I’m a huge New York Jets fan, even though they suck this year (ok, they are terrible most years). While I will always watch and root for that […]
Download Microsoft’s new Windows XP Bliss wallpapers for mobile, desktop, or Teams
This holiday season, Microsoft has gone back in time to create an “ugly sweater” based on its iconic Bliss wallpaper from Windows XP. If you like the look […]
Microsoft goes back to Windows XP for this holiday season’s ugly sweater — here’s how you can get one
Every holiday season, Microsoft brings out an “ugly sweater” and this time it’s going way, way back with a special XP-themed Bliss design. This sweater, which features the […]
The bridge to the future
Unless there is easy and seamless connectivity between different blockchain-based asset types on different platforms, the full benefits of tokenization will not be realized. However, achieving this interoperability […]
We tried Brave’s AI chatbot Leo: It talks a lot about privacy, but is it truly private?
In early November, Brave, best known for its privacy-focused browser, launched its own AI chatbot called Leo. The chatbot is built into the desktop version of the browser […]
IT leaders worry about security despite being prepared
While 92 percent of IT business leaders believe they’ve made the right security investments and 88 percent say they meet all compliance requirements, half still worry about their […]
AWS launches its own thin client for enterprises
As more and more organizations turn to SaaS and cloud solutions, having a powerful PC as a desktop solution becomes hard to justify, not to mention the support […]
Nitrux 3.2.0 Linux distro released with enhanced security and new features
The Linux community is sure to be abuzz with excitement today as Nitrux 3.2.0 “af” makes its debut. The heart of Nitrux 3.2.0 is its Linux 6.6.2-1 (Liquorix) […]
Information overload puts cybersecurity at risk
Over half of today’s office workers are ignoring important cybersecurity alerts and warnings due to information overload from digital communication. New research from CybSafe, based on a survey […]
From castles to cities — a modern approach to authorization [Q&A]
Corporate information security has traditionally used the ‘castle’ approach, using a strong boundary to keep everything secure. But as we’ve moved to hybrid working and more sharing of […]