5,064 Results for:blog

  • Sort by: 

How Data Exchange Laws May Affect Information Blocking Exceptions

By Hannah Nelson 17 Nov 2021

In a recent blog post, ONC’s Steven Posnack noted the importance of understanding the information blocking provisions in context with additional data exchange laws. Read More

Why most companies are too stupid to get value from AI

By Brian McKenna 25 Oct 2021

This is a guest blog post by Chris Lynch, executive chairman and CEO, AtScale. I am not known for mincing my words.  It is a fact that most companies are too stupid to get value from AI/ML. Too ... Read More

Unit 42: Malware-initiated scanning attacks on the rise

By Alexander Culafi 09 Apr 2024

Palo Alto Networks' research team warned of threat actors compromising one victim and then using that victim's resources to discreetly scan for vulnerabilities on other systems. Read More

Exploitation activity increasing on Fortinet vulnerability

By Arielle Waldman 18 Mar 2024

The Shadowserver Foundation recently saw an increase in exploitation activity for CVE-2024-21762, two days after a proof-of-concept exploit was published. Read More

Infosec professionals praise CSRB report on Microsoft breach

By Alexander Culafi 04 Apr 2024

Security professionals and executives weigh in on how the Cyber Safety Review Board handled its investigation into Microsoft and what it could mean for the tech giant. Read More

The future of fashion in contactless commerce

By Clare McDonald 04 Aug 2020

GUEST BLOG: In this contributed blog post Jessica Murphy, co-founder of apparel and footwear retail personalisation platform True Fit, discusses how technology can help bridge the gap between ... Read More

Typosquatting campaign, malicious packages slam PyPI

By Alexander Culafi 29 Mar 2024

Threat actors used automated typosquatting attacks to lead victims to malicious python packages in yet another campaign targeting the open-source software supply chain. Read More

Microsoft breached by Russian APT behind SolarWinds attack

By Alexander Culafi 22 Jan 2024

Several email accounts belonging to Microsoft senior leadership were accessed as part of the breach, though Microsoft found 'no evidence' of customer environments being accessed. Read More

SDN blogs: SD-WAN may be the answer to your problems

By James Maimonis 17 Jul 2015

This week, experts discuss software-defined WANs as an alternative to traditional wide area networks. And one startup is looking to make data centers more efficient. Read More

IT As Marriage Guidance Counsellor...

By Steve Broadhead 01 Jul 2021

In my last blog, I spoke about the need to get immediate access to network behaviour patterns, in order to detect anomalies. An extension of that need is the ability to make instant use of that ... Read More