Bloomberg | Cathay Pacific Airways Ltd. said a hacker accessed personal information of 9.4 million customers, becoming the target of the world’s biggest airline data breach. This personal information included names, nationalities, dates of birth, telephone numbers, email addresses, physical addresses, about 860,000 passport numbers, credit card numbers, and more.
BetaNews | "The vast majority of all the known cloud data breaches to date have been caused by configuration errors, which is a polite way of saying human error or lack of knowledge is at fault... In fact, configuration errors have become so common in cloud-based migrations and application deployments that, many times, cybercriminals don't even bother with sophisticated attacks; they simply look for gaping holes in security defenses due to misconfigurations," says Zach Malone, security engineer at FireMon. (Here at BetterCloud, we've been talking about configuration errors in SaaS apps for a looong time. We see it all too often. It's why we built BetterCloud to listen for any risky changes in application configurations and then remediate them with automated workflows.)
CNET | Apple and Samsung were fined yesterday for software updates that Italy's antitrust watchdog says slowed down users' phones. The Italian Competition Authority, or AGCM, fined Apple and Samsung 5 million euros (about $5.6 million) each for releasing software updates that "significantly reduced" the performance of phones, the authority said in a release. This pushed consumers to buy new devices, according to AGCM.
ZDNet | Microsoft's move to add LinkedIn's commercial revenue and services to its commercial cloud helped turbocharge results. Windows 10 upgrades and Office 365 also added fuel to the first quarter fire.
G Suite Tips | With this feature, users can view images and charts from within the Explore panel and insert them quickly and easily into their document or slide.
Several People Are Typing | Here's a guide to boosting your productivity and mastering the art of meetings with Slack’s VP of People, Robby Kwok.
SearchCIO | Who should own your cybersecurity culture? How can we protect rampant IoT devices? MIT Sloan researchers clued CIOs into their latest research at Tuesday's SIM Boston Summit.
Dark Reading | "Asked to name their critical network endpoints, most IT pros would cite mobile devices, laptops, desktops, and servers. A few might include wearables and other emerging end user hardware. Browsers, though, probably wouldn't make the list. After all, they're applications that run on the endpoints, not endpoints themselves. But given the valuable role browsers play in accessing enterprise applications and information, it's time to rethink how we classify them and, as a result, how we manage and secure them," writes Rajesh Ranganathan.
SAASupdate
G Suite Updates | Last year, Google introduced a new resource for admins: What’s new in G Suite? Don’t forget to visit the page regularly for a list of the most recent launches across G Suite.
Twitter   FaceBook   LinkedIn   Google+