Guest Post – Travel hack: Restart this one phone setting for faster interne

Posted in Commentary with tags on November 21, 2025 by itnerd

Just toggling airplane mode can improve the connection

A reliable internet connection while traveling is a modern necessity, but your mobile device can sabotage its quality. Connectivity experts explain that this happens because your device may prioritize one network over another, regardless of their quality or strength.

“When you land in a foreign country, your phone automatically scans and registers available networks,” says Vykintas Maknickas, CEO of Saily, NordVPN’s travel eSIM app. “If your home network has several roaming partners at your destination with equal priority, your device will usually latch onto the strongest signal at the airport — and then stick with it.”

Airports typically provide strong coverage from multiple carriers, since carriers have an incentive to connect as many devices as possible. If your phone attaches to one network in the terminal, that initial connection can persist even when a stronger or faster network is available at your hotel or local area, potentially leaving you with a weaker connection.

Instead of relying on unsecured Wi-Fi or searching for a local SIM card, a simple fix can help. “Once you reach your hotel, apartment, or office — the spot where you’ll spend the most time — toggle airplane mode once. That will force a clean network reselection and let your phone choose the best local tower and partner for your location,” says Maknickas.

 The $0 travel hack

To secure a better quality connection, follow these steps:

  • On arrival, let your phone connect as usual so you can get moving.
  • When you reach your base, turn on airplane mode for 10-20 seconds, then turn it off.
  • Give it a minute to settle. Watch for bars, 4G/5G indicators, and more importantly, check a quick speed test or load a map.

This break triggers a fresh scan of available networks. Because you’re now in a different environment, the best option may change, and your phone will lock onto that instead of keeping the airport pick.

Additional tips to keep in mind

To avoid potential issues, Maknickas also shares a few additional pieces of advice:

  • Some carriers can nudge your phone toward preferred partners. The toggle still helps the device reassess signal quality, but you may be steered back. If performance is poor, switch to manual network selection in settings and pick the carrier that has the best performance.
  • Don’t overdo it. Constant toggling while moving can make the device chase towers and drain battery. The point of this hack is one reset at the main location.

About

Saily is a travel eSIM app that ensures secure and affordable mobile internet connection abroad. Saily offers 24/7 instant customer support, flexible plans, and coverage in 200+ destinations. Saily was created by the experts behind NordVPN — the advanced security and privacy app. For more information: https://saily.com

Vykintas Maknickas is the CEO of Saily. After spending the bigger part of a decade at Nord Security, Vykintas is now overseeing Saily, the newest addition to Nord Security’s product family. He is a professional with comprehensive knowledge of the past, present, and future of cybersecurity and stays up to date with the latest threats and opportunities in the digital world.

The Day a Database Permission Change Broke the Internet: A Cloudflare Story – Liquibase analysis 

Posted in Commentary with tags on November 20, 2025 by itnerd

Ryan McCurdy, VP with Liquibase, the leader in database DevOps, has just published “The Day a Database Permission Change Broke the Internet: A Cloudflare Story.” His analysis details how:

  • A minor adjustment, routine in most organizations, touched a hidden part of Cloudflare’s architecture and awakened a dependency no one had considered dangerous.
  • What happened next revealed how modern systems fail today: Nodes that loaded the expanded file went dark. Nodes that loaded the old file continued to serve traffic. The network oscillated, recovering for minutes at a time before failing again, as if trapped between two different realities.
  • Once every shard of the ClickHouse cluster adopted new permissions, every file produced was oversized and every proxy that touched it entered the same panic.

The analysis details clearly and compellingly how the cascading failure occurred, and ways in which most data-driven organizations are at risk.

He notes:

“Cloudflare is one of the most capable engineering organizations in the world. Their systems are built to survive pressure that would overwhelm most companies. Their teams live in incident response. Their infrastructure is distributed, hardened, and instrumented with extraordinary detail. Yet the event that brought them down started with a quiet change in who could read what inside a database.”

He concludes by noting that the only real path forward is a new level of discipline at the data layer. Databases must be governed with the same rigor applied to application pipelines, and offers specific vendor-neutral recommendations.

Hell Has Frozen Over… iPhones Can Now AirDrop To Android Users

Posted in Commentary with tags on November 20, 2025 by itnerd

Google announced today a new cross-platform feature that allows for file sharing between iPhones And Pixel 10 devices called Quick Share:

We built this with security at its core, protecting your data with strong safeguards that were tested by independent security experts. It’s just one more way we’re bringing better compatibility that people are asking for between operating systems, following our work on RCS and unknown tracker alerts.

We’re looking forward to improving the experience and expanding it to more Android devices.

This addresses a major pain point that has always bugged iPhone and Android users. And when it spreads to more Android phones, this will be huge. I have to ask if you’re surprised as I am that this is even a thing. Post a comment below and share your thoughts.

Samsung’s Must-Have Tech Picks to Wrap Up 2025

Posted in Commentary with tags on November 20, 2025 by itnerd

Here’s Samsung’s top tech that are prefect for someone on your gift giving list. There’s a wide variety of options for everybody : 

Tablets for Productivity & Fun 

  • Galaxy Tab A11+ – Premium design, 256GB storage (expandable to 2TB), and Galaxy AI features like Gemini, Circle to Search, and Solve Math. 
  • Galaxy Tab S10 Lite – Includes S Pen, 256GB storage (expandable to 2TB), and Galaxy AI tools such as Handwriting Help, Object Eraser, and Generative Edit. 

Smartwatches to Track Your Health 

Buds for Your Everyday Audio 

  • Galaxy Buds3 Pro – Comfortable fit, active noise cancellation, plus real-time Interpreter & Live Translate. 

Foldables for Maximum Productivity & Style 

  • Galaxy Z Flip7 – 200MP camera, slim design, expansive unfolding screen, and Galaxy AI features including Generative Edit and Handwriting Help. 
  • Galaxy Z Fold7 – 200MP camera, slim design, massive screen real estate, and full Galaxy AI suite for ultimate multitasking. 

Galaxy S25 Series: Phones That Do It All 

  • Galaxy S25 Edge – 200MP camera, slim design, and Galaxy AI features. 
  • Galaxy S25 & S25+ – Snapdragon 8 Elite, long-lasting battery, and Galaxy AI tools. 
  • Galaxy S25 Ultra – Includes S Pen, 200MP camera, 100x Space Zoom, long-lasting battery, and Galaxy AI for productivity and creativity.  

Adistec and Fortra announce Strategic Partnership to Accelerate Cybersecurity Growth Across Latin America

Posted in Commentary with tags on November 20, 2025 by itnerd

Adistec, a leading value-added distributor with 20+ years of experience developing IT channels across Latin America, is excited to announce a strategic alliance with global cybersecurity leader Fortra, to expand the availability of its cybersecurity portfolio throughout all regional LATAM operations. This distribution agreement positions Adistec as a key regional enabler for Fortra’s go-to-market strategy.

Fortra offers an integrated ecosystem of advanced offensive and defensive cybersecurity solutions that help organizations break the cyber attack chain. Its portfolio includes data security technologies like DLP, DSPM, and data classification, brand protection, and offensive security products Core Impact, Cobalt Strike, and Outflank Security Tooling.

A Strategic Alliance to Transform LATAM Cybersecurity Readiness

The integration of Fortra’s solutions into Adistec’s regional portfolio gives partners access to a cohesive suite designed to support multiple security requirements — from offensive validation of defenses to regulatory compliance and protection of sensitive data.

Marcelo Gardelin, Strategic Alliance Director for Adistec adds: “Our collaboration with Fortra reinforces Adistec’s mission to strengthen digital resilience across Latin America. By combining our value-added capabilities with Fortra’s industry-leading technologies, we empower partners to deliver continuous, integrated security to organizations of every size.”

Stuut Technologies Raises $29.5 Million Series A Led by Andreessen Horowitz to Automate Accounts Receivable Work

Posted in Commentary with tags on November 20, 2025 by itnerd

Stuut Technologies, the first AI platform that automates accounts receivable work for companies, today announced it has raised $29.5 million in combined Series A funding led by Andreessen Horowitz, with participation from Activant Capital, Khosla Ventures, 1984.vc, Page One Ventures, Vesey Ventures, Carya Venture Partners, and Valley Ventures. Seema Amble from Andreessen Horowitz and Steve Sarracino from Activant Capital will join the board. The funding will accelerate product development and expand Stuut’s autonomous account receivable capabilities for mid-market and enterprise companies across six key functionalities: collections, payments, cash application, deductions, credits, and disputes. 

Companies lose up to 5% of EBITDA because AR teams spend their days chasing customers, logging into portals, and matching payments by hand. This problem is particularly acute for manufacturers, distributors, CPG, logistics, outsourced services, and medical device organizations with complex customer relationships and high transaction volumes. Traditional software has tried to help for years, but it all hits the same wall: it can’t actually do the work—it just gives humans tools to do it themselves.

Stuut is the AI coworker that knows every customer across your entire cash process, helping businesses collect 40% more revenue on time by doing their AR work faster and better than manual processes. Unlike older traditional accounts receivable platforms that require 6-18 months to implement and constant human oversight, Stuut executes complete workflows independently while integrating seamlessly with existing ERP systems in under a week.

What Stuut Does:

  • Actually Does the Work: AI handles customer outreach, payment matching, dispute resolution, and portal management autonomously. Learns each customer’s patterns and executes complete workflows from start to payment across all formats (SMS, email, voice).
  • Knows Each Customer: Context travels across collections, payments, cash application, and deductions—remembering every interaction. Gets smarter with each customer interaction and applies learning to future decisions across your entire process. Coming soon will be credits and disputes capabilities.
  • Fast Implementation: Up and running in days versus 6-18 months for traditional software. Integrates into existing systems without disruption with immediate results that compound over time.
  • Proven Results: 40% reduction in overdue balances and 70% reduction in manual tasks. Customers including ZoomInfo, Bishop Lifting, Honeywell, and PerkinElmer are live and collecting immediately with 3-4 day implementation.

RunSafe Security’s Cyberhardening Platform Earns Iron Bank Approval, Boosting Embedded Defense for DoD

Posted in Commentary with tags on November 20, 2025 by itnerd

RunSafe Security today announced that the RunSafe Security Platform is now available on Iron Bank, the Department of Defense’s (DoD) hardened repository of pre-assessed and approved development, security, and operations (DevSecOps) solutions. As a verified Iron Bank publisher, RunSafe Security’s platform will provide DoD teams with access to Software Bill of Materials (SBOM) generation, supply chain risk management (SCRM), and code protection within a trusted ecosystem.

Iron Bank is built to help defense programs quickly deploy new tools without spending months navigating approval processes. Every product listed on Iron Bank goes through rigorous security assessments, container hardening, and compliance validation. Because the containers are scanned daily for vulnerabilities, DoD teams gain access to resilient tools that keep the software supply chain secure and allow software to be deployed faster. With RunSafe listed as a verified publisher, DoD teams and integrators can now access the company’s platform directly from Iron Bank, making it easier for defense programs to integrate.

The RunSafe Security Platform addresses some of the toughest challenges in embedded software security. Through the company’s platform on Iron Bank, organizations can access:

  • C/C++ SBOM Generation – RunSafe provides the authoritative build-time SBOM generator for embedded systems and C/C++ projects. Automating SBOM generation is critical for meeting DoD requirements, especially for unstructured C/C++ code where traditional SBOM tools fall short.
  • Supply Chain Risk Management – SCRM capabilities enable DoD teams to take action, not just generate a static SBOM. Teams can monitor for new vulnerabilities and check license enforcement and provenance. Additionally, RunSafe’s binary analysis identifies potential zero-day risks, helping organizations to rely not only on CVEs but also to quantify the risk of future weaknesses that attackers could target.
  • Runtime Code Protection – RunSafe hardens binaries against exploitation through moving target defense, such as Runtime Application Self Protection (RASP), defending weapons systems at runtime to increase resilience. This resilience applies to future zero days as well, providing fielded weapon systems protection between software upgrade cycles that can be two years apart.

For organizations working to modernize DevSecOps practices, automate SBOM generation, or secure embedded systems without code rewrites, RunSafe containers are available on Iron Bank by logging in and accessing the Iron Bank repository here.

To request a consultation to learn more about the RunSafe Security Platform and Iron Bank, please visit https://runsafesecurity.com/consultation-request/.

RunSafe Security Attending 2025 Alamo Cybersecurity Exposition (ACE) in December

Additionally, RunSafe Security is attending the 2025 Alamo Cybersecurity Exposition (ACE), an annual conference produced by the Alamo Armed Forces Communications and Electronics Association (AFCEA). The Exposition will take place from December 2–5, 2025, at the JW Marriott San Antonio Hill Country Resort & Spa in San Antonio, Texas. Alamo ACE is an annual event that supports the military community and provides access and insight into key senior leaders’ perspectives on current developments in cyberspace. To arrange a meeting with a member of the RunSafe Security team, contact: staci@runsafesecurity.com.

Health Standards Organization (HSO) and Kyndryl Partner to Accelerate AI and Advance Global Health Care Quality

Posted in Commentary with tags on November 20, 2025 by itnerd

Kyndryl and Health Standards Organization (HSO), a global not-for-profit organization dedicated to improving health care quality and patient safety, today announced a collaboration to build an enterprise data platform on Microsoft Fabric hosted on Azure. This transformative initiative will enable HSO to unify its vast data resources, dramatically improving the speed and accuracy of reporting, analytics and decision-making to help it to expand its reach and support more people. 

HSO develops evidence-informed, consensus-based standards across more than 100 areas of health and social services around the world. These standards are shaped by input from patients, providers and policymakers and are supported by tools that help organizations implement and improve care delivery. Today, HSO’s standards have been adopted by 14,000 care sites globally, such as hospitals, care homes and social services sites.

The new platform will automate data workflows and enable faster, more trusted insights. It will also support advanced analytics, better forecasting, and improved visibility across the organization, so that HSO can spend more time working on activities that directly support improving health care quality.

With Kyndryl’s support, HSO is rolling out a comprehensive data governance program to strengthen data quality and support compliance, coupled with a change management strategy that encompasses stakeholder communications, skills assessments and upskilling initiatives. Together, they will create multiple proof-of-concept projects to validate AI, machine learning and business intelligence use cases.

The Kyndryl Vital team played a key role in the engagement, working side-by-side with HSO and multiple data & AI experts from Kyndryl Consult to define challenges, prototype solutions and co-develop strategies aligned with HSO’s vision. This designer-led, collaborative approach supported tailoring the platform to HSO’s needs and goals.

Outpost24 named Challenger and Fast Mover in GigaOm Radar for Penetration Testing as a Service (PTaaS) 

Posted in Commentary with tags on November 20, 2025 by itnerd

 Outpost24, a leading provider of cyber risk management and application security solutions, today announced that it has been named a Challenger and Fast Mover in GigaOm’s Radar for Penetration Testing as a Service (PTaaS). GigaOm is a global practitioner-led analyst firm that provides research, analysis, and advisory services for IT and security decision-makers. 

Outpost24 advanced its position in the 2025 Radar, moving from the Feature Play quadrant in 2024 to the Maturity and Platform Play quadrant. This significant progression reflects continued investment in scalable, integrated testing capabilities and the company’s commitment to delivering effective security validation for modern digital environments. 

The GigaOm Radar for Penetration Testing as a Service provides a comprehensive evaluation of vendors based on platform capabilities, testing methodologies, customer experience, and alignment with emerging market needs. The report highlights the industry shift from point-in-time penetration tests to continuous validation delivered through unified platforms. It also notes the growing adoption of flexible consumption-based models that help organizations optimize testing coverage while controlling cost,  a trend reflected in Outpost24’s own approach through CyberFlex’s pay-as-you-go credit model.

 GigaOm recognized the following Outpost24 strengths: 

  • Robust API access   
  • Customizable testing methodologies  
  • Streamlined procurement and onboarding  
  • Flexible consumption capabilities.  

Outpost24’s Penetration Testing as a Service solution, CyberFlex, combines expert-led penetration testing with continuous attack surface visibility to give organizations a unified and streamlined experience. By integrating automated discovery with testing workflows, CyberFlex provides continuous visibility across an organization’s external application attack surface, seamless access to results, and actionable guidance for faster remediation. The solution uses automatic data gathering, enrichment, and AI-driven analysis to identify vulnerabilities and attack paths across both known and unknown internet-facing assets. 

To download a complimentary copy of the 2025 GigaOm Radar for Penetration Testing as a Service (PTaaS), please visit this link

For more information on Outpost24’s CyberFlex solution, visit https://outpost24.com/products/cyberflex/

Transportation provider notifies 123,000 people of a data breach

Posted in Commentary with tags on November 20, 2025 by itnerd

Comparitech has reported that Transportation provider WEL Companies this week confirmed it notified 122,960 people of a January 2025 data breach that compromised names, SSNs, and state-issued ID info. 

Rebecca Moody, Head of Data Research at Comparitech, provided the following commentary. 

“Large data breaches following ransomware attacks on the transport sector are unusual. This is likely due to these companies not often being in possession of large datasets and/or highly sensitive information, and hackers being more focused on causing disruption by encrypting systems. 

However, this breach on WEL Companies demonstrates how, if the data’s there to steal, hackers are going to try and make the most of their attack in a bid to increase their chances of securing a ransom payment. As WEL Companies deals with a multitude of companies (including Fortune 500 businesses) and has hundreds of drivers, RansomHub seized the opportunity of data theft and caused widespread disruption by doing so. It is the third-largest data breach on a transport company following a ransomware attack since we started recording data in 2018.”

The fact that a new sector is being targeted by threat actors is likely not a good thing because it illustrates that threat actors are running around doing whatever they want. And that needs to stop.