The future of ERP is AI
Despite cultural barriers and legacy tech, AI is poised to take over ERP functions, with ERP vendors adding new machine learning features and enterprises keen to investigate.
The future of ERP is AI Read More »
Despite cultural barriers and legacy tech, AI is poised to take over ERP functions, with ERP vendors adding new machine learning features and enterprises keen to investigate.
The future of ERP is AI Read More »
Here’s what data center managers can do to reduce exposure to the likes of the Andromeda botnet.
Despite Takedowns, Botnets Aren’t Going Away Any Time Soon Read More »
Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
What is a botnet? And why they aren’t going away anytime soon Read More »
By being slow to add deep visibility into cloud environments, incumbent SIEM vendors leave themselves open to disruption by the likes of Splunk.
Why Traditional Security Info and Event Management Tools No Longer Cut It Read More »
The firewall as we know it cannot keep up with today’s enterprise application needs.
How the Cloud Killed the Firewall Read More »
While a lot of work, honey pots are one of the most effective ways of pre-empting serious security breaches.
Data Center Security: Honey Pots and the Art of Deceiving Hackers Read More »
Secure Channels pitches a secure storage service for movies and other sensitive intellectual property, but can it solve its reputation problem?
What IP? Ex-con’s Security Firm Offers to Solve Hollywood’s Piracy Problem Read More »
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
How hackers crack passwords and why you can’t stop them Read More »
Encrypting data at rest and in flight is not enough; solution could help Equifax avoid epic breach
New Chip Design Gains Traction as Fix for Major Data Center Security Hole Read More »
As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent intrusions. Attackers are evolving their methods, which might require that you look at the cyber kill chain differently. What follows is a recap of what the cyber kill chain approach
What is the cyber kill chain? Why it’s not always the right approach to cyber attacks Read More »
Machine learning helps security systems uncover deviations human security pros cannot detect
AI Starts Making Inroads into Data Center Security Read More »
As organizations move operations to cloud environments, basic security controls are sometimes not implemented correctly.
The Huge Security Threat of Misconfigured Cloud and How to Fix It Read More »
Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes have gone up. With this year’s fast-spreading ransomware attacks and ever-tightening compliance requirements, response must be much faster. Adding staff is tough with the cybersecurity hiring crunch, so companies are turning to machine learning and
How AI can help you stay ahead of cybersecurity threats Read More »
Experts question the company’s ability to survive allegations that the Russian government has built backdoors into its software.
Is It Time for Data Center Managers to Say Goodbye to Kaspersky? Read More »
Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers extra when they were under attack. The company claims to have nearly 10 million customers and a presence in 117 cities around the world, with enough capacity to handle more than 15 terabits of traffic
Unlimited DDoS protection the new norm after Cloudflare announcement Read More »