All recent articles

Computer vision is primed for business value

Computer vision is primed for business value

Jun 23, 2022

Over the past few years, computer vision applications have become ubiquitous. From phones that recognize the faces of their users, to cars that drive themselves,…

Private 5G promising for enterprises, but growth stymied by pandemic, lack of hardware

Private 5G promising for enterprises, but growth stymied by pandemic, lack of hardware

Jun 23, 2022

Private 5G networks promise to offer low latency, high reliability, and support for massive numbers of connected devices, but enterpise deployment has been slower than expected, experts say, due…

9 ways hackers will use machine learning to launch attacks

9 ways hackers will use machine learning to launch attacks

Jun 13, 2022

Machine learning and artificial intelligence (AI) are becoming a core technology for some threat detection and response tools. The ability to learn on the fly…

Bugs in the data center: How social engineering impacts physical security

Bugs in the data center: How social engineering impacts physical security

Jun 9, 2022

One data center management team learned the hard way that bugs can be a menace — or, to be more specific, the people who hunt…

10 key roles for AI success

10 key roles for AI success

Jun 7, 2022

More companies in every industry are adopting artificial intelligence and automation systems to transform business processes. But the success of their AI initiatives depends on…

Traditional BI vs. self-service BI shouldn’t be a choice

Traditional BI vs. self-service BI shouldn’t be a choice

Jun 1, 2022

Traditional vs. self-service business intelligence doesn’t have to be an either-or choice. Both bring different tools and benefits to organizations. Many organizations are leaving value…

Making the most of MLOps

Making the most of MLOps

May 26, 2022

When companies first start deploying artificial intelligence and building machine learning projects, the focus tends to be on theory. Is there a model that can…

7 machine identity management best practices

7 machine identity management best practices

May 24, 2022

Machine identities are a large, and fast-growing part of the enterprise attack surface. The number of machines—servers, devices, and services—is growing rapidly and efforts to…

Fantastic Open Source Cybersecurity Tools and Where to Find Them

Fantastic Open Source Cybersecurity Tools and Where to Find Them

May 19, 2022

Open source is a double-edged sword for information security. On the one hand, security professionals rely on countless open source security software tools, frameworks, and…

6 business risks of shortchanging AI ethics and governance

6 business risks of shortchanging AI ethics and governance

May 17, 2022

Depending on which Terminator movies you watch, the evil artificial intelligence Skynet has either already taken over humanity or is about to do so. But it’s not…

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

May 17, 2022

Security is a multi-step process. There’s a chain of trust, with each link verified and authenticated by the one that comes before. But eventually, the…

Machine Identity Management: A Fast-Growing Frontier of Security

Machine Identity Management: A Fast-Growing Frontier of Security

May 5, 2022

The number of machines enterprise security teams have to manage is exploding. When it comes to computing infrastructure, servers have been supplanted by virtual machines,…

For Competing Recruiters, Twitter’s Turmoil Could Be a Gift

For Competing Recruiters, Twitter’s Turmoil Could Be a Gift

May 4, 2022

Just two days after Elon Musk reached a deal with Twitter’s board to purchase the company for $44 billion, he attacked two of the company’s executives.…

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Apr 26, 2022

Earlier this year, security researchers reported the use of legitimate security tools in multiple attacks against Ukrainian organizations, including government agencies, non-profits, and tech companies.…

How SASE uses AI

How SASE uses AI

Apr 18, 2022

Secure access service edge, or SASE, combines networking and security into a cloud-based service, and it’s growing fast. According to Gartner projections, enterprise spending on SASE will…

What is the cyber kill chain? A model for tracing cyberattacks

What is the cyber kill chain? A model for tracing cyberattacks

Apr 14, 2022

As an infosec professional, you’ve likely heard about using a cyber kill chain to help identify and prevent intrusions. Attackers are evolving their methods, which…

Why businesses should know the importance of data quality

Why businesses should know the importance of data quality

Apr 13, 2022

Organizations can harness great benefits from data, but understanding the importance of data quality, trust and avoiding bias allows them to make decisions and create…

6 Reasons Why More Automation Means More Secure Software

6 Reasons Why More Automation Means More Secure Software

Apr 11, 2022

In an age when applications are broken down into microservices, and networks are distributed across regions and clouds, software is being produced faster than ever, in…

AI takes aim at employee turnover

AI takes aim at employee turnover

Apr 7, 2022

Employees are quitting jobs at record rates and companies are having a hard time luring them back. HKM has handled numerous employee disputes successfully. Exacerbating…

Who’s selling SASE and what do you get?

Who’s selling SASE and what do you get?

Apr 7, 2022

Demand for secure access service edge (SASE) has grown tremendously during the pandemic. As adoption picks up, vendors are promising feature-rich and integrated SASE solutions. Customers have…

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Apr 6, 2022

Modern data center infrastructure management (DCIM) platforms and other new tools put more power in the hands of facility managers. As a result, data centers…

10 tips for getting started with decision intelligence

10 tips for getting started with decision intelligence

Mar 30, 2022

For organizations looking to move beyond stale reports, decision intelligence holds promise, giving them the ability to process large amounts of data with a sophisticated…

10 ways IT can navigate the chip shortage

10 ways IT can navigate the chip shortage

Mar 23, 2022

Exacerbated by the pandemic, the chip shortage neared crisis proportions at the start of the year. Network vendors calculated the impact on their businesses in…

Cloudflare Expands Email Security and WAF, Announces API Security Service

Cloudflare Expands Email Security and WAF, Announces API Security Service

Mar 16, 2022

Cloudflare is best known for its content delivery network and DDoS mitigation services, but it has been steadily expanding into other areas of web security…

What is synthetic data? Generated data to help your AI strategy

What is synthetic data? Generated data to help your AI strategy

Mar 15, 2022

Synthetic data defined Synthetic data is artificially generated information that can be used in place of real historic data to train AI models when actual…

AWS, Azure Vulnerabilities Would Have Allowed Access To Other Customers’ Accounts

AWS, Azure Vulnerabilities Would Have Allowed Access To Other Customers’ Accounts

Mar 11, 2022

Researchers from Orca Security have found two vulnerabilities in Amazon’s AWS and Microsoft’s Azure clouds that could have allowed users access to other customers’ infrastructure. Both Amazon…

Network Encryption: A Double-edged Sword for Cybersecurity

Network Encryption: A Double-edged Sword for Cybersecurity

Mar 8, 2022

In 2013, less than half of all web traffic was encrypted, according to Google. Today, the rate of network encryption stands at 95%. On the one hand, that’s…

How attackers sidestep the cyber kill chain

How attackers sidestep the cyber kill chain

Mar 7, 2022

The idea of the cyber kill chain was first developed by Lockheed Martin more than a decade ago. The basic idea is that attackers perform reconnaissance, find…

Gartner: SSE is SASE minus the SD-WAN

Gartner: SSE is SASE minus the SD-WAN

Mar 7, 2022

SASE adoption has been skyrocketing since the start of the pandemic. Secure access service edge, a term Gartner coined in 2019, combines security and networking…

10 enterprise AI trends for 2022

10 enterprise AI trends for 2022

Mar 3, 2022

Artificial intelligence has hit the mainstream. Across industries, companies have rolled out successful proofs-of-concept and have even been successful in deploying AI in production. Some…