Cryptojacking is a cyberattack like no other. Attackers don’t steal your data or ransom off access to your network. Instead, […]
Data and Security
Has Martech Made Things Too Complicated?
The arrival of martech was heralded as the next stage of marketing. These platforms enabled marketers to gather endless reams […]
How to Improve Digital Security for Your Business
The good news is that data breaches appear to be declining in 2018, according to the Risk Based Security Q1 2018 […]
Enterprise App Design: Does iOS Fare with Android in terms of Security?
More enterprises are investing in mobile applications on platforms preferably iOS. The 2016 enterprise mobile apps report brought out by […]
Could the General Data Protection Regulation Be the First Step Toward Real Data Protection?
If you scour the internet for your personal data, stop. It’s already out there in the hands of companies, and no […]
What Does the Repeal of Net Neutrality Mean for Your Data Security?
Although FCC Chairman Ajit Pai stated, “I strongly support a free and open internet,” the FCC officially repealed net neutrality […]
3 CRM Features You Need to Become GDPR Compliant
GDPR is coming and many organizations are changing their ways – you must have noticed getting emailed from your favorite […]
Does Big Data Affect Our Daily E-Commerce Experience?
There’s no getting around it: the way marketers and retailers harness the power of big data can be a little […]
Coming to Terms – Why Terms of Use are Critical for Your Company
Every time you’ve installed a piece of commercial software, you’ve invariably been presented with what must have appeared to be […]
Navigating Big Data’s Fake News Problem
In 2013, hackers managed to access the AP twitter account and posted a fake tweet implying that there was an […]
Despite the Hype, Big Data Might Not Be What You Need
The big data trend continues, and more and more companies are hopping on the bandwagon. While many organizations assume they […]
Are AI and Big Data the Economic Levelers We’ve Been Looking for?
For all of the “isms” supposedly being felled by enlightened Americans, the U.S. economy remains stunningly unfair. Take racism. On […]
Data Lake vs. Data Warehouse: Which Is the Best Data Architecture?
For a business in digital transition, data architecture is a big decision. Selecting the right model is one of the […]
How to Improve Cybersecurity in a Smart City
The smart city began as a science fiction dream, but it’s very quickly becoming a reality. Municipal infrastructure, integrated with […]
How to Put Big Data’s Superpowers to Work for Marketing
Companies may be well aware they’re sitting on a gold mine of data, but most of them have no idea […]
3 Steps to Stop Unauthorized PHI Access by Terminated Team Members
In February 2017, the Transformations Autism Treatment Center learned that one of its former behavioral analysts had breached its security. […]
Microsoft-GitHub Purchase’s Huge Price Tag Belies Big Competitive Worries
In 2006 Google’s acquired YouTube for $1.65 billion, and Facebook acquired Instagram for $1 billion in 2012. Many dismissed these purchases […]
Marketers, You’re Wasting Your Data
Data has never been more critical to marketing success. Companies are striving to employ the latest analytics to drive improvement […]
4 Things Spotify Can Teach You About Data Sharing
At media companies, 2018 might be remembered as the year that someone finally got data sharing right. To be sure, […]
Businesses Broke Ground on Blockchain. What Can Civic Groups Learn?
At best, blockchain has been a trial-and-error technology. For every successful cryptocurrency, there are a dozen cases like Civil, which […]
Responsible Data Collection: Why It Matters for Businesses Today
As technology has evolved, so has the amount of data businesses collect about their customers and competitors. While this can […]
Ethical Considerations in IoT Data Collection
Last year, a court determined Richard Dabate — who police had found with one arm and one leg zip-tied to […]
Leverage Generative AI Advantages While Safeguarding Your Future
Generative AI has a transformative impact across nearly all industries and applications. Large Language Models (LLMs) have revolutionized natural language […]
How Important Is Explainability in Cybersecurity AI?
Artificial intelligence is transforming many industries but few as dramatically as cybersecurity. It’s becoming increasingly clear that AI is the […]
How to Build an Efficient Data Team to Work with Public Web Data
The topic of how to assemble an efficient data team is a highly debated and frequently discussed question among data […]
How to Use Automation to Reduce Your Attack Surface
Companies are diversifying their resources and data silos. Some enterprises move this information to cloud providers, while others swear by […]
Using AI and Big Data to Create a Workplace that Appeals to Gen Z
If you’re an entrepreneur or tech professional wondering how to engage and keep Gen Z employees, turning to AI and […]
Your Data Protection Checklist
Data is the lifeblood of modern businesses that enables organizations to drive innovation. However, with the increasing reliance on data […]
Android Introduces Unknown Tracker Alerts: Enhancing User Safety
To further improve user security, Android, the most popular mobile OS, has introduced a new feature called “Unknown Tracker Alerts.” […]
Protect AI Raises $35 Million to Safeguard Machine Learning Code
Seattle-based startup Protect AI has recently secured $35 million in funding to expand its groundbreaking platform that protects machine learning […]
TikTok Takes on Twitter with Text-Only Posts
The popular short-video app TikTok has made a calculated decision to increase the breadth of its offering. TikTok has announced […]
TheTruthSpy: The Stalkerware That Made Millions
In an era where technology permeates every aspect of our lives, privacy has become a precious commodity. Unfortunately, there are […]
North Korean Hackers Are Targeting Your Cryptocurrency
In a recent cybersecurity breach, North Korea-backed hackers targeted cryptocurrency clients by infiltrating the systems of JumpCloud, a prominent U.S. […]
Identifying Potential Entry And Exit Points In Crypto Trading
Cryptocurrency trading has gained immense popularity in recent years, with traders looking to capitalize on the volatile nature of digital […]
White House Sounds Alarm Bells over Israeli Surveillance Tech Acquisition
The Israeli firm NSO Group developed the infamous Pegasus spyware, and the White House has issued a warning to American […]
Why Proactivity With Data Security and Privacy Is More Important Than Ever — and How to Be on Top of It
Data masking is a security and data privacy technique that obscures or anonymizes specific data elements within a database, application, or […]
How the Application of AI in Threat Detection Will Revolutionize Cybersecurity
The increasing sophistication and pervasiveness of cyber threats keep businesses on their toes — 493.33 million attacks were reported in […]
Debugging Security Vulnerabilities in Blockchain Mobile Applications: Practical Tips and Tricks
In today’s rapidly-evolving digital landscape, blockchain technology has emerged as a revolutionary force for change. But as more and more […]
Fortifying National Security: Inside the DoJ’s New Cybersecurity Unit Combatting State-Backed Hackers
In the ever-evolving landscape of technology, cybersecurity has become a paramount concern for governments and organizations worldwide. With the rise […]
A Guide to Identifying and Avoiding Top Crypto Scams
The surge in popularity of Bitcoin and other cryptocurrencies has a dark underbelly. It is spurring the growth of a vast […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 23
- Next Page »