2020

article thumbnail

Is a Ransomware Attack a Reportable Data Breach?

CTOvision

Read Mark Rasch take a look at whether a ransomware attack can be classified as a data breach on Security Boulevard : One question that vexes security engineers, incident responders […].

Data 372
article thumbnail

Coronavirus Cybercrimes: Are These the Lowest?

Information Technology Zone Submitted Articles

The coronavirus and pandemic cyberattacks.

246
246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial intelligence is hopelessly biased - and that's how it will stay

Information Technology Zone Submitted Articles

The issue is mired in complexity

article thumbnail

SolarWinds attack explained: And why it was so hard to detect

Network World

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

article thumbnail

Automation, Evolved: Your New Playbook For Smarter Knowledge Work

Speaker: Frank Taliano

Document-heavy workflows slow down productivity, bury institutional knowledge, and drain resources. But with the right AI implementation, these inefficiencies become opportunities for transformation. So how do you identify where to start and how to succeed? Learn how to develop a clear, practical roadmap for leveraging AI to streamline processes, automate knowledge work, and unlock real operational gains.

article thumbnail

2020 Tech Towns Resilient Amid Uncertainty as Remote Work Grows

Association of Information Technology Professional

If 2020 has taught us anything, it’s to expect the unexpected—except, perhaps, when it comes to CompTIA's Tech Town Index. The 3rd annual report ranks the top 20 places in the US for IT pros to live and work, providing guidance on where opportunity intersects with affordability for both tech workers and tech companies. The 2020 report also covers remote work and how this trend is impacting the landscape of Tech Towns across the country.

Trends 339
article thumbnail

3 Things That Are More Important to IT Employers Than a College Degree

Association of Information Technology Professional

Those who don’t have a degree shouldn’t disqualify themselves from an IT career. Here are a few ways you can get into IT without going to college.

330
330

More Trending

article thumbnail

Top 5 tech skills to master in 2021

Tech Republic Security

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

546
546
article thumbnail

It’s Time To Put Security And Privacy Front And Center For Virtual Care

Forrester IT

(Written with Benjamin Corey, senior research associate at Forrester) Telehealth (virtual care) usage has skyrocketed during the pandemic. When you roll back the tape a few months, healthcare providers were able to (very quickly) stand up virtual care capabilities without having to go through the intensive HIPAA compliance protocols required in the healthcare industry.

article thumbnail

How Data, Analytics & AI Shaped 2020, and Will Impact 2021

Information Week

Artificial intelligence and automation were key tools in the IT enterprises' pandemic war effort in 2020. Here's how they will continue to change the game in every organization in 2021.

article thumbnail

How Data, Analytics & AI Shaped 2020, and Will Impact 2021

Information Week

Artificial intelligence and automation were key tools in the IT enterprises' pandemic war effort in 2020. Here's how they will continue to change the game in every organization in 2021.

article thumbnail

How AI Is Revolutionizing Contact Centers: 2025 Strategy + ROI Playbook

In 2025, contact centers aren’t just changing—they’re being rebuilt by AI. This no-fluff, executive-ready guide shows you how to capitalize on the transformation. Inside: proven ROI calculators, workforce optimization tactics, deflection strategies, and a 90-day AI deployment plan. Built for CIOs, COOs, CX leaders, and contact center strategists, it goes beyond buzzwords into play-by-play implementation.

article thumbnail

10 IT Trends to Watch for in 2021

Information Week

Here's how the dramatic events of 2020 are likely to shape enterprise IT teams in the coming year, according to analysts from firms like Gartner, IDC, and Forrester.

Trends 545
article thumbnail

Phone scammers were able to get 270% more personal information in 2020 than in 2019

Tech Republic Security

The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion.

Report 546
article thumbnail

Designing Your Roadmap for Rapid Digital Transformation

Information Week

While business and IT leaders are under pressure to boost their digital transformation plans, they should stop, rethink, and assess before fully diving into a roadmap.

545
545
article thumbnail

How to prepare for quantum computing cybersecurity threats

Tech Republic Security

Find out two steps your business can take now to prepare employees, as well as infrastructure, for possible quantum computing-related cybersecurity risks.

How To 545
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Top 5 reasons not to use SMS for multi-factor authentication

Tech Republic Security

Using SMS as an additional means to authenticate your password is better than nothing, but it's not the most reliable. Tom Merritt lists five reasons why SMS should not be used for MFA.

article thumbnail

Top 5 business sectors targeted by ransomware

Tech Republic Security

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware.

545
545
article thumbnail

Linux: How to recover deleted files with testdisk

Tech Republic Security

If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.

Linux 545
article thumbnail

Quantum computing: A cheat sheet

Tech Republic Security

IBM, Honeywell, and Intel are just three companies leading the way in building quantum machines as well as the algorithms and controls to run them. Learn about possible business use cases for quantum.

IBM 546
article thumbnail

The Ultimate Contact Center Buyers Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.

article thumbnail

4 phishing scams to watch out for during the holidays

Tech Republic Security

Fake shipping notices and charity frauds are two scams cited by the security company GreatHorn, which offers tips to consumers on how to avoid them.

Security 545
article thumbnail

How to Approach Your Mission-Critical Big Data Strategy

Information Week

Across industries, big data has joined traditional, structured data as a mission-critical element. Here's some advice for CIOs and big data leaders on how to get started.

Big Data 545
article thumbnail

The Ever-Expanding List of C-Level Technology Positions

Information Week

IT professionals are gaining more opportunities to move up the corporate ladder. Here are 10 C-level IT titles that we know of right now, along with salary averages for those roles.

545
545
article thumbnail

Machine learning: A cheat sheet

Tech Republic Security

From Apple to Google to Toyota, companies across the world are pouring resources into developing AI systems with machine learning. This comprehensive guide explains what machine learning really means.

Apple 545
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Phishing emails: More than 25% of American workers fall for them

Tech Republic Security

A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.

Report 545
article thumbnail

Hackers have only just wet their whistle. Expect more ransomware and data breaches in 2021.

Tech Republic Security

The COVID-19 pandemic provided a huge opening for bad actors this year, thanks to remote work. Security experts expect more advanced cybersecurity threats in the coming year.

Data 545
article thumbnail

Predictions 2021: The Path To A New Normal Demands Increased Cybersecurity Resilience

Forrester IT

In 2021, culture issues, budgets, and vendor shifts will be top priorities for cybersecurity leaders. Learn more in our 2021 cybersecurity predictions.

Budget 545
article thumbnail

Gartner: Top strategic technology trends for 2021

Network World

Companies need to focus on architecting resilience and accept that disruptive change is the norm, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year. Gartner unveiled this year's list at its flagship IT Symposium/Xpo Americas conference, which is being held virtually this year.

Trends 546
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Why ransomware has become such a huge problem for businesses

Tech Republic Security

Ransomware has evolved into a significant threat for all types of organizations. How and why is it such a pervasive issue, and how can organizations better defend themselves against it?

545
545
article thumbnail

Cybersecurity report: Average household hit with 104 threats each month

Tech Republic Security

The most vulnerable devices include laptops, computers, smartphones and tablets, networked cameras and storage devices, and streaming video devices, a new report found.

Report 545
article thumbnail

Predictions 2021: Technology And Customer Obsession Help Firms Emerge From Crisis Mode

Forrester IT

It has never been more important for organizations to anticipate change, strengthen resilience, and become truly customer obsessed. Heading into 2021, technology — both new and existing — will help firms achieve these aims and emerge from the crisis on sound footing.

Trends 546
article thumbnail

Reducing Security Talent Attrition by Increasing Diversity

Information Week

CIOs and other IT leaders must attract, retain and hire professionals with broad cybersecurity skills, but that's not as easy as it sounds. Here's some advice.

Security 545
article thumbnail

The 2025 Annual ProcureCon CPO Report

Procurement leaders are at a pivotal moment. With CPOs playing an increasingly strategic role, it’s time to leverage innovation and technology to drive resilience and efficiency. Download The 2025 Annual ProcureCon CPO Report to uncover key insights to thrive in a dynamic procurement landscape. What’s Inside: How CPOs are driving strategic decision-making and technology adoption The top priorities and challenges for procurement in 2025 Why AI, sustainability, and data analytics are essential for