eCommerce Fraud Presents A $12 Billion Problem

As eCommerce grows amid the coronavirus, retail fraud is on the rise. Of the estimated $630B of online sales, a...

Top 12 business intelligence (BI) tools for 2020

It’s not always easy choosing a business intelligence tool to meet the needs of your enterprise. Here are 12 that...

Coming Soon: Open-Source Blueprints for a Tiny Nuclear Reactor

Anyone want to build their own power plant? Source: Small Nuclear Reactors | Nuclear Reactor Types and Designs

Tsundoku: The practice of buying more books than you can read

The Japanese word describes piling up books to save for later … even if you’ll never actually read them. Source:...

Enabling Proactive Cybersecurity in Health Care as Threats Proliferate

eWEEK DATA POINTS: More digital health data in increasingly interconnected systems is met by a rapid growth in cyber threats....

What is AIOps? Injecting intelligence into IT operations

Organizations seeking to better monitor IT assets are turning to artificial intelligence to get ahead of performance issues and to...

Using Cognitive Psychology in UX Design: What to Know

Even if a website is spotless from the UI viewpoint, it could still deliver poor user experiences. Apart from their...

Surge in Attacker Access to Privileged Accounts and Services Puts Businesses at Risk

There is a major security gap that is obvious, important and urgent: the ability to know if privileged accounts and...

Understand how to apply service-oriented architecture (SOA) for IoT

Internet of Things service-oriented architecture can simplify the process of adjusting an IoT deployment to changes in the real-world by...

IoT device authentication rules unclear as California law comes into force

California has become the first state in the country to regulate IoT security, an action that has raised concern from...

1 2 3 4 18