Stolen credentials pose a serious threat to your database security. New approaches involving machine learning and behavioral analysis might hold the solution.
- By Dave Rosenberg
- July 21, 2016
Learn 3 ways to protect your enterprise from a social engineering attack, what the success of Pokémon Go can teach us about app development, and what skills and knowledge come under a data scientist’s responsibility.
- By Quint Turner
- July 20, 2016
Today read about new security technologies that may replace passwords, aspects of IoT sensor data that no one talks about, and why IoT developers need to learn a different lesson from the open source community.
- By Quint Turner
- July 18, 2016
New ruling decrees that U.S. companies cannot be forced to turn over data held overseas, although the Microsoft case highlights some issues with current processes and laws.
- By James E. Powell
- July 15, 2016
The new augmented reality game is a bona fide phenomenon, but, like many other quickly spreading technologies, the developers may not have fixed all potential issues before release.
- By James E. Powell
- July 13, 2016
Read about hiring the analytics skills you need most, using real-world scenarios to test your cybersecurity, and ensuring that your data technologies will scale in the future.
- By Quint Turner
- July 8, 2016
In today’s links, learn how to secure many types of shared data, protect your enterprise from oversimplified data interpretations, and use real-time analytics to improve processes and profits.
- By Quint Turner
- July 7, 2016
Promote a balanced perspective from IT leaders to increase the value of data to your business users.
- By Wes Flores
- July 6, 2016