All recent articles

Top 5 enterprise augmented analytics benefits

Top 5 enterprise augmented analytics benefits

Augmented analytics is the use of machine learning and natural language processing to enhance data analytics, data sharing and business intelligence. The benefits of augmented…

Botnet attacks on APIs: Why most companies are unprepared

Botnet attacks on APIs: Why most companies are unprepared

As companies move applications to the cloud and expose functionality via application programming interfaces (APIs), criminals have been moving quickly to take advantage of this…

As Blockchain Hype Fades, Developers Give Ethereum a Serious Look

As Blockchain Hype Fades, Developers Give Ethereum a Serious Look

A couple of years ago, proponents touted the blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, as a solution to nearly every business problem.…

Pressure Grows for Federal Data Breach Legislation

Pressure Grows for Federal Data Breach Legislation

Cybersecurity is a major priority for U.S. President Joe Biden. It was at the top of the agenda at last week’s summit with Russian President…

Citizen data scientist training for augmented analytics

Citizen data scientist training for augmented analytics

Even as companies invest heavily in digital transformations and become more data-driven, there’s a dramatic shortage of data scientists. According to QuantHub, there was a…

Russian Cybercrime: Is Extradition Ahead?

Russian Cybercrime: Is Extradition Ahead?

The international community is putting increased pressure on Russia to stop protecting its cybercriminals. But while Russian President Vladimir Putin has made some positive statements,…

Is the US Government Doing Enough About Ransomware?

Is the US Government Doing Enough About Ransomware?

FBI’s seizure of $2.3 million worth of bitcoin Colonial Pipeline paid a ransomware gang to unlock its data was just the latest in a series…

Energy company deploys edge devices to improve drilling efficiency

Energy company deploys edge devices to improve drilling efficiency

Moving compute and storage resources to edge locations can reduce latency and bandwidth needs, improve performance and save money. At the same time, widespread  edge…

8 secrets of successful AI projects

8 secrets of successful AI projects

Business leaders at every level see the value of using artificial intelligence, but using AI well is where the true value lies. And the stakes…

How API attacks work, and how to identify and prevent them

How API attacks work, and how to identify and prevent them

In early May, fitness company Peloton announced that it had exposed customer account data on the internet. Anyone could access users’ account data from Peloton’s…

Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time

Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time

Most cybersecurity incidents now involve cloud infrastructure, according to the latest Verizon Data Breach Investigations Report (DBIR). The annual report is the most researched of…

‘Citizen developer’ success requires strong IT oversight

‘Citizen developer’ success requires strong IT oversight

The “citizen developer” revolution sounds very promising. After all, what enterprise wouldn’t want to be more agile while reducing costs and accelerating their ability to…

The quest for end-to-end intelligent automation

The quest for end-to-end intelligent automation

The pandemic has seen accelerated interest in process automation as organizations have scrambled to overhaul business processes and double down on digital transformations in response…

Pandemic, AWS Bombing Plot Heighten Data Center Physical Security Concerns

Pandemic, AWS Bombing Plot Heighten Data Center Physical Security Concerns

This relatively chaotic period has made data center operators increasingly worried about their facilities’ physical security. This had been true even before FBI announced the…

Confidential Computing: Arm Builds Secure Enclaves for the Data Center

Confidential Computing: Arm Builds Secure Enclaves for the Data Center

Arm chips for mobile and IoT devices have supported secure enclaves — a concept known as confidential computing — for years. It’s called the Arm…

Security Tech Based on Each Chip’s Unique ‘Fingerprint’ Comes to Data Centers

Security Tech Based on Each Chip’s Unique ‘Fingerprint’ Comes to Data Centers

The composable data center platform Fungible unveiled earlier this year has a number of new approaches to computing infrastructure. Its users can scale compute, storage,…

Tips and tactics of today’s cybersecurity threat hunters

Tips and tactics of today’s cybersecurity threat hunters

Threat hunting isn’t just for the biggest organizations anymore. As the SolarWinds attack demonstrated, any size company can be vulnerable to stealthy attackers who worm…

Foiled AWS Data Center Bombing Plot Poses New Questions for Operators

Foiled AWS Data Center Bombing Plot Poses New Questions for Operators

Following the recent arrest of a man who was allegedly plotting to blow up an AWS data center, operators of computing facilities — and other…

‘Reverse ETL’ Can Help Companies Operationalize Data Lakes

‘Reverse ETL’ Can Help Companies Operationalize Data Lakes

Enterprises building data lakes and warehouses have been turning to third-party vendors to bring in data. Building connectors to applications likes Salesforce is tedious and…

Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It

Malware Wants to Phone Home. Trinity Cyber Doesn’t Try to Block It

The SolarWinds breach, discovered last year, demonstrated how, with enough sophistication, malware can “phone home” for years, completely undetected. The hackers found ways around the…

6 reasons you may need data science as a service

6 reasons you may need data science as a service

Data science as a service, or DSaaS, has been old news for a while, but it has become a hot topic once again. In March,…

How AI is revolutionizing training

How AI is revolutionizing training

Employee training is an issue of critical importance for enterprises. Challenged to find skilled employees, sapped by high turnover rates, mired in massive transformations, the…

HPE OneView: An Overview of the Popular IT Management Platform

HPE OneView: An Overview of the Popular IT Management Platform

Cloud infrastructure customers can get all their computing resources in one place — computing, storage, and networking. It’s one of the biggest ultimate benefits virtualization…

The top 4 self-service BI benefits for enterprises

The top 4 self-service BI benefits for enterprises

Business intelligence tools were once the domain of only business analysts with the quantitative and analytics backgrounds to make full use of BI capabilities. And…

Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers

Emotet May Be Gone, But the Security Holes It Made Could Still Be Lingering in Data Centers

In January, an international group of law-enforcement agencies took down Emotet, the world’s top malware. Authorities took over its command-and-control servers and installed a kill…

AI makes edge and IoT smarter

AI makes edge and IoT smarter

Lots of things are being called “smart” these days — everything from light bulbs to cars. Increasingly, the smarts come from some form of artificial…

An Adobe Flash Ghost May Be Haunting Your Data Center

An Adobe Flash Ghost May Be Haunting Your Data Center

Adobe’s Flash Player officially hit its end of life on January 1, 2021. It was a security risk while it was still alive. To data…

AI governance: Reducing risk while reaping rewards

AI governance: Reducing risk while reaping rewards

AI governance touches many functional areas within the enterprise — data privacy, algorithm bias, compliance, ethics, and much more. As a result, addressing governance of…

Microsoft Exchange Hack Could Be Worse Than SolarWinds

Microsoft Exchange Hack Could Be Worse Than SolarWinds

The scope of damage from the newly public Microsoft Exchange vulnerability keeps growing, with some experts saying that it is “worse than SolarWinds.” As of…

What Is Zscaler and How Does It Secure Enterprise Networks?

What Is Zscaler and How Does It Secure Enterprise Networks?

Zscaler saw unprecedented growth last year, replacing legacy networking platforms with its scalable cloud-based alternative at breakneck speed. Today, the company serves more than a…