Please turn on your JavaScript for this page to function normally.
icosahedral
Data teams are discovering the benefits of automation and flexible coding

Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and …

Door
Quantum computing is imminent, and enterprises need crypto agility now

Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …

zero trust
The 6 steps to implementing zero trust

More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …

biometrics
IT service desks lacking user verification policy, putting businesses at risk

48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …

AI
AI-based diagnostic processes that safeguard data privacy

Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …

backup
How colocation can improve TCO for the enterprise

CoreSite and IDG released a report which examines the latest data center trends, strategies, requirements, and other findings from an annual quantitative survey and in-depth …

zero trust
Can zero trust kill our need to talk about locations?

As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise …

online marketplace
How data manipulation could be used to trick fraud detection algorithms on e-commerce sites

As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure …

eavesdropping
Mobile stalkerware is on the rise

Mobile stalkerware, which is software silently installed by stalkers onto victims’ mobile devices without their knowledge, is on the rise, an ESET research finds. In 2019, …

bomb
Collaboration between network access brokers and ransomware actors deepens

In this Help Net Security podcast, Brandon Hoffman, CISO at Intel 471, discusses about the increased collaboration between network access brokers (NAB) and ransomware …

encryption
Do customers have a right to know how companies that use algorithms make their decisions?

Increasingly, businesses rely on algorithms that use data provided by users to make decisions that affect people. For example, Amazon, Google, and Facebook use algorithms to …

cloud
Privacy regulations making cloud migration complex

Digital transformation is driving multi-cloud migrations, as 85 percent of organizations use at least two cloud providers for data storage and analytics, while 40 percent use …

Don't miss

Cybersecurity news