Microsoft has introduced new Copilot agents, App Builder and Workflows, that enable users to quickly create apps and automate tasks within Microsoft 365, with a focus on security and enterprise management, currently available to select customers in the Frontier program.
Amazon is introducing Amazon One Enterprise, a palm-scanning technology designed for businesses, allowing employees to use their hand as an authentication tool to enter offices or access sensitive information. The service is being offered to companies such as IHG Hotels and Resorts, Boon Edam, and Kone. Amazon claims that palm recognition is more private than other biometric systems and offers a cheaper and more secure solution compared to traditional security tools. However, advocacy groups have raised concerns about privacy and increased surveillance. Amazon One was originally developed as a payment system and has been deployed in various retail locations.
Google is introducing new systemwide camera and microphone access toggles in ChromeOS settings that can instantly block all apps and sites from being able to use them. The new privacy controls cut off the rest of the computer’s access to the hardware, which is a software replacement to the physical camera and mic kill switch. Chromebook manufacturers can simplify the laptop design and use the built-in ChromeOS solution instead. Google is also expanding enterprise and business-oriented security features that include new identity and data control features that help IT departments manage user logins and help keep sensitive information from inadvertently traveling around and outside organizations.
Researchers from ESET have found that less than half of secondhand enterprise routers in their sample were wiped of internal data, posing a risk for both the companies that sold these routers and their customers. Out of the 18 corporate routers that the researcher team purchased secondhand, only five had been wiped. Nine of the routers had been left as is, two were encrypted, one was dead, and one was a copy of another device. The nine devices that hadn’t been wiped had enough information stored on them to identify the previous owners, and also login information for the organizations’ VPN, credentials for a communication service, and hashed root administrator passwords.