The Latest in IT Security

1

With most people having a near-constant connection to the internet in one form or another, it’s imperative to understand the associated data privacy implications and take appropriate actions to protect sensitive information. Whether you’re using a mobile phone, tablet, laptop or desktop computer, our devices are always in communication with the internet, sometimes even without […]

Read more ...

1

When it comes to artificial intelligence (AI) and security, InfoSec and IT teams have raised skepticism to an art form. After all, we’ve been hearing since the late 1980s that AI is coming. Given that most vendors have slipped AI and machine learning (ML) terminology into their marketing speak, it seems like it’s much more […]

Read more ...

1

Enterprise risk management (ERM) is the process of assessing risks to identify both threats to a company’s financial well-being and opportunities in the market. The goal of an ERM program is to understand an organization’s tolerance for risk, categorize it, and quantify it. When companies look at enterprise risk, the traditional approach is to look […]

Read more ...

Categories

FRIDAY, NOVEMBER 16, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks