All recent articles

10 ways IT can navigate the chip shortage

Mar 23, 2022

Buying used gear, extending the life of existing IT equipment, and considering cloud alternatives are among the tactics industry watchers recommend for dealing with the…

Cloudflare Expands Email Security and WAF, Announces API Security Service

Mar 16, 2022

This morning, Cloudflare announced a new API Gateway service to help companies manage their API security at a low cost.

What is synthetic data? Generated data to help your AI strategy

Mar 15, 2022

Artificially generated data can be used in place of real historic data to train AI models when actual data sets are lacking in quality, volume,…

AWS, Azure Vulnerabilities Would Have Allowed Access To Other Customers’ Accounts

Mar 11, 2022

AutoWarp is no longer a problem thanks to a centralized patching effort.

Network Encryption: A Double-edged Sword for Cybersecurity

Mar 8, 2022

How do you protect the recipient when you can’t see inside the message?

How attackers sidestep the cyber kill chain

Mar 7, 2022

Many of the most popular cyberattacks don’t follow all the steps of the cyber kill chain, but you have other methods to detect threats.

Gartner: SSE is SASE minus the SD-WAN

Mar 7, 2022

Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.

10 enterprise AI trends for 2022

Mar 3, 2022

Enterprise AI is maturing quickly, with companies shifting to business-first AI strategies and AI benefits being sought out across the organization.

Enterprises Need To Prepare for Broader Cyberwar

Mar 1, 2022

Russia has a long history of using cyberattacks against its enemies.

Nine Best Practices for Zero Trust

Feb 25, 2022

Getting started with zero trust can seem like a daunting task – but the benefits are worth the cost.

Why DevOps pipelines are under attack and how to fight back

Feb 22, 2022

NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here’s advice to reduce risk to…

As Concerns About Ukraine Mount, Gov’ts Issue Ransomware Alert

Feb 16, 2022

Organizations of all sizes are recommended to “adopt a heightened posture when it comes to cybersecurity.”

By Looking at the Past, New Cyber Board Can Prepare Us for the Future

Feb 16, 2022

The Cyber Safety Review Board will see government agencies collaborate with security and network companies.

Latest Cisco VPN Router Vulnerabilities Pose Risks To Small Businesses – And Their Partners

Feb 9, 2022

With employees working from home during the pandemic, usage of this type of hardware has increased.

Your AI strategy’s secret ingredient

Feb 9, 2022

Taking a people-centered approach to rolling out artificial intelligence initiatives is the key to success, experts say. Here’s how to ensure your AI efforts are…

Top Three Use Cases for AI in Cybersecurity

Feb 3, 2022

Artificial intelligence systems can help detect zero-day malware, prioritize threats, and take automated remediation actions.

Cato adds fine-grained CASB controls to SASE platform

Feb 1, 2022

Adding CASB functionality to Cato’s SASE Cloud architecture is meant to make it easier for enterprises to protect against data breaches and cloud-delivered threats.

Top 10 outages of 2021

Jan 31, 2022

Cisco-owned network intelligence company ThousandEyes reveals the 10 biggest outages of 2021.

Data residency laws pushing companies toward residency as a service

Jan 26, 2022

Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.

How to know when AI is the right solution

Jan 19, 2022

Business value, training data, and cultural readiness are essential for AI success. Without all three, traditional solutions are your best bet.

Space is the final frontier for data centers

Jan 18, 2022

Last year marked the first time humanity deployed a conventional data center in space. The HPE Spaceborne Computer-2 – a set of HPE Edgeline Converged…

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Jan 11, 2022

Open source is everywhere, and it is all vulnerable.

Top 5 elements needed for a successful data warehouse

Dec 30, 2021

While conventional data warehouses may struggle to keep up with growing volumes of data, these five elements best give the ability to tap into valuable…

6 AIOps hurdles to overcome

Dec 21, 2021

AIOps promises to help companies intelligently manage IT operations, but the road there isn’t always smooth.

The benefits of embedded analytics

Dec 21, 2021

The top business benefits of embedded analytics and BI include improving sales, gaining competitive advantages and getting maximum value from data to improve performance.

Supply chain woes forcing more workloads to the cloud

Dec 20, 2021

Chip shortages are driving enterprises to shift applications to the cloud, avoid ad-hoc hardware purchases, and work to improve their equipment forecasting capabilities.

Looking Forward to 2022: What To Expect in Cybersecurity

Dec 17, 2021

Many of the same threats, delivered faster, and with more automation and efficiency.

Enterprises See Exponential Growth in log4jshell Attacks

Dec 15, 2021

Hackers rush to exploit the vulnerability to steal data, deploy ransomware, install back doors, create botnets, mine cryptocurrencies, and conduct other illegal activities.

7 top predictive analytics use cases: Enterprise examples

Nov 29, 2021

Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics in 2022.