News, Insight and Analysis
News
-
Europol 'targets' 12 suspects in ransomware bust
Europol has not said whether the suspected ransomware actors were arrested or detained, but the 12 were allegedly involved in attacks that affected 1,800 victims in 71 countries. Continue Reading
-
Risk & Repeat: Apple bug bounty frustrations boil over
Security researchers criticized the Apple Security Bounty program and claimed the company ignored bug reports, denied bounty payments and silently patched vulnerabilities. Continue Reading
-
Cyber insurance premiums, costs skyrocket as attacks surge
As cyber attacks and losses have increased, so has demand for cyber insurance. But now premiums are reflecting a harsh new reality. Continue Reading
-
FireEye and McAfee Enterprise announce product mashup
Merger-happy investment firm STG has let slip that it will integrate the product lines of McAfee Enterprise and FireEye. Analysts say it will be a challenging road ahead. Continue Reading
-
Group-IB CEO Ilya Sachkov charged with treason in Russia
Group-IB maintains the innocence of CEO and founder Ilya Sachkov and said that co-founder and CTO Dmitry Volkov will assume leadership of the company. Continue Reading
Get Started
-
Data protection impact assessment template and tips
Conducting a data protection impact assessment is key to evaluating potential risk factors that could pose a serious threat to individuals and their personal information. Continue Reading
-
Cloud DBA: How cloud changes database administrator's role
Cloud databases change the duties and responsibilities of database administrators. Here's how the job of a cloud DBA differs from what an on-premises one does. Continue Reading
-
20 free cybersecurity tools you should know about
Cybersecurity products can get pricy but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular with cyber pros. Continue Reading
-
Top 10 business process management certifications for 2024
These BPM certifications can help you gain the specialized knowledge you need to perform your job better. Get all the details to help you advance your career. Continue Reading
-
How to create a CSIRT: 10 best practices
The time to organize and train a CSIRT is long before a security incident occurs. Certain steps should be followed to create an effective, cross-functional team. Continue Reading
Evaluate
-
5 benefits of enterprise search
With a proper enterprise search strategy in place, organizations can improve their employees' efficiency and ensure customers have positive experiences. Continue Reading
-
Traditional CMS vs. headless CMS: What's the difference?
Traditional CMSes let users design websites, yet they lack the flexibility of headless systems. Differences between these tools include purpose, architecture and ease of use. Continue Reading
-
Different types of database management systems explained
The various types of database software come with advantages, limitations and optimal uses that prospective buyers should be aware of before choosing a DBMS. Continue Reading
-
On-premises vs. cloud data warehouses: Pros and cons
Data warehouses increasingly are being deployed in the cloud. But both on-premises and cloud data warehouses have pluses and minuses to consider, as explained here. Continue Reading
-
Top 35 big data interview questions with answers for 2024
Big data is a hot field and organizations are looking for talent at all levels. Get ahead of the competition for that big data job with these top interview questions and answers. Continue Reading
Manage
-
Cloud database security: Best practices, challenges and threats
If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices. Continue Reading
-
5 tips for building a cybersecurity culture at your company
As a company's cyber-risks evolve, so must its culture. Here are five tips for creating a cybersecurity culture that protects the business and is meaningful for employees. Continue Reading
-
6 challenges of omnichannel marketing
When marketers use omnichannel strategies to engage customers across touchpoints, they often face challenges with personalization, campaign tracking and brand consistency. Continue Reading
-
Should you run your database on premises or in the cloud?
Use of cloud databases is surging, but there are still reasons for on-premises ones. Here's a comparison of cloud and local database architectures to help you choose. Continue Reading
-
Generative AI's effect on content management systems
Generative AI's ability to create content can enhance workflow automation within a CMS. Yet, organizations must implement guardrails to ensure data privacy and content quality. Continue Reading
Problem Solve
-
Enterprise cybersecurity hygiene checklist for 2024
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist. Continue Reading
-
How to create a ransomware incident response plan
A ransomware incident response plan may be the difference between surviving an attack and shuttering operations. Read key planning steps, and download a free template to get started. Continue Reading
-
How to accomplish a SharePoint-Teams integration
Depending on the complexity of a business's SharePoint sites, a Teams integration can benefit organizations by being cost-effective and simplifying user access. Continue Reading
-
8 data integration challenges and how to overcome them
These eight challenges complicate efforts to integrate data for operational and analytics uses. Here's why, plus advice on how to deal with them. Continue Reading
-
5 steps to an improved data quality assurance plan
Follow these steps to develop a data quality assurance plan and management strategy that can help identify data errors before they cause big business problems. Continue Reading