May 1st, 2019

Intelligent Spend Management Takes Procurement From the Back Office to the Boardroom

For years, procurement has been considered a back-office function, the realm of finance, supply chain, and operations experts. But with the rise of intelligent spend management, procurement can drive board-level conversations about business strategy. At the [...]

The End of Cyberspace

In the most utopian statement of what the internet might be, the late John Perry Barlow laid out the claim that cyberspace was free. “Governments of the Industrial World, you weary giants of flesh and steel, [...]

Swipe for more: Tiles on Wear OS by Google

Whether you’re at home or on the go, your time is valuable. Five years ago, we built Wear OS by Google to help you get information and get things done quickly, at a glance. Over the [...]

Introducing auto-delete controls for your Location History and activity data

Whether you’re looking for the latest news or the quickest driving route, we aim to make our products helpful for everyone. And when you turn on settings like Location History or Web & App Activity, the [...]

Windows Server hosting provider still down a week after ransomware attack

A ransomware infection has crippled the operations of a US-based web hosting provider for almost eight days now, several of the company’s disgruntled customers have told ZDNet today. Impacted are all Windows-based servers owned by A2 [...]

UK plans new law aimed at improving Internet of Things security

The U.K. government is proposing new legislation aimed at improving security of Internet of Things devices. Digital minister Margot James MP revealed the draft law on Wednesday as part of the government’s efforts to protect millions [...]

Julian Assange jailed for 50 weeks for breaching UK bail conditions

Wikileaks founder Julian Assange has been jailed for 50 weeks for violating his U.K. bail conditions in 2012 at a sentencing hearing at Southwark Crown Court today. A spokeswoman for the court confirmed the almost-year long [...]

9 types of malware and how to recognize them

People tend to play fast and loose with security terminology. However, it’s important to get your malware classifications straight because knowing how various types of malware spread is vital to containing and removing them. This concise [...]