64,478 Results for:using

  • Sort by: 

BlackCat affiliate seen using malvertising to spread ransomware

By Alex Scroxton 15 Nov 2023

Researchers at eSentire identified a wave activity from an ALPHV/BlackCat ransomware affiliate which has adopted a somewhat unusual approach to delivering its locker Read More

Sabio urges structured approach to using AI to improve CX

By Simon Quicke 19 Jan 2024

Channel player grasps the potential of the technology, but advises a thoughtful roll-out if it’s going to hit the mark Read More

Tutorial: Use Linux rsync backup to protect files

By Damon Garn 19 Dec 2023

Rsync is a file transfer utility designed to move data from one Linux network host to another, which has made it a popular option for backing up critical data. Read More

Are firms using mergers and acquisitions to inherit talent?

By Cath Everett 14 Nov 2023

Getting the right tech skills is proving increasingly difficult for businesses, so some are resorting to combining companies to find the industry’s existing talent – but what are the pros and cons? Read More

Tutorial: How to use Linux Deja Dup to back up and restore files

By Damon Garn 18 Dec 2023

Deja Dup isn't advertised as a backup tool, but that doesn't mean you can't use it for data protection. Find out how to use Linux Deja Dup for backup and restore in this tutorial. Read More

Top 6 SOAR use cases to implement in enterprise SOCs

By Andrew Froehlich, Jessica Groopman 17 Jan 2024

Automating basic SOC workflows with SOAR can improve an organization's security posture. Explore six SOAR use cases to streamline SOC processes and augment human analysts. Read More

Counter-eavesdropping agency unlawfully used surveillance powers to identify journalist’s source

By Bill Goodwin 28 Mar 2024

More than 750 journalists had their communications data accessed by law enforcement and government agencies between 2018 and 2022 Read More

7 useful hardware pen testing tools

By Rob Shapland 07 Nov 2023

Penetration testers use a variety of hardware to conduct security assessments, including a powerful laptop, Raspberry Pi, Rubber Ducky and more. Read More

Why non-invasive data governance is the best approach to use

By Peter Spotts 12 Dec 2023

Organizations typically approach data governance with top-down or traditional approaches. Consultant Robert Seiner discusses what makes his non-invasive approach the best option. Read More

Swedish CIO contributes best practices for ethical use of artificial intelligence

By Pat Brans 08 Feb 2024

IT leaders are scrambling to keep up with AI technology, but many are losing sight of its ethical impact – and what CIOs need to do to ensure responsible use Read More