2020

article thumbnail

Is a Ransomware Attack a Reportable Data Breach?

CTOvision

Read Mark Rasch take a look at whether a ransomware attack can be classified as a data breach on Security Boulevard : One question that vexes security engineers, incident responders […].

Data 372
article thumbnail

Coronavirus Cybercrimes: Are These the Lowest?

Information Technology Zone Submitted Articles

The coronavirus and pandemic cyberattacks.

246
246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial intelligence is hopelessly biased - and that's how it will stay

Information Technology Zone Submitted Articles

The issue is mired in complexity

article thumbnail

SolarWinds attack explained: And why it was so hard to detect

Network World

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

article thumbnail

How to Start Virtual Care the Right Way: A Proven Roadmap for 2025 and Beyond

Speaker: Dr. Christine Gall, DrPH, MS, BSN, RN

The promise of virtual care is no longer theoretical and is now a critical solution to many of healthcare’s most urgent challenges. Yet many healthcare leaders remain unsure how to build a business case for investment and launching the right program at the right time can be the difference between value and failure. For organizations seeking a financially sound, clinically effective entry point, Virtual Patient Observation (VPO) offers a compelling case to lead with.

article thumbnail

2020 Tech Towns Resilient Amid Uncertainty as Remote Work Grows

Association of Information Technology Professional

If 2020 has taught us anything, it’s to expect the unexpected—except, perhaps, when it comes to CompTIA's Tech Town Index. The 3rd annual report ranks the top 20 places in the US for IT pros to live and work, providing guidance on where opportunity intersects with affordability for both tech workers and tech companies. The 2020 report also covers remote work and how this trend is impacting the landscape of Tech Towns across the country.

Trends 339
article thumbnail

3 Things That Are More Important to IT Employers Than a College Degree

Association of Information Technology Professional

Those who don’t have a degree shouldn’t disqualify themselves from an IT career. Here are a few ways you can get into IT without going to college.

330
330

More Trending

article thumbnail

What Do We Do About Racist Machines?

Information Week

We will never rid ourselves of all our biases overnight. But we can pass on a legacy in AI that is sufficiently aware of the past to foster a more just and equitable society.

545
545
article thumbnail

Top 5 tech skills to master in 2021

Tech Republic Security

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

546
546
article thumbnail

It’s Time To Put Security And Privacy Front And Center For Virtual Care

Forrester IT

(Written with Benjamin Corey, senior research associate at Forrester) Telehealth (virtual care) usage has skyrocketed during the pandemic. When you roll back the tape a few months, healthcare providers were able to (very quickly) stand up virtual care capabilities without having to go through the intensive HIPAA compliance protocols required in the healthcare industry.

article thumbnail

Artificial intelligence (AI) vs. machine learning (ML): 8 common misunderstandings

Information Technology Zone Submitted Articles

IT and business leaders will run into some false notions about artificial intelligence and machine learning and what each one can do. Here's how to explain the truth on AI vs. ML.

article thumbnail

AI Isnt the Future — Its the Fight Youre Already In: Are You Ready?

The AI era isn’t coming—it’s here. But over 70% of AI projects fail before they scale. Why? No strategy. No alignment. No ROI. We worked with a $50M company that wasted a year and half their budget chasing AI pilots with no payoff. Sound familiar? That’s where our four-step transformation system comes in: Assess, Strategize, Execute, Scale. We help you cut through the hype, find what actually moves the needle, and build a roadmap that delivers results.

article thumbnail

Capital One Fined $80M, 'Failed Appropriate Risk Management for the Cloud'

SecureWorld News

Major fines and major findings in the Capitol One data breach investigation. Here is what a U.S. regulatory agency revealed about the bank data breach.

Banking 303
article thumbnail

The Impact of Artificial Intelligence on Workspaces

Information Technology Zone Submitted Articles

Artificial intelligence will change everything - even big office real estate

article thumbnail

The Problem with Artificial Intelligence in Security

Information Technology Zone Submitted Articles

Any notion that AI is going to solve the cyber skills crisis is very wide of the mark. Here's why.

article thumbnail

What are AI and machine learning adding to threat intelligence – brains, brawn or both? - Security Boulevard

Information Technology Zone Submitted Articles

Too much information and not enough time. This, and the cost of labor, is why machines have been at the forefront of cyber defense for almost 50 years. It is also why new breakthroughs in software development, neural networks, machine learning and artificial intelligence (AI) are constantly harnessed by providers and consumers of threat intelligence.

article thumbnail

Tariffs on the Table: How to Brief the Board and C‑Suite With Confidence

“What should we do about the tariffs?” There’s no straightforward answer — every leader has a different expectation. CFOs want numbers. COOs want action. CEOs want strategy. And supply chain and procurement leaders need to be ready with the right response — fast. That’s why GEP has created a simple three-part framework that will help CPOs and CSCOs brief the board and C-suite with clarity and confidence.

article thumbnail

What Does “Artificial Intelligence” Really Mean?

Information Technology Zone Submitted Articles

AI is ultimately nothing more than humanity's effort to replicate its own cognitive capabilities in machines.

article thumbnail

Pass-Through Authentication: How to Synchronize your on-premise AD with Azure AD using Azure AD Connect tool | Learn [Solve IT]

Information Technology Zone Submitted Articles

Pass-Through Authentication How to Synchronize your on-premise Active Directory with Azure Active Directory On-premise sync with AAD. Windows Active Directory sync with Azure AD

article thumbnail

5 Ways Cloud Apps Help Smart SMBs Focus on Their Business, Not the Technology to Run Their Business

Information Technology Zone Submitted Articles

The cloud is everywhere, and has been for over two decades, yet many small businesses continue to run their businesses with in-house software. This is often time-consuming, expensive, and tedious to manage.

Cloud 130
article thumbnail

Is Your Boardroom The Weakest Cybersecurity Link?

Information Technology Zone Submitted Articles

The challenge with effective cybersecurity risk management is the weakest link theory.

130
130
article thumbnail

From Curiosity to Competitive Edge: How Mid-Market CEOs Are Using AI to Scale Smarter

Speaker: Lee Andrews, Founder at LJA New Media & Tony Karrer, Founder and CTO at Aggregage

This session will walk you through how one CEO used generative AI, workflow automation, and sales personalization to transform an entire security company—then built the Zero to Strategy framework that other mid-market leaders are now using to unlock 3.5x ROI. As a business executive, you’ll learn how to assess AI opportunities in your business, drive adoption across teams, and overcome internal resource constraints—without hiring a single data scientist.

article thumbnail

10 Reasons Why The Cloud Is The Future Of Industrial Monitoring

Information Technology Zone Submitted Articles

Cloud platforms’ reliability, security, and scale are defining the future of real-time industrial monitoring.

Industry 130
article thumbnail

How Data, Analytics & AI Shaped 2020, and Will Impact 2021

Information Week

Artificial intelligence and automation were key tools in the IT enterprises' pandemic war effort in 2020. Here's how they will continue to change the game in every organization in 2021.

article thumbnail

How Data, Analytics & AI Shaped 2020, and Will Impact 2021

Information Week

Artificial intelligence and automation were key tools in the IT enterprises' pandemic war effort in 2020. Here's how they will continue to change the game in every organization in 2021.

article thumbnail

10 IT Trends to Watch for in 2021

Information Week

Here's how the dramatic events of 2020 are likely to shape enterprise IT teams in the coming year, according to analysts from firms like Gartner, IDC, and Forrester.

Trends 545
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

Phone scammers were able to get 270% more personal information in 2020 than in 2019

Tech Republic Security

The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion.

Report 546
article thumbnail

Designing Your Roadmap for Rapid Digital Transformation

Information Week

While business and IT leaders are under pressure to boost their digital transformation plans, they should stop, rethink, and assess before fully diving into a roadmap.

545
545
article thumbnail

Top 5 reasons not to use SMS for multi-factor authentication

Tech Republic Security

Using SMS as an additional means to authenticate your password is better than nothing, but it's not the most reliable. Tom Merritt lists five reasons why SMS should not be used for MFA.

article thumbnail

Linux: How to recover deleted files with testdisk

Tech Republic Security

If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.

Linux 545
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Quantum computing: A cheat sheet

Tech Republic Security

IBM, Honeywell, and Intel are just three companies leading the way in building quantum machines as well as the algorithms and controls to run them. Learn about possible business use cases for quantum.

IBM 546
article thumbnail

Top 5 business sectors targeted by ransomware

Tech Republic Security

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware.

545
545
article thumbnail

How to Approach Your Mission-Critical Big Data Strategy

Information Week

Across industries, big data has joined traditional, structured data as a mission-critical element. Here's some advice for CIOs and big data leaders on how to get started.

Big Data 545
article thumbnail

The Ever-Expanding List of C-Level Technology Positions

Information Week

IT professionals are gaining more opportunities to move up the corporate ladder. Here are 10 C-level IT titles that we know of right now, along with salary averages for those roles.

545
545
article thumbnail

The Ultimate Contact Center Buyers Guide: A Crucial Decision

Harness the True Power of your Contact Center In today’s fast-paced business environment, selecting the right contact center solution is critical for enhancing customer experience, improving operational efficiency, and optimizing costs. This comprehensive guide will walk you through the essential factors to consider when choosing a contact center software that aligns with your business needs.