Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Looking to 2018 and the Future: Do You Think We Are Entering a 4th Turn or 5th Wave?

By John Pientka | January 19, 2018

2018 and the Future Wow! 2017 sure was something. Looking ahead do you see darkness – the 4th turn – or the light – the 5th wave. Your view may depend on your digital awareness. Surprised? Read on. What a roller coaster

Red Hat global survey finds field services operations bullish on emerging technologies

By CloudBuzz | January 18, 2018

Bullish Emerging Technologies For many industries, from transportation to utilities, manufacturing and more, field workers are pivotal to the success of business operations, the satisfaction of customers, and the growth of the bottom line. Field workers are now at the

Amazon shortlists 20 cities for second headquarters

By CloudBuzz | January 18, 2018

(Reuters) – Amazon.com Inc (AMZN.O) has short-listed 20 cities and regions, including one in Canada, for the construction of a second headquarters that it says will generate 50,000 new, high-paying jobs. Major U.S. centers including New York City, Los Angeles,

Infatuation leads to love – How container orchestration and federation enables multi-cloud competition

By Dana Gardner | January 18, 2018

Container Orchestration The use of containers by developers — and now increasingly IT operators — has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together

How Can Blockchain-as-a-Service Help Your Business?

By Mike Chan | January 17, 2018

Blockchain-as-a-Service “Have you seen the price of Bitcoin?”, “You gotta get in on Ripple, it’s going through the roof!”, “Are we in a crypto bubble? Is it all going to crash?” You may have heard all the hype about cryptocurrencies over the

Machine Learning Explained: Understanding Supervised, Unsupervised, and Reinforcement Learning

By Ronald van Loon | January 17, 2018

Machine Learning Explained Once we start delving into the concepts behind Artificial Intelligence (AI) and Machine Learning (ML), we come across copious amounts of jargon related to this field of study. Understanding this jargon and how it can have an

CONTRIBUTORS

conferencing cybersecurity

Is Your Conferencing System a Cybersecurity Weak Link?

Video Conferencing Vulnerabilities At home and in the office, the Internet of Things (IoT) has brought us new heights of ...
R.I.C.E: Reducing Cost, Improving Compliance, Controlling Data, Enhancing Experience

R.I.C.E: Reducing Cost, Improving Compliance, Controlling Data, Enhancing Experience

R.I.C.E Therapy for Next Generation Customer Experience As industries worldwide adapt to the digital transformation that is modernizing many business ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
IoT Trends

The Internet of Attacks: Disturbing Online IoT Trends

Disturbing Online IoT Trends If you thought the worst thing to come out of the Internet of Things (IoT) trend ...
Data Science And Machine Learning Jobs Most In-Demand on LinkedIn

Data Science And Machine Learning Jobs Most In-Demand on LinkedIn

Data Science And Machine Learning Jobs Machine Learning Engineers, Data Scientists, and Big Data Engineers rank among the top emerging jobs ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
Enterprises look for partners to make the most of Microsoft Azure Stack apps

Enterprises look for partners to make the most of Microsoft Azure Stack apps

Microsoft Azure Stack Apps The next BriefingsDirect Voice of the Customer hybrid cloud advancements discussion explores the application development and platform-as-a-service (PaaS) benefits from Microsoft ...
Cyber Warfare

Politics 2.0: The Age of Cyber Political Warfare

Cyber Political Warfare Do you remember the last time hackers and cybercriminals determined the outcome of a presidential race? Of ...
The Digital Upheaval Has Transformed Even Money, Creating Cryptocurrencies

The Digital Upheaval Has Transformed Even Money, Creating Cryptocurrencies

Why Has China Banned Them? Is This a Signal? All money is fiat currency. Its value depends upon your faith ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...