550 Results for:black box

  • Sort by: 

Learn how to perform TDD with a simple example

By Matthew Grasberger 25 Sep 2020

Fizz, buzz -- no, it isn't cocktail hour, although we don't mind if you pour one. It's time to learn test-driven development with a simple example. Read More

10 key ESG and sustainability trends, ideas for companies

By George Lawton 17 Mar 2023

From consumers to employees to investors, more people are choosing companies that prioritize environmental, social and governance concerns. Here are 10 ESG trends that matter. Read More

Build trust in technology by reimagining customer experiences

02 Nov 2020

During this uncertain time created by the pandemic, brands that win their customers' trust and add value through services will stand head and shoulders above the competition. Read More

7 steps to implementing a successful XDR strategy

By Dave Gruber 02 Dec 2022

There's still confusion around what extended detection and response is, but it will play a key role in enterprise security. To successfully implement XDR, follow these steps. Read More

Automate security testing and scans for DevSecOps success

By Adam Bertram 26 Mar 2020

Attackers are knocking at your door. Don't waste time with repetitive, automatable security tasks. Here's how DevSecOps enables code analysis, security testing and more. Read More

3 growing applications of AI in data management

By Andy Hayler 28 Sep 2020

There are plenty of ways AI can augment data professionals throughout the data pipeline, from sifting through large data sets for duplicates to easing the preparation process. Read More

Why hackers should learn Python for pen testing

By Kyle Johnson 25 Oct 2021

The authors of 'Black Hat Python' explain the importance of learning Python for pen testing, how it helps create scripts to hack networks and endpoints, and more. Read More

Enterprises should start developing an AI ethics framework

By Mark Labbe 08 Aug 2019

As enterprises begin to deploy AI, they should focus on AI and ethics issues, as well as data privacy, and begin to create policies and guidelines around them. Read More

Types of ransomware and a timeline of attack examples

By Sharon Shea, Isabella Harford 31 Aug 2023

There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work, and review notable ransomware attacks and variants. Read More

IT chiefs recognise the risks of artificial intelligence bias

By Cliff Saran 22 Nov 2019

Artificial intelligence promises to change the way businesses operate. IT leaders are now taking bias in AI algorithms seriously Read More