Automation is not here to close the cybersecurity skills shortage gap, but it can help

In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the role of automation in improving the work of cybersecurity professionals. It is c… Continue reading Automation is not here to close the cybersecurity skills shortage gap, but it can help

Leveraging AI and automation to identify sensitive data at scale

In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and automation to identify sensitive data at scale. You say that, as organizations … Continue reading Leveraging AI and automation to identify sensitive data at scale

Leveraging AI and automation to identify sensitive data at scale

In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and automation to identify sensitive data at scale. You say that, as organizations … Continue reading Leveraging AI and automation to identify sensitive data at scale

What businesses need to know about data decay

Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer be easily understood, cannot be effectively leveraged and, therefore, lacks … Continue reading What businesses need to know about data decay

5G trends accelerating, all major regions pursuing 5G Core testing and deployments

5G trends are continuing to accelerate, with 5G SA Core evaluation, testing and launch activities growing significantly across all geographic regions, according to Spirent. In particular, there is considerable demand for managed solutions and XaaS (Any… Continue reading 5G trends accelerating, all major regions pursuing 5G Core testing and deployments

9 tips to avoid cloud configuration conundrums

Configuration-related errors continue to result in avoidable losses of customer data and, consequently, their trust and loyalty, as well as revenue. The recent T-Mobile’s breach is reported to be the result of a misconfiguration that made an acce… Continue reading 9 tips to avoid cloud configuration conundrums

Three ways to keep your organization safe from cyberattacks

Cyberattacks continue making headlines as more companies fall victim to ransomware. Throughout the past year, we saw some of the largest breaches, leaks, and real-world attacks to date. COVID-19 has forced organizations to restructure the workplace, an… Continue reading Three ways to keep your organization safe from cyberattacks

How to achieve digital dexterity with a predominantly hybrid workforce

The COVID-19 pandemic and the consequent switch to remote working changed many an office’s culture forever. Fast forward to a year later, and businesses are either continuing to work remotely or adopting a hybrid model (part-time office, part-time remo… Continue reading How to achieve digital dexterity with a predominantly hybrid workforce