Please turn on your JavaScript for this page to function normally.
success
Data professionals: Job security and shifting career priorities in the wake of the pandemic

Despite the huge drops in employment and the immense worries around job security over the past three months, 81% of data professionals felt as, or more, secure in their role …

architecture
Data exfiltration: The art of distancing

We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …

icosahedral
How data science delivers value in a post-pandemic world

With businesses from various industries tightening their belt due to pandemic-induced economic challenges, investing in data science applications and building out their teams …

CCPA
CCPA enforcement to put pressure on financial organizations’ IT resources

Enforcement of the California Consumer Privacy Act (CCPA), which begins on July 1, 2020, is going to put additional pressure on already overstretched IT resources and budgets, …

MacBook Pro
Massive complexity endangers enterprise endpoint environments

There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – …

tools
Fixing all vulnerabilities is unrealistic, you need to zero in on what matters

As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every …

cybercrime
How much is your data worth on the dark web?

Credit card details, online banking logins, and social media credentials are available on the dark web at worryingly low prices, according to Privacy Affairs. Online banking …

Fivetran
Data analysts only spend half their time on analysis

While companies continue to invest in teams of data experts, a Fivetran survey suggests that adding more data analytics wizards might not be the solution. In fact, the survey …

vectors
Organizations are creating the perfect storm by not implementing security basics

European organizations have a false sense of security when it comes to protecting themselves, with only 68% seeing themselves as vulnerable, down from 86% in 2018, according …

ransomware
Businesses torn between paying and not paying ransoms

40% of consumers hold business leaders personally responsible for ransomware attacks businesses suffer, according to a research from Veritas Technologies. Furthermore, …

cloud money
OPTIMUSCLOUD: Cost and performance efficiency for cloud-hosted databases

A Purdue University data science and machine learning innovator wants to help organizations and users get the most for their money when it comes to cloud-based databases. Her …

IoT security label
Researchers develop IoT security and privacy label

When hungry consumers want to know how many calories are in a bag of chips, they can check the nutrition label on the bag. When those same consumers want to check the security …

Don't miss

Cybersecurity news