Cyber Attackers Targeting the Keys to the Cloud Kingdom

Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers. If your organization relies solely on the cloud vendor for security, you’re exposed to unnecessary risk. Being proactive in cloud security is a requirement to face...

Professional Services Gain Momentum in Data Protection Software Market

By CloudTweaks | November 7, 2018

While Dependency of Organizations Shifts towards In-house Cybersecurity Professionals A major overhaul of data security led by stringent regulatory mandates has caused a meteoric rise in the adoption of data protection tools. Every enterprise dealing with consumer data has to

Pressure grows on Zuckerberg to attend Facebook committee hearing

By CloudBuzz | November 7, 2018

Australia, Argentina and Ireland join UK and Canada in urging Facebook CEO to give evidence to parliaments Parliamentary committees from five countries have called for Facebook’s chief executive, Mark Zuckerberg, to appear in front of a joint hearing on online disinformation.

Should Insurance Companies Be Using Big Data?

By Mike Brown | November 6, 2018

Insurance Companies and Big Data Your lifestyle, behavior, and attitudes can affect your health, and increasingly health insurance companies are finding ways to gather that information on you. With the rise of technology, many companies are compiling data sets that

The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust

By Louis Columbus | October 31, 2018

The Current State Of Cybersecurity 41% of total breaches in 2017 targeted the healthcare industry, making it the most popular target for breach attempts. Personally Identifiable Information (PII) combined with user credentials tops the percentage of breaches with 29% according

Four Puzzling Issues of Identity Authentication – Part 2

By Hitoshi Kokumai | October 30, 2018

Caveats about ‘Password’ Continued from Part 1… Sometimes the word ‘Password’ is narrowly interpreted as ‘remembered text password’ and sometimes it’s taken broadly as ‘whatever we remember for authentication’. We are of the view that it would be desirable to

Data Science “Paint by the Numbers” with the Hypothesis Development Canvas

By Bill Schmarzo | October 26, 2018

When I was a kid, I use to love “Paint by the Numbers” sets.  Makes anyone who can paint or color between the lines a Rembrandt or Leonardo da Vinci (we can talk later about the long-term impact of forcing kids

October 2018 Netskope Cloud Report

By CloudTweaks | October 25, 2018

With the increased adoption of public cloud infrastructure services like AWS in the enterprise, there’s also a growing need for clear identity and access policies to ensure sensitive enterprise data is secure. While many organizations have controls around cloud services

Your Supply Chain Has (Probably) Been Compromised

By CloudBuzz | October 25, 2018

Department of Defense contractors and subcontractor are now contractually bound to protect covered defense information in their supply chains in a very deliberate way. There, I said it. I said it because it’s true. Realistically, your supply chain has probably

POPULAR

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses ...
Smart Society: How to Trust Artificial Intelligence

Smart Society: How to Trust Artificial Intelligence

How to Trust Artificial Intelligence The concept of a smart society has been around for a long time, but the ...
Global Public Cloud Spending To Double By 2020

Global Public Cloud Spending To Double By 2020

The Cloud and Endpoint Modeling The worldwide migration of IT resources to the public cloud continues, at a head-spinning pace ...
Security and the Potential of 2 Billion Device Failures

Security and the Potential of 2 Billion Device Failures

IoT Device Failures I have, over the past three years, posted a number of Internet of Things (and the broader ...
It’s Official: AI Can Now Do a Doctor’s Job

It’s Official: AI Can Now Do a Doctor’s Job

AI Can Now Do a Doctor’s Job Look at how far we’ve come with AI and healthcare. Not long ago, ...
Machine Learning Explained: Understanding Supervised, Unsupervised, and Reinforcement Learning

Machine Learning Explained: Understanding Supervised, Unsupervised, and Reinforcement Learning

Machine Learning Explained Once we start delving into the concepts behind Artificial Intelligence (AI) and Machine Learning (ML), we come ...