Sunday, June 16, 2024
Home Authors Posts by Emma Crockett

Emma Crockett

Emma Crockett is a writer for Datamation and Enterprise Storage Forum based in Nashville, Tennessee. She writes research-based articles about data science and data storage. When she is not writing, she is searching for the best lattes in Nashville and playing with her dog, Dante.

Develop & Implement a Network Security Plan in 6 Easy Steps

A network security plan describes the rules for network access, outlines the network security environment, and explains network security policies throughout a company’s infrastructure. Network...

What is Vulnerability Scanning & Why Should You Do It?

Vulnerability scanning is software that finds cybersecurity vulnerabilities in a company’s infrastructure, network, and software. Vulnerability scanning can also detect and patch these vulnerabilities,...
ManageEngine logo.

SIEM Q&A With Manikandan Thangaraj of ManageEngine

Security information and event management (SIEM) is a cybersecurity solution that helps companies detect network threats and ensure compliance. With cybersecurity threats on the...
Top-vulnerability-scanning-tools

Best Vulnerability Scanning Tools

Software developers look to vulnerability scanning to detect vulnerabilities, enhance trust with partners, and increase security efficiency. The ideal vulnerability scanning tool should offer...
Woman typing on a laptop.

Guide to Penetration Testing vs. Vulnerability Scanning

Penetration tests allow a company to see its cybersecurity vulnerabilities from a cybercriminal’s perspective, while vulnerability scanning is software that finds and patches cybersecurity...
Black and white picture of person typing on a keyboard.

How to Conduct a Network Security Risk Assessment

A network security risk assessment allows a company to view its infrastructure from a cybercriminal’s perspective and helps spot network security issues so they...
Red Hat logo icon.

Red Hat and Lockheed Martin Collaborating on Edge AI for Military Missions

DETROIT — Red Hat and Lockheed Martin are working to improve artificial intelligence (AI) at the edge for military applications. Lockheed Martin is adopting Red...
Cisco logo icon.

Cisco and British Columbia Institute of Technology Partnering to Develop Cybersecurity Talent

VANCOUVER — Cisco and the British Columbia Institute of Technology (BCIT) are working together to help educate the “next generation” of cybersecurity professionals. Cisco and...
Accenture logo icon.

Accenture and Google Cloud Expanding Partnership Around Data and AI

NEW YORK — Google Cloud and Accenture are expanding their partnership to increase developing data and artificial intelligence (AI) solutions for customers. Accenture and Google...

Data Science Q&A With Alan Jacobson of Alteryx

Companies are using data science to study their data and make better business decisions through programming, modeling, data analytics, visualization, machine learning (ML), and...