article thumbnail

Remote working: This new Microsoft VPN aims to make your mobile devices more secure

Tech Republic Security

Microsoft has delivered a managed VPN for mobile devices -- using a Linux container.

Mobile 545
article thumbnail

Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone

Tech Republic Security

The post Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone appeared first on TechRepublic. Adopting a new authentication method from the FIDO Alliance, the three major OS vendors will let you use encrypted credentials stored on your phone to automatically sign you into your online accounts.

Mobile 393
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8 major IT disasters of 2024

CIO Business Intelligence

The incident prompted some CIOs to rethink their dependence on cloud infrastructure, and it caused Microsoft to focus more on kernel-level access for other software packages. Meanwhile, Delta Airlines filed a $500 million lawsuit against CrowdStrike and Microsoft and reconsidered its use of Microsoft products.

Financial 340
article thumbnail

This Halloween, Don’t Get Spooked By In-Game Mobile Ads

Forrester IT

Microsoft completed its largest ever acquisition of Activision Blizzard earlier this month. Buried under the lede is the fact that it now owns King, a hugely successful mobile advertising platform with over $300 million in advertising revenue annually.

Mobile 396
article thumbnail

Microsoft, Apple versus China, spyware actors

Tech Republic Security

It’s a cat-and-mouse struggle as tech giants Microsoft and Apple deal with persistent threats from China state actors and Pegasus spyware.

Spyware 519
article thumbnail

Unphishable mobile MFA through hardware keys

Tech Republic Security

The post Unphishable mobile MFA through hardware keys appeared first on TechRepublic. With Azure AD and FIDO security keys, you can make MFA more secure and avoid having to provision certificates on everyone’s phones.

Hardware 393
article thumbnail

10 most in-demand enterprise IT skills

CIO Business Intelligence

Its a common skill for developers, software engineers, full-stack developers, DevOps engineers, cloud engineers, mobile app developers, backend developers, and big data engineers. Its used for web development, multithreading and concurrency, QA testing, developing cloud and microservices, and database integration.