Tuesday, April 20, 2021

Melisa Bleasdale

Coping With Insider Threats

The approach to enterprise security has always been to build the fortress walls bigger and higher -- write more policies, install more products. Yet despite...

Black Markets and the Online Mob

Once the domain of uber savvy hackers and forward-thinking mafioso, today's online crime requires little more than a cursory knowledge of programming and a downloadable tool kit...

Email Security: How Much is Enough?

Although we have long since known about the virility of email threats and viruses, this year continues to supply heavily evolved and critically destructive email attacks. According to...

Phishing: What’s Spam Got to Do With It?

Phishing is like spam in only one respect. They both come across email. In all other ways they're quite different. People sending spam are trying to sell you...

Latest Articles

IT Planning During a Crisis

Without a doubt, 2020 changed everything. I like to compare it to a science fiction movie where time travel is involved. Clearly, we have...

Best Data Quality Tools &...

Data quality is a critical issue in today’s data centers. The complexity of the Cloud continues to grow, leading to an increasing need for...

NVIDIA’s New Grace ARM/GPU Solution...

This week is NVIDIA’s GTC, or GPU Technology Conference, and they likely should have changed the name to ATC because this year – it...

What is Data Segmentation?

Definition of Data Segmentation Data segmentation is the process of grouping your data into at least two subsets, although more separations may be necessary on...