All recent articles

Data warehouses and holistic business intelligence

Data warehouses and holistic business intelligence

Business intelligence is the process of analyzing company data to better understand that data, spot anomalies or trends and make predictions. It’s possible to do…

Making the most of sentiment analysis

Making the most of sentiment analysis

Sentiment analysis is beginning to prove its mettle in the enterprise. This analytic technique, which enables companies to determine the emotional value of communications, is finding…

Five Functions That Benefit From Cybersecurity Automation

Five Functions That Benefit From Cybersecurity Automation

Data center cybersecurity managers have had it tough this pandemic. During the first half of 2021, bad actors launched 5.4 million DDoS attacks, setting a…

What is a chatbot? Simulating human conversation for service

What is a chatbot? Simulating human conversation for service

Chatbot definition A chatbot is a software application designed to simulate human conversation with users via text or speech. Also referred to as virtual agents,…

SASE Model Proving Value Beyond Remote Work Scenarios

SASE Model Proving Value Beyond Remote Work Scenarios

Gartner only coined the term SASE — secure access service edge — two years ago to describe a cloud-based service that combines SD-WAN networking with all the latest security…

Paying Hackers’ Ransom Demands Is Getting Harder

Paying Hackers’ Ransom Demands Is Getting Harder

If your data center’s ransomware recovery plan is to pay off the hackers with cryptocurrency, it’s time to rethink your strategy as regulators crack down.…

OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure

OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure

Late last month, researchers from cloud security firm Wiz found a new vulnerability that allows Azure users to access cloud databases of other users, breaking the principle…

What to expect from SASE certifications

What to expect from SASE certifications

Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally managed cloud service that promises simplified WAN…

Cisco adds specializations to its CCNP cert

Cisco adds specializations to its CCNP cert

Cisco’s network certification lineup underwent a major overhaul last year, and one of the big changes is that specialization options appear at the professional level with the…

What is sentiment analysis? Using NLP and ML to extract meaning

What is sentiment analysis? Using NLP and ML to extract meaning

Sentiment analysis defined Sentiment analysis is analytical technique that uses statistics, natural language processing, and machine learning to determine the emotional meaning of communications. Companies use…

Zero-Trust Model Gains Luster Following Azure Security Flaw

Zero-Trust Model Gains Luster Following Azure Security Flaw

Cloud use is at an all-time high, despite security worries. Last week’s ChaosDB vulnerability shows that enterprises need to adapt their security strategies and move to the…

What is AIOps? Injecting intelligence into IT operations

What is AIOps? Injecting intelligence into IT operations

Cloud platforms, managed service providers and organizations undertaking digital transformations are beginning to reap the benefits of an emerging IT trend: the use of AI-powered…

Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’

Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’

Last week, researchers from cloud security firm Wiz reported a new vulnerability in Microsoft Azure’s managed database service, Cosmos DB, that they called the worst they’ve ever…

Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill

Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill

The 2,700-page $1 trillion infrastructure bill passed by the US Senate earlier this month still has the House of Representatives to get through. In addition to sizable…

What is information architecture? Structuring content for maximum value

What is information architecture? Structuring content for maximum value

Information architecture defined Information architecture is a discipline focused on structuring, organizing, and categorizing content and data in an effective and usable way, largely for…

What is a managed service provider? Strategic outsourcing for IT services explained

What is a managed service provider? Strategic outsourcing for IT services explained

Managed service provider defined A managed service provider (MSP) is an outsourcer contracted to remotely manage or deliver IT services such as network, application, infrastructure,…

Ransomware recovery: 8 steps to successfully restore from backup

Ransomware recovery: 8 steps to successfully restore from backup

According to a ransomware survey report released in June by Keeper Security, 49% of companies hit by ransomware paid the ransom—and another 22% declined to say whether…

Network certs 2021: Significant raises for the right ones

Network certs 2021: Significant raises for the right ones

COVID-19 kicked off one of the most disruptive economic periods since World War II, and companies scrambled to shift business processes to the cloud to…

How Salesforce finds and upskills AI talent

How Salesforce finds and upskills AI talent

Skills related to artificial intelligence, machine learning, and data science remain in high demand, with companies scrambling to fill key roles in their pursuit of…

Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention

Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention

At first glance, last week’s advisory on state-sponsored China cyberattacks by the FBI and the Cybersecurity and Infrastructure Security Agency is nothing new. It outlines the tactics,…

Cisco CCNA certification explained

Cisco CCNA certification explained

The CCNA, which stands for Cisco Certified Network Associate, is Cisco’s foundational certification for networking professionals. The CCNA is a commonly required prerequisite for associate-level…

The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops

The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops

Managed service providers, the vendors companies hire to manage their IT infrastructure, have been having a second banner year in a row. The pandemic-driven switch…

Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems

Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems

Hybrid and multi-cloud architectures are all the rage in enterprise IT infrastructure. But enabling the flexibility to deploy the right tool for each task requires…

Top 5 enterprise augmented analytics benefits

Top 5 enterprise augmented analytics benefits

Augmented analytics is the use of machine learning and natural language processing to enhance data analytics, data sharing and business intelligence. The benefits of augmented…

Botnet attacks on APIs: Why most companies are unprepared

Botnet attacks on APIs: Why most companies are unprepared

As companies move applications to the cloud and expose functionality via application programming interfaces (APIs), criminals have been moving quickly to take advantage of this…

As Blockchain Hype Fades, Developers Give Ethereum a Serious Look

As Blockchain Hype Fades, Developers Give Ethereum a Serious Look

A couple of years ago, proponents touted the blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, as a solution to nearly every business problem.…

Pressure Grows for Federal Data Breach Legislation

Pressure Grows for Federal Data Breach Legislation

Cybersecurity is a major priority for U.S. President Joe Biden. It was at the top of the agenda at last week’s summit with Russian President…

Citizen data scientist training for augmented analytics

Citizen data scientist training for augmented analytics

Even as companies invest heavily in digital transformations and become more data-driven, there’s a dramatic shortage of data scientists. According to QuantHub, there was a…

Russian Cybercrime: Is Extradition Ahead?

Russian Cybercrime: Is Extradition Ahead?

The international community is putting increased pressure on Russia to stop protecting its cybercriminals. But while Russian President Vladimir Putin has made some positive statements,…

Is the US Government Doing Enough About Ransomware?

Is the US Government Doing Enough About Ransomware?

FBI’s seizure of $2.3 million worth of bitcoin Colonial Pipeline paid a ransomware gang to unlock its data was just the latest in a series…