Fantastic Open Source Cybersecurity Tools and Where to Find Them

Fantastic Open Source Cybersecurity Tools and Where to Find Them

Maria KorolovMay 19, 2022

Open source is a double-edged sword for information security. On the one hand, security professionals rely on countless open source…

Latest AI articles

10 key roles for AI success

10 key roles for AI success

Jun 7, 2022

More companies in every industry are adopting artificial intelligence to transform business processes. But the success of their AI initiatives depends on more than just data and technology — it’s also about having the right people on board. An effective enterprise AI team is a diverse group that encompasses far more than a handful of data scientists and engineers. Successful AI teams also include a range of people who understand the business and the problems it’s trying to solve, says Bradley Shimmin, chief…

AI takes aim at employee turnover

AI takes aim at employee turnover

Apr 7, 2022
With attrition an increasingly challenging issue, companies are turning to chatbots and machine learning to augment HR strategies for gauging employee sentiment, identifying flight risks, and strengthening career support.
10 tips for getting started with decision intelligence

10 tips for getting started with decision intelligence

Mar 30, 2022
Adding intelligence and automation to decision-making processes can greatly improve business agility and outcomes. But making the most of decision intelligence takes continual tuning.
What is synthetic data? Generated data to help your AI strategy

What is synthetic data? Generated data to help your AI strategy

Mar 15, 2022
Artificially generated data can be used in place of real historic data to train AI models when actual data sets are lacking in quality, volume, or variety.

Latest Cybersecurity articles

Bugs in the data center: How social engineering impacts physical security

Bugs in the data center: How social engineering impacts physical security

Jun 9, 2022

One data center management team learned the hard way that bugs can be a menace — or, to be more specific, the people who hunt them. And we’re talking about real, six-legged bugs, not the computer kind. It started last November when NetSPI, a Minneapolis-based penetration testing firm, was hired to do a test by a company that owned several colocation facilities. NetSPI’s job was to use social engineering to physically breach the data center, with the objective to get into one of their facilities and into a position where they could access the networks. “This was a highly secured…

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Apr 26, 2022
Impacket can be deployed for penetration testing – but it can also be used to execute malicious code.
What is the cyber kill chain? A model for tracing cyberattacks

What is the cyber kill chain? A model for tracing cyberattacks

Apr 14, 2022
The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.
6 Reasons Why More Automation Means More Secure Software

6 Reasons Why More Automation Means More Secure Software

Apr 11, 2022
The growing complexity of software — and the ever-increasing security threats to the software supply chain — are often too much for mere human engineers to manage. The only way to keep up? With automation.

Latest Networking articles

Who’s selling SASE and what do you get?

Who’s selling SASE and what do you get?

Apr 7, 2022

Demand for secure access service edge (SASE) has grown tremendously during the pandemic. As adoption picks up, vendors are promising feature-rich and integrated SASE solutions. Customers have different needs when it comes to SASE, however, and it’s not always easy to understand what a SASE provider is offering. As an approach, SASE combines networking and security into a scalable cloud service that fits with the remote and hybrid work models companies use today. Potential benefits include easier network and security management, flexibility to scale up or down as business needs require, and lower costs. Functionally, the five main pillars of SASE are SD-WAN,…

Supply chain woes forcing more workloads to the cloud

Supply chain woes forcing more workloads to the cloud

Dec 20, 2021
Chip shortages are driving enterprises to shift applications to the cloud, avoid ad-hoc hardware purchases, and work to improve their equipment forecasting capabilities.
Cisco CCIE certification explained

Cisco CCIE certification explained

Nov 23, 2021
Cisco Certified Internetwork Expert demonstrates an advanced understanding of networking principles plus specialized expertise in an area such as enterprise infrastructure, wireless, data center, security, and collaboration.
SASE Model Proving Value Beyond Remote Work Scenarios

SASE Model Proving Value Beyond Remote Work Scenarios

Sep 30, 2021
When the pandemic hit, enterprises rushed to the new cloud-based networking solutions for remote employees. Now it’s being applied to on-prem data centers and WANs.

Latest Blog Posts

Online Filemaker alternatives: Coda, Zoho, AppSheet, AppGyver, and more

Apr 1, 2020
Online Filemaker alternatives: Coda, Zoho, AppSheet, AppGyver, and more

UPDATE FEB. 2021: Lately, I’ve been testing out a new online collaboration tool called Notion. The basic plan, which includes sharing with up to five collaborators, is free. It allows for embedded related tables. It supports PDF exports for things…

My writing groups meet on Zoom

Mar 25, 2020
My writing groups meet on Zoom

New update, June 18: I’ve started a new virtual Zoom-based MeetUp group for speculative fiction writers. If you write science fiction, fantasy or horror, check us out. Update: Since this post was first published, several people have contacted me from…

Otter.AI just announced a great free deal on its transcription

Mar 25, 2020
Otter.AI just announced a great free deal on its transcription

(Image courtesy Otter.AI.) Another tool useful for writers that I’ve talked about this one in writers’ meetings before is Otter.AI. It transcribes your dictation. You just talk, and it converts it into text, with any smartphone.…

The tech journalist starter kit

Oct 23, 2019
The tech journalist starter kit

Filming IDG Tech Talk in September of 2019. A friend of a friend just called me, asking for advice on how to become a technology journalist. I promised to send him some links and figured I’d…

The Lost King of Krim hits multiple Amazon category bestseller lists

Sep 6, 2019
The Lost King of Krim hits multiple Amazon category bestseller lists

The Lost King of Krim was #10 on Amazon’s Two-Hour Science Fiction & Fantasy Short Reads best seller list on September 11, 2019. The Lost King of Krim, a novella of the Krim virtual world that…

Sunday morning writing Mastermind group

Aug 29, 2019
Sunday morning writing Mastermind group

I am putting together a writers’ Mastermind group, to meet Sunday mornings via conference calls, such as Skype or Facebook video. You can read my full bio here, but the basic summary is that I’ve been a journalist for more…