Friday, July 23, 2021

Melisa Bleasdale

Coping With Insider Threats

The approach to enterprise security has always been to build the fortress walls bigger and higher -- write more policies, install more products. Yet despite...

Black Markets and the Online Mob

Once the domain of uber savvy hackers and forward-thinking mafioso, today's online crime requires little more than a cursory knowledge of programming and a downloadable tool kit...

Email Security: How Much is Enough?

Although we have long since known about the virility of email threats and viruses, this year continues to supply heavily evolved and critically destructive email attacks. According to...

Phishing: What’s Spam Got to Do With It?

Phishing is like spam in only one respect. They both come across email. In all other ways they're quite different. People sending spam are trying to sell you...

Latest Articles

Data Science Market Trends 2021

When famed mathematician John W. Tukey postulated that advanced computing would have a profound effect on data analysis, he probably didn’t imagine the full...

Data Recovery Market Trends 2021

Data recovery is more important than ever in this era of constant cyber attacks and ransomware. The Verizon Data Breach Investigations Report (DBIR) looked...

Trends in Data Visualization

In a world of big data, visualization is becoming a key skill set that every business must master.  Digital technology has transformed the way businesses...

Microsoft Data Portfolio Review

With a host of analytics services for almost any situation, Microsoft Azure’s data services have got just about every base covered.   In the world...