Mon.Aug 21, 2017

article thumbnail

Are you ready for state-sponsored zombie malware attacks?

CTOvision

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […].

Malware 167
article thumbnail

5 Ways Mobile Device Management Drives BYOD Policy

IT Toolbox

The history of Bring Your Own Device (BYOD) has been a rocky one. Since the beginning, IT departments and business owners have tried to understand the idea and learn how to make it positive for the business instead of a headache. To help them achieve this goal, software emerged on the market called mobile device management (MDM).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FBI vs Apple: Policy Analysis

CTOvision

Editor’s note: This is the second in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security.-bg Despite foreboding tales of doom associated with the potential outcome on each […].

Analysis 152
article thumbnail

Seven Tricks for Better ERP Automation

IT Toolbox

ERP serves as a critical nerve center for most businesses that use them. This means that efficiency with an ERP system often directly translates into business efficiency. And that, in turn, drives competitiveness. One place where businesses frequently cede competitiveness to their nimble rivals is around the area of ERP automation.

System 157
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

GCHQ knew WannaCry hero risked arrests by travelling to the US

Computer Weekly

UK intelligence officials were reportedly aware that security researcher Marcus Hutchins risked arrest by travelling to the US to attend a series of cyber security conferences

Travel 147
article thumbnail

Uptime in Space and Under the Sea

Data Center Knowledge

How computers deployed in space and on the ocean floor may end up improving your bank's server farm. Read More.

Banking 186

More Trending

article thumbnail

Using the data driven Roadmap to Visualizing student progress

IT Toolbox

The cost of education continues to rise; this has prompted the higher learning institutions to have a bigger challenge when demonstrating the return and value on investment.

Education 138
article thumbnail

AI leaders call for a stop on development of autonomous weapons

Computer Weekly

Business leaders and artificial intelligence experts sign an open letter to governments warning of the risks of an AI arms race in autonomous weapons

article thumbnail

How to improve IoT security

Network World

The tsunami-sized trend to add intelligence with sensors and actuators and to connect devices, equipment and appliances to the internet poses safety, security and privacy risks. Proof comes from a recent meta-study titled The Internet of Hackable Things (pdf) from researchers at the Technical University of Denmark, Denmark; Orebro University, Sweden; and Innopolis University, Russian Federation—compiled from industry and academic research reports—that finds smart devices used in healthcare and s

Security 154
article thumbnail

DCK Investor Edge: Why CoreSite is REIT Royalty

Data Center Knowledge

A new research report crowns CoreSite Realty the top REIT for total returns for the past three and five-year periods. Read More.

Research 161
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Infosys CEO resigns amid public criticism from a founder

Computer Weekly

Infosys CEO Vishal Sikka steps down, with the company blaming criticism from a company founder for his decision

Infosys 172
article thumbnail

Musk, tech leaders urge UN to ban AI-powered lethal autonomous weapons

Tech Republic Security

A group of 116 tech executives recently penned an open letter urging the UN to double its efforts protecting against autonomous weapons, which some have called 'killer robots.

Groups 149
article thumbnail

NotPetya highlights cyber risk in shipping industry

Computer Weekly

Malware attack has shown that the shipping industry is vulnerable to cyber attacks, with Danish shipping giant Maersk reporting potential cost of up to $300m

Industry 138
article thumbnail

In the Face of Ransomware, Is Your Cloud Data Safe?

Data Center Knowledge

If backup and recovery is not already part of your strategy against ransomware, it should be. Read More.

Backup 119
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Citizens Advice slams ISPs over broadband compensation proposals

Computer Weekly

BT, Sky and Virgin Media have proposed a voluntary industry code of practice for broadband compensation, but it falls short of what Ofcom would like to implement

Media 118
article thumbnail

Survey: What business and IT functions are your company using as a service?

Tech Republic Cloud

Is Everything as a Service the future of business? Tech Pro Research is conducting a survey to find out what services companies are already using, and what they're planning to adopt.

Survey 100
article thumbnail

Wearables on the rise in the Middle East

Computer Weekly

The take up of wearables in the Middle East is growing mainly as a result of consumer demand for smartwatches

146
146
article thumbnail

Want to improve cybersecurity? Try phishing your own employees

Tech Republic Security

Employees are a company's weakest security link. Here's why running internal phishing attacks can strengthen your cybersecurity posture.

Security 113
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Second phase of electronic medical record system goes live in Dubai

Computer Weekly

Dubai Health Authority continues its progress towards a fully integrated electronic patient records system

System 140
article thumbnail

Amazon AI: The smart person's guide

Tech Republic Cloud

Amazon offers robust AI and machine learning capabilities with AWS. Find out how Amazon AI compares to similar offerings from Google and Microsoft.

Google 99
article thumbnail

Microsoft SPE helps joined-up thinking

Computer Weekly

We assess how Microsoft’s secure productive enterprise licence can help enterprises coordinate their digital transformation

Microsoft 123
article thumbnail

Video: Understanding the tech talent shortage

Tech Republic Security

Steve Martino, VP and CISO at Cisco Systems explains why cybersecurity needs to be a core component of every organization, and how to create an effective cybersecurity culture in the office.

Video 74
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Charity crowdsources environmental data with new mobile app

Computer Weekly

Environmental organisation Project Aware has launched a mobile app to help divers map marine debris

Mobile 129
article thumbnail

Big Business Got Railroaded; Change is Scary

IT Toolbox

"Change management" scares even managers

article thumbnail

HSBC streamlines mortgages with Capita software

Computer Weekly

Bank is using software to improve its mortgage application processes and subsequently increase business through brokers

Software 114
article thumbnail

This is when your business is most likely to get hit by malicious spam attacks

Tech Republic Security

New research from IBM determined where, when, and how spammers are most likely to hit your company.

IBM 98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

5 Misconceptions About Data-Driven Financial Services Marketing

Dataconomy

Many marketers representing mid-market financial services companies labor under the impression that due to their size and scope, the data-driven marketing tactics used by the dominant players are simply out of reach for them. This is a shame and quite far from the truth. Data, analytics, technology and the overall. The post 5 Misconceptions About Data-Driven Financial Services Marketing appeared first on Dataconomy.

article thumbnail

Video: Simple steps to cyber-safety

Tech Republic Security

Anthony Grieco, Senior Director and Trust Strategy Officer at Cisco's Security ant Trust Organization shares two simple things every company should do to improve cybersecurity

Video 64
article thumbnail

Raptor Computing looks to end X86 domination with POWER9-based Talos II Secure Workstation

Tech Republic Data Center

Raptor Computing has opened preorders for its new POWER9-based performance workstation, scheduled to ship in Q4, 2017.

article thumbnail

How to find fresh tech talent to build your security program

Tech Republic Security

VP and CISO at Cisco Systems Steven Martino gives advice on how companies can build their security programs for the long-term.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.