All recent articles

AI in cybersecurity: Raising the stakes for enterprise defense

Aug 11, 2022

Enterprises, governments and other organizations now have access to more powerful weapons in their defensive arsenal with AI – but so do malevolent hackers.

Unlocking the hidden value of dark data

Aug 11, 2022

The chances are that most of the data you collect — from human communications to machine logs — is piling up with little plan for…

Early adopters embrace private 5G

Aug 8, 2022

Two arenas and a manufacturing center are deploying private 5G networks for tech gains that include low latency, high reliability, and support for massive numbers…

Who’s selling private 5G and what do you get?

Aug 8, 2022

There are five common ways for companies to procure private 5G networks, and service levels can vary dramatically.

How Architecture Teams Can Shift to an AI-First Data Strategy

Jul 25, 2022

Making use of artificial intelligence takes more than just buying the technology and flipping the “on” switch. Companies need to understand the goals they want…

Data lakehouses give enterprises analytics edge

Jul 11, 2022

Blending the structure of data warehouses and the flexibility of data lakes, data lakehouses are proving to be versatile tools for making the most of…

6 signs your IAM strategy is failing, and how to fix it

Jul 5, 2022

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here’s how to spot and avoid the worst of them.

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Jun 28, 2022

Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.

Computer vision is primed for business value

Jun 23, 2022

Companies across a range of industries are deploying image- and video-based artificial intelligence to improve and optimize key business processes and products.

Private 5G promising for enterprises, but growth stymied by pandemic, lack of hardware

Jun 23, 2022

It’s still early days for private 5G networks, as a majority of enterprises are waiting for devices to mature, standards to progress, and solid use…

9 ways hackers will use machine learning to launch attacks

Jun 13, 2022

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors…

Bugs in the data center: How social engineering impacts physical security

Jun 9, 2022

A closer look at how one penetration testing firm was able to breach the physical security of a data center in less than a week,…

10 key roles for AI success

Jun 7, 2022

To maximize the business value of artificial intelligence, AI teams require a diverse range of skills and roles, from data scientists to domain experts to…

Traditional BI vs. self-service BI shouldn’t be a choice

Jun 1, 2022

Traditional BI vs. self-service BI isn’t a choice organizations need to make, but rather a partnership that requires elements from both to bring effective data…

Making the most of MLOps

May 26, 2022

Enterprises looking to reap the full business benefits of artificial intelligence are turning to MLOps — an emerging set of best practices and tools aimed…

7 machine identity management best practices

May 24, 2022

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

Fantastic Open Source Cybersecurity Tools and Where to Find Them

May 19, 2022

Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.

6 business risks of shortchanging AI ethics and governance

May 17, 2022

Factors inherent to artificial intelligence and its implementation can have dire ramifications for your company if ethics and governance aren’t baked into your AI strategy.

Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

May 17, 2022

And it is not the only company to take hardware security seriously.

Machine Identity Management: A Fast-Growing Frontier of Security

May 5, 2022

Attackers are getting better at compromising machine identities, as billions of new devices and services are introduced to the network.

For Competing Recruiters, Twitter’s Turmoil Could Be a Gift

May 4, 2022

The prospect of Elon Musk taking over Twitter has its employees uncertain about their futures — and recruiters for IT roles licking their chops.

Legitimate Security Tool Used Against Ukrainian Power Grid, Now Top Global Threat

Apr 26, 2022

Impacket can be deployed for penetration testing – but it can also be used to execute malicious code.

How SASE uses AI

Apr 18, 2022

SASE vendors are applying AI and machine learning to the network- and security-related data they collect to sharpen analytics, tighten security and boost performance.

What is the cyber kill chain? A model for tracing cyberattacks

Apr 14, 2022

The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.

Why businesses should know the importance of data quality

Apr 13, 2022

Data quality, building data trust and identifying bias are critical for organizations to confidently make decisions based on the data they collect.

6 Reasons Why More Automation Means More Secure Software

Apr 11, 2022

The growing complexity of software — and the ever-increasing security threats to the software supply chain — are often too much for mere human engineers…

AI takes aim at employee turnover

Apr 7, 2022

With attrition an increasingly challenging issue, companies are turning to chatbots and machine learning to augment HR strategies for gauging employee sentiment, identifying flight risks,…

Who’s selling SASE and what do you get?

Apr 7, 2022

SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer…

Physical Infrastructure Cybersecurity: A Growing Problem for Data Centers

Apr 6, 2022

Data centers remain vulnerable to attacks against operational technology – and broader adoption of IoT isn’t helping.

10 tips for getting started with decision intelligence

Mar 30, 2022

Adding intelligence and automation to decision-making processes can greatly improve business agility and outcomes. But making the most of decision intelligence takes continual tuning.