666 Results for:E-MAIL

  • Sort by: 

James Turnbull

James Turnbull is an experienced technology and business leader with a focus on building organizations, infrastructure, applications and security.Read More

Blockchain or bust? Experts debate applications for elections

By Rob Wright 14 Oct 2020

Blockchain has been proposed as a solution for security issues around e-voting. But some infosec experts are skeptical that the technology is the right fit for U.S. elections. Read More

How bad writing, templates and chatbots kill customer service

By Don Fluckinger 29 Dec 2021

Leslie O'Flahavan, a writing coach specializing in contact center communications, discusses how humans, AI and bots can work together to provide good customer service. Read More

IT Priorities 2018: Growing interest in hybrid IT in ASEAN

By Aaron Tan 15 Jan 2018

CIOs and IT professionals in Southeast Asia have earmarked hybrid infrastructure as a top priority in 2018, in spite of waning interest across the wider Asia-Pacific region Read More

AI-powered cyberattacks force change to network security

By Robert Lemos 01 May 2020

Companies now face sophisticated enemies using AI and machine learning tools for their attacks. It's a world of new dangers for those defending network systems and data. Read More

Minimize headaches with these Office 365 PST migration tips

By Reda Chouffani 31 Aug 2021

A bulk email import into the hosted email service in Microsoft's cloud takes a little effort -- and some help from the AzCopy utility -- but it's a job you can handle yourself. Read More

Sophisticated cyber thieves behind Epsilon data breach, says parent company

By Warwick Ashford 07 Apr 2011

US marketing firm Epsilon was hit by one of the biggest data thefts to date, the work of highly sophisticated cyber thieves, says parent company Alliance... Read More

Dutch e-voting is waiting for an opportunity

By Jasper Bakker 23 Aug 2017

Despite years of opposition and distrust in voting machines, a small Dutch initiative is aiming for a new form of e-voting Read More

Personal data of 46.2 million Malaysia mobile subscribers leaked

By Aaron Tan 01 Nov 2017

The massive data breach is yet another example of a ‘low and slow’ attack that stays dormant inside networks for years, without anyone noticing Read More

Symmetric vs. asymmetric encryption: What's the difference?

By Michael Cobb 22 Jul 2022

Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons. Read More