Click to learn more about author Bernard Brode. After a period of unrivalled innovation when it comes to data storage and sharing, it seems that – for most companies, at least – hybrid models are about to reign supreme. In layman’s terms, a hybrid model is an efficient combination of existing IT systems and public […]
Is It Time for a Vulnerability Scan or Penetration Test?
Click to learn more about author Rob Chapman. How much would you pay to prevent a security breach rather than having to pay to fix it after the fact? When I ask clients that question, they tend to think about it for a few seconds. And then, in almost every case, they state a dollar […]
Wrangle Your Technology Sprawl by Adopting a DevOps Mentality
Click to learn more about author Rob Chapman. If you’re part of an IT team supporting a lot of retail locations, you’ve likely felt the burden of technology sprawl. Businesses that once had just a few servers and a small IT shop are suddenly dealing with dozens, hundreds, or maybe even thousands of systems. Unfortunately, […]
Leveraging AI and Machine Learning As Competitive Business Drivers
Click to learn more about author Dr. Michael Zeller. As volume, velocity and variety of data – often referred to as the “three V’s of Big Data” – continue- to increase, many businesses are unprepared to match the influx of this data with tools for collection and analysis. Even more surprising is that most organizations are […]
How to Protect your Enterprise Data Against Social Engineering Attacks
Click to learn more about author Ilan Paretsky. If someone had predicted, a decade or two ago, that knowledge of psychology and human behavior would one day be a key factor in protecting IT systems from cyber criminals, it would have seemed far-fetched. However, it’s very much the reality facing security professionals in 2018. Modern cyber […]