Image: molchanovdmitry, Getty Images/iStockphoto Wi-Fi calling is…

Continue ReadingMobile customers who use Wi-Fi calling are more satisfied with their coverage

Cybercriminals disguising as top streaming services to spread malware

Malicious actors are posing as Netflix, Hulu, and more, to launch phishing attacks, steal passwords, launch spam, and distribute viruses. Image: IStockphoto/metamorworks More about cybersecurity Kaspersky's latest research identifies the…

Continue ReadingCybercriminals disguising as top streaming services to spread malware

Google Cloud unveils new features to enhance security and compliance for sensitive data

Confidential VMs and Assured Workloads for Government are both designed for highly regulated and security-sensitive industries. Image: Dongyu Xu / Getty Images Google Cloud is introducing two new capabilities aimed…

Continue ReadingGoogle Cloud unveils new features to enhance security and compliance for sensitive data