data analytics
![complex](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100143/complex-1-400x200.jpg)
How much organizations are investing in analytics and why
Despite 94% of organizations believing data and analytics is important to their digital transformation and business growth, most are not enabling a data-driven culture, …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094507/check-400x200.jpg)
Analytics and automation solutions to help contact center IT staff ensure compliance
91% of of contact center IT staff believe increasing contact center compliance software investment should be considered a priority in the next year. 83% of contact center …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Leveraging security analytics to investigate and hunt modern threats
In this interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can …
![Cambridge Analytica](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101608/ca-large-400x200.jpg)
Cambridge Analytica and Facebook’s privacy storm: Latest developments
A day before the most recent exposé on Strategic Communication Laboratories (SCL)/Cambridge Analytica’s exploitation of user data syphoned out of Facebook to fuel …
![Distil Bot Discovery](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09101629/distil_bot_discovery-400x200.jpg)
Prevent bot traffic from ruining Google Analytics
Distil Bot Discovery for Google Analytics is a free offering that will give website owners the ability to understand the impact of bots on their business. The service is …
![technology](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105415/technology-400x200.jpg)
Data and analytics maturity: Most organizations should be doing better
91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs …
![Alphabet Chronicle](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102037/alphabet-chronicle-400x200.png)
Alphabet enters enterprise cybersecurity market, launches Chronicle
Google’s parent company Alphabet has announced its entry into the lucrative enterprise cybersecurity market through Chronicle, a company started in early 2016 as a …
![path](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105453/path-400x200.jpg)
Compromised analytics provider made Equifax’s site point to malware
Yesterday’s revelation that Equifax’s credit report assistance Web page was spotted redirecting visitors to malware resulted in the company temporarily disabling …
![Microsoft Azure](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103137/microsoft-azure-400x200.jpg)
Microsoft Azure confidential computing keeps data in use secret
Microsoft has announced a new Azure (cloud) data security capability: confidential computing. Who’s it for? The capability allows companies to use the cloud even if they …
![mechanics](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110321/mechanics-400x200.jpg)
The untapped potential of machine learning for detecting fraud
E-commerce fraud protection company Signifyd has recently signed up behavioral analytics expert Long-Ji Lin to fill the position of Chief Scientist. “For advertisers, …
![containers](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104934/containers-400x200.jpg)
Capsule8: Container-aware real-time threat protection
Despite massive adoption of Linux in the enterprise, there has been no world-class security offering for Linux infrastructure — until now. In this podcast recorded at RSA …
![analytics IT assets](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113947/analytics-400x200.jpg)
Logtrust debuts analytics solution for detecting threats in real-time
Logtrust announced at RSA Conference 2017 its Real-time Integrated Threat Analytics Solution Program. The program enables companies to build solutions that analyze the …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD