Datamation Logo
Home
Authors
Posts by Emma Crockett
thumbnail Emma Crockett

Emma Crockett

thumbnail Develop & Implement a Network Security Plan in 6 Easy Steps

Develop & Implement a Network Security Plan in 6 Easy Steps

Security
December 28, 2022

A network security plan describes the rules for network access, outlines the network security environment, and explains network security policies throughout a company’s infrastructure. Network security plans help a company protect their network, infrastructure, and data and prevent cyberattacks. See below to learn all about how a company can develop a network security plan: 6 […]

thumbnail What is Vulnerability Scanning & Why Should You Do It?

What is Vulnerability Scanning & Why Should You Do It?

Security
December 28, 2022

Vulnerability scanning is software that finds cybersecurity vulnerabilities in a company’s infrastructure, network, and software. Vulnerability scanning can also detect and patch these vulnerabilities, so cybercriminals cannot access a company’s network. For this reason, vulnerability scans should be done daily. When conducting a scan, first choose the right software and then follow a defined set […]

thumbnail SIEM Q&A With Manikandan Thangaraj of ManageEngine

SIEM Q&A With Manikandan Thangaraj of ManageEngine

Applications
December 20, 2022

Security information and event management (SIEM) is a cybersecurity solution that helps companies detect network threats and ensure compliance. With cybersecurity threats on the rise, SIEM is a key tool for organizations to protect their data. De Valle, Texas-based ManageEngine, the enterprise IT management software division of Zoho, offers SIEM technology as part of its […]

thumbnail Best Vulnerability Scanning Tools

Best Vulnerability Scanning Tools

Applications
December 20, 2022

Software developers look to vulnerability scanning to detect vulnerabilities, enhance trust with partners, and increase security efficiency. The ideal vulnerability scanning tool should offer a scalable amount to scan for growing and large companies, a price that matches the benefits, and features that cover exactly what the company needs. In this article, Datamation reviewed the […]

thumbnail Guide to Penetration Testing vs. Vulnerability Scanning

Guide to Penetration Testing vs. Vulnerability Scanning

Security
December 15, 2022

Penetration tests allow a company to see its cybersecurity vulnerabilities from a cybercriminal’s perspective, while vulnerability scanning is software that finds and patches cybersecurity vulnerabilities. Both are important components of an overall vulnerability assessment and we recommend doing both often, starting with a vulnerability scan. With this in mind, let’s take a look at the […]

thumbnail How to Conduct a Network Security Risk Assessment

How to Conduct a Network Security Risk Assessment

Security
December 13, 2022

A network security risk assessment allows a company to view its infrastructure from a cybercriminal’s perspective and helps spot network security issues so they can be addressed.  When conducting a risk assessment, start by prioritizing your assets to test, then choose the most appropriate type of network security assessment. From there, perform the assessment and […]

thumbnail Red Hat and Lockheed Martin Collaborating on Edge AI for Military Missions

Red Hat and Lockheed Martin Collaborating on Edge AI for Military Missions

AI
November 21, 2022

DETROIT — Red Hat and Lockheed Martin are working to improve artificial intelligence (AI) at the edge for military applications. Lockheed Martin is adopting Red Hat Device Edge to help it support U.S. national security missions by using AI technology in geographic locations that are hard to reach, according to Red Hat last month. Lockheed […]

thumbnail Cisco and British Columbia Institute of Technology Partnering to Develop Cybersecurity Talent

Cisco and British Columbia Institute of Technology Partnering to Develop Cybersecurity Talent

Careers
November 21, 2022

VANCOUVER — Cisco and the British Columbia Institute of Technology (BCIT) are working together to help educate the “next generation” of cybersecurity professionals. Cisco and BCIT are partnering to expand BCIT’s Industrial Network Cybersecurity (INC) Lab to merge cybersecurity and networking skills training to boost interest and talent in the cybersecurity field in Canada and […]

Accenture and Google Cloud Expanding Partnership Around Data and AI

Accenture and Google Cloud Expanding Partnership Around Data and AI

AI
November 21, 2022

NEW YORK — Google Cloud and Accenture are expanding their partnership to increase developing data and artificial intelligence (AI) solutions for customers. Accenture and Google Cloud are collaborating to help customers build a “strong digital core” “reinvent” themselves in the cloud by using machine learning (ML), AI, data analytics, and cybersecurity, according to Accenture last […]

thumbnail Data Science Q&A With Alan Jacobson of Alteryx

Data Science Q&A With Alan Jacobson of Alteryx

Big Data
November 15, 2022

Companies are using data science to study their data and make better business decisions through programming, modeling, data analytics, visualization, machine learning (ML), and artificial intelligence (AI). Based in Irvine, California, Alteryx is a software company focused on data engineering, data science processes, data analytics, reporting, and ML to help companies democratize their data across […]

Page 5 of 8
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.