Cryptojacking is a cyberattack like no other. Attackers don’t steal your data or ransom off access to your network. Instead, […]
Data and Security
Has Martech Made Things Too Complicated?
The arrival of martech was heralded as the next stage of marketing. These platforms enabled marketers to gather endless reams […]
How to Improve Digital Security for Your Business
The good news is that data breaches appear to be declining in 2018, according to the Risk Based Security Q1 2018 […]
Enterprise App Design: Does iOS Fare with Android in terms of Security?
More enterprises are investing in mobile applications on platforms preferably iOS. The 2016 enterprise mobile apps report brought out by […]
Could the General Data Protection Regulation Be the First Step Toward Real Data Protection?
If you scour the internet for your personal data, stop. It’s already out there in the hands of companies, and no […]
What Does the Repeal of Net Neutrality Mean for Your Data Security?
Although FCC Chairman Ajit Pai stated, “I strongly support a free and open internet,” the FCC officially repealed net neutrality […]
3 CRM Features You Need to Become GDPR Compliant
GDPR is coming and many organizations are changing their ways – you must have noticed getting emailed from your favorite […]
Does Big Data Affect Our Daily E-Commerce Experience?
There’s no getting around it: the way marketers and retailers harness the power of big data can be a little […]
Coming to Terms – Why Terms of Use are Critical for Your Company
Every time you’ve installed a piece of commercial software, you’ve invariably been presented with what must have appeared to be […]
Navigating Big Data’s Fake News Problem
In 2013, hackers managed to access the AP twitter account and posted a fake tweet implying that there was an […]
Despite the Hype, Big Data Might Not Be What You Need
The big data trend continues, and more and more companies are hopping on the bandwagon. While many organizations assume they […]
Are AI and Big Data the Economic Levelers We’ve Been Looking for?
For all of the “isms” supposedly being felled by enlightened Americans, the U.S. economy remains stunningly unfair. Take racism. On […]
Data Lake vs. Data Warehouse: Which Is the Best Data Architecture?
For a business in digital transition, data architecture is a big decision. Selecting the right model is one of the […]
How to Improve Cybersecurity in a Smart City
The smart city began as a science fiction dream, but it’s very quickly becoming a reality. Municipal infrastructure, integrated with […]
How to Put Big Data’s Superpowers to Work for Marketing
Companies may be well aware they’re sitting on a gold mine of data, but most of them have no idea […]
3 Steps to Stop Unauthorized PHI Access by Terminated Team Members
In February 2017, the Transformations Autism Treatment Center learned that one of its former behavioral analysts had breached its security. […]
Microsoft-GitHub Purchase’s Huge Price Tag Belies Big Competitive Worries
In 2006 Google’s acquired YouTube for $1.65 billion, and Facebook acquired Instagram for $1 billion in 2012. Many dismissed these purchases […]
Marketers, You’re Wasting Your Data
Data has never been more critical to marketing success. Companies are striving to employ the latest analytics to drive improvement […]
4 Things Spotify Can Teach You About Data Sharing
At media companies, 2018 might be remembered as the year that someone finally got data sharing right. To be sure, […]
Businesses Broke Ground on Blockchain. What Can Civic Groups Learn?
At best, blockchain has been a trial-and-error technology. For every successful cryptocurrency, there are a dozen cases like Civil, which […]
Mr. Cooper reports data breach in recent cyberattack
The mortgage and loan company Mr. Cooper, servicing over four million customers, recently confirmed a significant data breach following a […]
Palo Alto Networks Acquires Israel’s Talon Cyber for $625M
Palo Alto Networks has acquired Israel-based cybersecurity startup Talon Cyber Security for $625 million, the company confirmed Monday. The deal […]
Personal data of US troops for sale: Senators call for regulation
A recent study from Duke University, reported by NBC News, has exposed a troubling trend: Data brokers are actively selling […]
Unraveling cybercrime network’s underground operations
An underground cybercrime network, SWAT USA Drop Service, situated in Russia, currently has over 1,200 American employees, many of whom are […]
Five Eyes confronts China over intellectual property theft
In a rare joint statement, the intelligence chiefs of the Five Eyes alliance — the United States, the United Kingdom, […]
Israel is tracking Gaza’s cellphone data to inform military operations
The Israeli army is using Palestinians’ cellphone data in its military campaign to monitor the population’s movements within Gaza. Recent […]
Colorado Supreme Court affirms use of Google keyword search warrants
On Monday, the Colorado Supreme Court made a pivotal decision about using Google search data in criminal cases. This decision, […]
HTTP/2 rapid reset flaw exposes web traffic to potential attacks
A recently discovered flaw in the HTTP/2 protocol, which underpins a significant portion of web traffic, has raised concerns among […]
Vulnerabilities found in ConnectedIO’s ER2000 edge routers and cloud-based management platform
Several high-risk security vulnerabilities have been found in ConnectedIO’s ER2000 edge routers and the cloud-based management platform, raising questions about […]
Unmasking Oospy: dismantling global spyware menace
A spyware operation known as Oospy has been dismantled after its web host, Hetzner, deactivated its back-end server. Oospy was […]
Why Enterprises Must Transition Beyond Traditional ETL: A Vital Imperative
Data is expanding, and so are the enterprise challenges to manage this growth. Most of these challenges boil down to […]
23andMe confirms data leak: Personal genetic information for sale on hacker forums
U.S. biotech firm 23andMe’s user data was leaked and is now circulating on hacker forums. 23andMe confirmed the data leak’s authenticity […]
Indian Cyber Force Targeting Canadian Sites, and Other Cybercrimes
Hackers from India, who call themselves the Indian Cyber Force, have threatened to target Canadian websites in response to claims […]
Ransomware Negotiation and Ethics: Navigating the Moral Dilemma
Ransomware attacks have developed in recent years from mere data breaches to sophisticated operations. These attacks often involve targeting organizations, […]
The Battle Against Identity Fraud: Are You Prepared?
Spotting identity fraud is a big headache for companies all around the globe. According to a survey by Regula, 69% […]
Mozilla patches Firefox and Thunderbird against zero-day exploits
Mozilla fixed a critical zero-day vulnerability affecting its Firefox web browser and Thunderbird email client via emergency security updates. The […]
Automated Threat Hunting: How AI Can Help Businesses Spot Shady Network Activity
The global artificial intelligence market is growing by leaps and bounds. It is expected to increase twentyfold by the end […]
6 Steps to Implementing Cloud Security Automation
Cloud security automation is crucial for protecting your team’s cloud environment from today’s ever-changing threat landscape. Automating security protocols can […]
Best UEBA Use Cases to Implement in Healthcare
Security is essential for all industries, but healthcare faces more pressure than most. Hospitals store vast amounts of highly sensitive […]
Get Ahead of the Curve: Crafting a Roadmap to a Successful Data Governance Strategy
Data Governance is an essential part of any organization’s success. Crafting a successful data governance strategy is key to staying […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 23
- Next Page »