Top

Tag: featured


Monitoring&Analysis, Security

End-to-end security requires multi-vendor automation

May 23, 2018

Via: CSO

The concept of “end-to-end” security is a bit of a vague one. Depending on the lens one looks through, it could mean having security products from a single vendor that range from endpoints to the data center within the corporate […]


Wireless

Network slicing 101: 4G versus 5G

May 22, 2018

Via: RCR Wireless News

In this installment of network slicing 101, we’ll take a look at the basics of network slicing as it relates to both 4G and 5G use cases Network slicing is often viewed as a single concept within 5G, wholly dependent […]


Monitoring&Analysis, Security

The 5 best malware metrics you can generate

May 22, 2018

Via: CSO

A big problem in the computer security world is that practitioners aren’t skeptical enough, don’t question purported authority statements, and often don’t ask the right questions. It’s a theme I see over and over, and it leads defenders to enacting […]


Analysis, Monitoring&Analysis

IDC analyst Part 2: How to make multi-cloud work for government

May 21, 2018

Via: Cisco Blog

Through her work at IDC, Adelaide drives better understanding of the full scope of efforts needed for digital transformation. This includes focusing on innovative technologies like Big Data, AI, cognitive, and cloud in the context of government. Her research includes […]


Monitoring&Analysis, Security

Cybercriminals impersonate popular file sharing services to take over email accounts

May 21, 2018

Via: CSO

The chances of you opening, clicking or downloading a document sent from a colleague or friend are much higher than acting on an email from someone you don’t know. Cybercriminals know this well, which is why they are sending attacks […]


Monitoring&Analysis, Security

How privacy is moving data security to the top of corporate agendas

May 16, 2018

Via: CSO

The European Union’s far-reaching General Data Protection Regulation (GDPR) goes into effect May 25, Facebook has had to answer to Congress for its ties with Cambridge Analytica, and privacy issues and reports of massive data breaches are in the news […]


Monitoring&Analysis, Security

Containers are Here! What About Container Security?

May 15, 2018

Via: CSO

The industry is gaga for container technologies like Docker and for good reason. According to ESG research, containers make up about 19 percent of hybrid cloud production workloads today, but in just two years’ time, containers will make up one-third […]


Analysis, Monitoring&Analysis, Security

Short on security analysts? AI can help

May 15, 2018

Via: CSO

Most of us are aware of the skills shortage plaguing the cyber security industry, whether you are experiencing it first-hand or have read countless headlines. The 2017 Global Information Security Workforce Study reveals the cyber security workforce gap is expected […]


Analysis, Monitoring&Analysis, Wireless

Analyst Angle: 5G roll outs will be more nuanced than coverage blasts of the past

May 14, 2018

Via: RCR Wireless News

As commercial 5G roll outs begin in volume during H2 2018 and into 2019, handicapping which operators or which countries will ‘win’ the race to 5G is ramping up IMHO, this seems to be the wrong way to look at […]


Monitoring&Analysis, Security

Kagan: Which AI protects user privacy best-Siri, Home or Alexa?

May 14, 2018

Via: RCR Wireless News

Artificial Intelligence is hot and early in its growth wave. However, not all AI is recreated equal. So, which AI protects your privacy the best, Apple Siri, Google Home, Amazon Alexa or Microsoft Cortana? With that said, only some companies […]