Sat.May 08, 2021 - Fri.May 14, 2021

Ransomware attackers are now using triple extortion tactics

Tech Republic Security

Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties


11 Ways to Ask Smarter Data Analytics Questions

Information Week

Not everyone has been trained to think like a data scientist or a data analyst, but they can learn to think more like one


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Employee Wellbeing Is A Shared Responsibility

Forrester's Customer Insights

I spent the early days of my career in the early 90’s studying manufacturing engineering at University then working in a ship repair yard. I was taught to weld by a gruff Geordie who handed me a visor, a live arc-welder and told me “don’t look into the light. You’ll go blind”. I didn’t.

Study 54

Using Attack, Detect and Respond Tools To Mature Cybersecurity


Security can be enhanced and major risks mitigated by realistic threat emulation. This is needed now more than ever. Professionals in the security community except it as a given that we should all raise defenses, but prepare for breach.

Tools 292

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

Data Fabric Architecture is Key to Modernizing Data Management and Integration


Data management agility has become a mission-critical priority for organizations in an increasingly diverse, distributed, and complex environment.

What Will Be the Next New Normal in Cloud Software Security?

Information Week

Accelerated moves to the cloud made sense at the height of the pandemic -- organizations may face different concerns in the future

More Trending

Dogecoin to Mars? Palantir Co-Founder Joe Lonsdale Thinks So


There’s a good chance Dogecoin (CRYPTO: DOGE) is going to be around for a while, Palantir Technologies Inc (NYSE:PLTR) co-founder Joe Lonsdale said Thursday on CNBC’s “Squawk Box.”


New deep learning model brings image segmentation to edge devices

Venture Beast

AttendSeg is a new neural network architecture from DarwinAI designed to perform image segmentation on low-power/capacity computing devices. Read More.

Corporate Diversity Efforts Get Real

Information Week

Data Science For All offers free education, and mentorship, plus hiring at partner companies like Accenture and Target. Here's what its founders say about diversity today

How to prevent another Colonial Pipeline ransomware attack

Tech Republic Security

Government and business both need to step up to combat ransomware attacks against critical systems before they spiral further out of control

The History of the Word "Hacker"

According to one of the best English etymological dictionaries available, the word "hacker", with the sense of evil/good and brilliant computer programmer, was born in the halls of MIT. This fact alone reminds us that culture and words begin in actual places. At that time, to hack code, or hack out code, had a negative connotation. Where did this come from? Read this eBook to learn how the word "hacker" has evolved.

Hack the Capitol: Doing more for infrastructure security than any other activity out there


Hack the Capitol is the yearly stand-alone event from ICS Village, a touring industrial security education group most often seen bringing hands-on control systems demonstrations to security conferences. The annual event returns on Tuesday for a virtual presentation, including keynotes from Reps.

How a rural Filipino community is earning a living playing an NFT game

Venture Beast

Filipinos figured out how to make money playing games, as chronicled in a documentary called Play-to-Earn: NFT Gaming in the Philippines. Read More.

How To 114

The Cloud Comes of Age Amid Unprecedented Change

Information Week

The cloud is set to help businesses lead by outmaneuvering uncertainty. It's now imperative that they lean into the cloud and catch up with leaders before the gap becomes too large

Cloud 155

Data overload: DC power may be the new normal for efficient data centers

Tech Republic Data Center

A recent report on DC power revealed some interesting trends related to data center operations and power. Learn what data center conditions look like today and going forward

Trends 160

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

Zero Trust Software: Polymorphing for Linux White Paper 2021


The goal of zero trust designs is to stop attacks before they occur. Here is a favored approach by a team of experienced professionals we know and trust, LP3. Behind every major hack—OPM, Equifax, BlueCross, WannaCry, Target, Home Depot, Sony, WhatsApp, you name it—is a bug the hackers exploited.

Linux 240

Hidden Leaf Games raises $3.2 million on a MOBA gambit called Fangs

Venture Beast

Hidden Leaf Games is making a three-vs.-three three multiplayer online battle arena (MOBA) game called Fangs. They have raised $3.2 million. Read More.

Tech Leaders: Steps to Take on Your Digital Transformation Journey

Information Week

Transformation can sound daunting, but companies that last do it over and over again. Take a gut check, plan, get the right technology -- and go

3 advantages to having cloud tools available for on-prem data centers

Tech Republic Cloud

The growth of hybrid cloud deployments are driving the need to bring the security and flexibility of cloud tools to data centers

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Can IBM Chairman and CEO Arvind Krishna make the elephant dance again


Critics of IBM say the American tech icon went the hybrid cloud way because it lost the fight to become a public cloud hyper-scaler to Amazon Web Services and Microsoft. Hybrid clouds are a combination of privately-owned computer servers and networks and machines and services rented off the internet.

IBM 240

Adopting zero trust architecture can limit ransomware’s damage

Venture Beast

The key lesson coming out of Colonial Pipeline's ransomware debacle is that enterprises should adopt zero trust to protect data and networks. Read More.

Using Data as Currency: Your Company's Next Big Advantage

Information Week

Though challenges arise when implementing a strategy to capitalize on data currency, the rewards are worth the effort. Here are six ways to unlock the value of your data

Blurred WFH lines create cybersecurity challenges for companies

Tech Republic Security

A new HP Wolf Security study focuses on shifting cybersecurity threats in the age of remote working as employees use work devices for personal entertainment

HP 158

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.

Decentralized trading platform integrates Chainlink to deliver real-time prices on Polygon


A DeFi platform says its decentralized approach to leveraged trading offers crucial advantages over centralized rivals.

Sky Mavis raises $7.5 million for NFT-based Axie Infinity game with backers like Mark Cuban

Venture Beast

Join Transform 2021 this July 12-16. Register for the AI event of the year. Sky Mavis, a game studio based in Vietnam, has raised $7.5 million for its Axie Infinity game, which uses nonfungible tokens (NFTs) to reward players financially the more they play.

C-Suite Changes to Come

Information Week

The C-suite has expanded, but will the trend continue? Likely yes, but how depends on what your company values most

Trends 134

Loft Labs introduces and open sources virtual Kubernetes clusters

Tech Republic Cloud

Want a lightweight way to quickly spin up Kubernetes clusters? Check out virtual clusters from Loft Labs

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Aerospike Turbocharges Spark ML Training with Pushdown Processing


Read Alex Woodie explain how Aerospike is pushing Spark machine learning training with pushdown processing on Datanami : Companies that need to access a lot of data in a hurry, such as retraining a machine learning model in Spark, have traditionally had to move that data from the edge to a central repository, such as […]. News Aerospike

Edge AI chipset developer raises $80M

Venture Beast, a startup developing an edge AI accelerator chipset, has secured $80 million in venture capital backing. Read More.

How to Optimize Legacy Systems for Forward-Looking Change

Information Week

There may be ways to further the life and usage of legacy systems while also exploring newer options

System 114

Expert: Intel sharing is key to preventing more infrastructure cyberattacks

Tech Republic Security

Old technology and fear of sharing proprietary information are keeping companies from helping each other thwart attacks

Intel 155

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!