Please turn on your JavaScript for this page to function normally.
server
Researchers develop a process to categorize massive datasets, making data more accessible

A computer science professor at The University of Texas at Arlington is working with researchers to develop a process by which data points in multiple graph layers of massive …

gap
Publicly reported data breaches down 52%, exposed records way up!

Although the number of publicly reported data breaches stands at its lowest in five years, the number of records exposed is more than four times higher than any previously …

search
Users turn to independent search engines for privacy, but also get misinformation

Anti-vaccine websites, which could play a key role in promoting public hesitancy about a potential COVID-19 vaccine, are far more likely to be found via independent search …

healthcare
Healthcare breaches declined sharply during the first half of 2020

This has been a very challenging year. Despite the COVID-19 outbreak starting in the first half of 2020, data analyzed from the Health and Human Services (HHS) Office for …

face
Maximizing data privacy: Making sensitive data secure by default

Maximizing data privacy should be on every organization’s priority list. We all know how important it is to keep data and applications secure, but what happens when …

quantum
NIST selects algorithms to form a post-quantum cryptography standard

The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. Post-quantum cryptography standard After spending …

reload
Data crisis: Companies pivot from disruption to transformation

Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …

success
Data professionals: Job security and shifting career priorities in the wake of the pandemic

Despite the huge drops in employment and the immense worries around job security over the past three months, 81% of data professionals felt as, or more, secure in their role …

architecture
Data exfiltration: The art of distancing

We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …

icosahedral
How data science delivers value in a post-pandemic world

With businesses from various industries tightening their belt due to pandemic-induced economic challenges, investing in data science applications and building out their teams …

CCPA
CCPA enforcement to put pressure on financial organizations’ IT resources

Enforcement of the California Consumer Privacy Act (CCPA), which begins on July 1, 2020, is going to put additional pressure on already overstretched IT resources and budgets, …

MacBook Pro
Massive complexity endangers enterprise endpoint environments

There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – …

Don't miss

Cybersecurity news