Please turn on your JavaScript for this page to function normally.
data
IT decision-makers doubt current data architectures will meet future model inferencing requirements

As companies look to expand their use of artificial intelligence (AI) and machine learning (ML) to keep up with the demands of their customers, they are facing hurdles getting …

tunnel
What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

Good
Cybersecurity posture confidence high, yet incidents are increasing too

IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …

containers
Unstructured data still overshared inside and outside organizations

The number of overshared files rose 450 percent compared to the same quarter in 2020, highlighting the significant impact of the pandemic and remote work on data security. …

digital transformation
Digital transformation needs data integrity to be successful

The exponential growth of business data, coupled with advancements in cloud computing, AI, and the IoT has unleashed an era of digital transformation across the globe. This is …

ransomware
Navigating the complexity of ransomware negotiations

Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an …

secure
Are your cyber defenses stuck in the sandbox?

Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions …

icosahedral
Data teams are discovering the benefits of automation and flexible coding

Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and …

Door
Quantum computing is imminent, and enterprises need crypto agility now

Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …

zero trust
The 6 steps to implementing zero trust

More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …

biometrics
IT service desks lacking user verification policy, putting businesses at risk

48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …

AI
AI-based diagnostic processes that safeguard data privacy

Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …

Don't miss

Cybersecurity news