Analyses

linux penguin security
blockchain ecosystem

Hacking stealing password data

Two years after the OPM data breach: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

puzzle tower / growth / achievement / risk / balance

Apple’s Core ML: The pros and cons

Apple’s impressive iOS machine learning technology teeters between its limits and its ease of adoption by developers

artificial intelligence / machine learning / network

How to tell if AI or machine learning is real

False and misleading claims abound that applications and cloud services are now smart. Here’s how to identify true artificial intelligence and machine learning

021317blog software

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.

cybersecurity skills and talent shortage

Why linguistics can't always identify cyber attackers' nationality

The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable.

Wiki edit bots engage in long-term feuds

Reality check: The state of AI, bots, and smart assistants

We’ve made a lot of progress in artificial intelligence over the last half century, but we’re nowhere near what the tech enthusiasts would have you believe

target ciso primary

Target's data breach settlement sets a low bar for industry security standards

Target’s multistate data breach settlement over its 2013 data breach outlines the kind of security measures enterprises should have in order to not be found negligent with customer data. The problem is, the settlement doesn’t go far...

cost savings ts

Leave AWS? Not for easier cloud discounts

If Amazon's competitors think they can win customers with better pricing, they should think again

code programming software bugs cybersecurity

Patch the Samba bug before a network worm exploits it

It isn’t at WannaCry-crisis levels yet, but the fact that Samba is so widely used means a network worm can really have a field day exploiting this vulnerability.

sky space dark galaxy universe constellation cosmos astronomy

Does Microsoft's Cosmos DB promise too much?

Microsoft says its new Azure cloud database is all types of databases in one. Here's why that might be a problem

the word

How to use blockchain: Following an asset through its lifecycle to learn more

Deployed in the enterprise, blockchain can help track the origin of goods to ensure sustainable use of raw materials, verify provenance of intellectual property, and more

12 ways to improve run-time container security

Checkpoints spanning from simple preparations to more advanced run-time security controls

openstack logo cloud

What has OpenStack done for me lately? The next 5 issues to address

By focusing on these critical areas, the OpenStack community can extend fully-open private and hybrid cloud infrastructure to everyone

wifi iot

WiFi’s evolving role in IoT

WiFi is often the obvious choice for IoT, but limitations have lead to the addition of two new specifications, 802.11ah and 802.11ax

threat spy unsecure hack

Threat detection automation won’t solve all your problems

To close the cybersecurity gap, look to incident response automation

storm clouds dark

Did cloud kill backup?

No, but it does necessitate a reinvention of data protection for the new normal of the multi-cloud world

mobile apps smartphone tablet users business

Why some people are willing to pay for a mobile app

A look at who will and who won’t pay for an app and what it means for mobile app developers.

10 cloud manager

Oracle’s enterprise cloud journey is only just beginning

Even though Oracle is seeing 50 percent growth for its cloud computing business, CEO Mark Hurd explains why the industry is only in the first inning of enterprise adoption.

Load More