Finding cyber talent is challenging enough, but the public sector’s national security and social services concerns make the hunt even harder.
Search Results: cybersecurity (1521)
El uso de datos para análisis sólo tiene sentido si no implica una acción también basada en datos, no en intuición personal.
The online meeting and collaboration suite now now has 270 million monthly active users. Will it surpass its major competitors in the space?
Maintaining quality data is a team effort from start to finish, says Pablo in this Data Revolution Minute.
The rise of the information age has led to new challenges with a user’s digital identity. But these can be addressed with blockchain solutions.
In this Cybersecurity Minute, Chris analyzes how the digital infrastructure of Costa Rica is falling prey to cyber crime.
Although there are differences between the private and public sectors, there is also more overlap than we hear from social media conjecture.
Wayne explains everything you need to know about the supply chain, and how to fix it.
While zero-day vulnerability attacks still occur, new research emphasizes the need for basic security hygiene to protect against most advanced persistent threats.
The world is full of potential cyber threats. These best practices will help you be confident in your data privacy and security.
Chris addresses reports that more than 80% of Kubernetes API servers are exposed to the public internet.
The same algorithms that allowed video games to accurately simulate light reflection, particles, gravity, and other aspects of the real world also make it possible to accurately model manufacturing systems, products, buildings, and even cities.
As more companies embrace a decentralized workforce, they must increase cybersecurity efforts for remote work environments.
No espere a que ocurra una fuga de datos sensibles para actuar, prepare un plan [sencillo] para anticipar una acción frente al incidente.
Cloud-based systems all have their own risks, which makes security particularly critical for SMBs in order to keep their data safe.
As Janet argues, sometime in the not-too-distant future, technology will allow more opportunities to meet in productive ways at virtual events than at many, if not all, live events
Kubernetes opens up an attractive opportunity to do multi-cloud deployments in a way that doesn’t conjure up nightmares. Here are a few things to consider.
Wayne examines Old Navy’s sales plunge after a push for inclusive sizing and how it could’ve been prevented.
As technological systems become more complex through Cloud, microservices, IoT, and more, the need for sound vulnerability management is even more paramount.
Data efficiency and cost-effectiveness offer great advantages to non-profit organizations. Here’s why.



















