666 Results for:E-MAIL
- Sort by:
James Turnbull
James Turnbull is an experienced technology and business leader with a focus on building organizations, infrastructure, applications and security.Read More
Blockchain or bust? Experts debate applications for elections
14 Oct 2020Blockchain has been proposed as a solution for security issues around e-voting. But some infosec experts are skeptical that the technology is the right fit for U.S. elections. Read More
How bad writing, templates and chatbots kill customer service
29 Dec 2021Leslie O'Flahavan, a writing coach specializing in contact center communications, discusses how humans, AI and bots can work together to provide good customer service. Read More
IT Priorities 2018: Growing interest in hybrid IT in ASEAN
15 Jan 2018CIOs and IT professionals in Southeast Asia have earmarked hybrid infrastructure as a top priority in 2018, in spite of waning interest across the wider Asia-Pacific region Read More
AI-powered cyberattacks force change to network security
01 May 2020Companies now face sophisticated enemies using AI and machine learning tools for their attacks. It's a world of new dangers for those defending network systems and data. Read More
Minimize headaches with these Office 365 PST migration tips
31 Aug 2021A bulk email import into the hosted email service in Microsoft's cloud takes a little effort -- and some help from the AzCopy utility -- but it's a job you can handle yourself. Read More
Sophisticated cyber thieves behind Epsilon data breach, says parent company
07 Apr 2011US marketing firm Epsilon was hit by one of the biggest data thefts to date, the work of highly sophisticated cyber thieves, says parent company Alliance... Read More
Dutch e-voting is waiting for an opportunity
23 Aug 2017Despite years of opposition and distrust in voting machines, a small Dutch initiative is aiming for a new form of e-voting Read More
Personal data of 46.2 million Malaysia mobile subscribers leaked
01 Nov 2017The massive data breach is yet another example of a ‘low and slow’ attack that stays dormant inside networks for years, without anyone noticing Read More
Symmetric vs. asymmetric encryption: What's the difference?
22 Jul 2022Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons. Read More