How Organizations Can Defend Against Advanced Persistent Threats

Tips for organizations and businesses on how to defend against advanced persistent threats (APT) cyber attacks. Source: How Organizations Can...

US Air Force Evaluating Cyber/IoT Vulnerabilities of DoD Critical Infrastructure

The Air Force is looking for industry help in securing security and industrial control systems networks on its bases. Under...

Brandsparency: Who Builds Brands These Days? – Brand Quarterly

Great article highlighting the 7 P’s of branding: Product, Price, Place, Promotion, People, Processes, Physical-evidence, and mostly importantly Purpose! Source:...

Report: IoT and blockchain integration is booming among US businesses

Gartner finds 75% of organizations that have implemented IoT plan to pair it with blockchain tech. Source: Report: IoT and...

The Ultimate Guide to Ethical Hacking – What You Need to Know

Hacking has a negative reputation, but some hackers are making the internet a better, safer place. Whether they use their...

Fed Opens Up Alternative Data – More Credit, More Algorithms, More Regulation

A Dec. 4 joint statement released by the Federal Reserve Board, the Consumer Financial Protection Bureau (CFPB), the Federal Deposit...

10 future trends and how CIOs can keep ahead in 2020

After years of digital disruption and uncertainty, the future enterprise is finally coming into focus. Here’s a look at what’s...

Now Hiring: People Who Can Translate Data Into Stories and Actions

Hiring data translators isn’t easy—they’re so rare that recruiters have started calling them “unicorns.” Where do you find them? Source:...

Need a loan? There’s a tech company for that.

Tech critics aren’t keen on the idea, pointing to a history of using automated systems that end up discriminating against...

Complete Cloud Native Security Is Here from Palo Alto Networks

Prisma Cloud extends to workload protection and vulnerability management with Twistlock and PureSec It’s a cliché at this point to...

1 2 3 16