Latest
Microsoft is Developing Large Language Model with 500 B Parameters
Docusign Inc. Acquires Lexion in an All-cash Deal Worth USD 165 M
Synopsys’ Software Integrity Group Sale for USD 2.1B
Microsoft’s New Security Features Empower SOC in Defender XDR
Securitize Raises USD 47 M to Tokenize Blockchain-based Assets
DataRobot Updates Generative AI with Intervention Capability
CoreWeave Raises USD 1.1 B in Funding to Expand its GPU Cloud
Anthropic PBC Unveiled Claude Team, a Subscription Tier for iOS App
Oasis Security’s Series A Expansion Strengthens NHIs Protection with USD 35M Boost
MongoDB’s AI Applications Initiative Shapes Next-Gen Enterprise Solutions
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
Guest Blogs
cloud
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Master Data Management
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unifed Comm
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Mixed Reality
Virtual Reality
we're not surprised this one's so popular: msps di...
msp masterclass: lessons on driving growth & p...
msp playbook: dr planning and testing best practic...
effective sales and marketing tactics: harnessing ...
cyber insurance guide for msps: using automation f...
corero smartwall one brochure...
corero about us overview...
corero-white-paper contrasting-protection-strategi...
stockouts & surpluses: ai optimization for fas...
the art of decisionmaking in 2024 retail...
copilot for microsoft 365 a step-by-step guide to ...
copilot for microsoft 365 101 how to accelerate di...
work automation index 2024...
driving enterprise automation with a maturity mode...
genai french webinar...
services/ops optimisés par l’ia : développez v...
comment mener votre entreprise vers un avenir digi...
survey: it priorities and challenges for high grow...
simplifying and modernizing data protection soluti...
can dell™ poweredge™ r450 and dell poweredge r...
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
leveraging ubiquitous computing for strategic busi...
defending against password spraying: fortifying yo...
the secrets of cro conversion rate optimization...
role of digital immune system in strengthening bus...
what is cybersecurity asset management & why is it...
the growing threat of ai malware...
b2b lead scoring best practices for better lead ac...
elevate your success with varied benefits of conve...
what is a crypto winter? navigate indicators and s...
declarative programming alleviating software devel...
promising customer retention strategies aimed at b...
the rise of progressive web applications for busin...
the types of display advertising solutions and its...
what is cyber espionage? attacks jeopardizing busi...
how brand extensions can fuel explosive growth...
insights into the google pagerank algorithm...
why are businesses turning to enterprise content m...
menace of ping flood attacks: a growing network pe...
how chatbot marketing supports today’s business ...
what is domain-based message authentication, repor...
All
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
microsoft is developing large language model with ...
docusign inc. acquires lexion in an all-cash deal ...
synopsys’ software integrity group sale for usd ...
microsoft’s new security features empower soc in...
securitize raises usd 47 m to tokenize blockchain-...
datarobot updates generative ai with intervention ...
coreweave raises usd 1.1 b in funding to expand it...
anthropic pbc unveiled claude team, a subscription...
oasis security’s series a expansion strengthens ...
mongodb’s ai applications initiative shapes next...
ai chip manufacturing startup, blaize inc. raises ...
nist launches nist genai for detecting ai-generate...
github copilot workspace to transform development ...
tsmc’s new chipmaking process shows power distri...
carv raises usd 10 m to build blockchain data laye...
dropzone ai cybersecurity funding reaches usd 16.8...
salesforce’s einstein copilot is now available w...
ibm announces acquisition of hashicorp inc. for us...
uk inquired microsoft and amazon ai partnerships o...
nvidia run:ai acquisition revolutionizes ai perfor...
All
IT Infra
Networking
Security
Tech
14 interesting trends that affect innovation and t...
what is web hosting?...
data privacy best practices every business should ...
Home
Whitepapers
Threats
Threats Whitepapers
the smart path to airport safety and security
Sponsored by:
Hitachi
Published By:
Research Desk
Released:
Jun 29, 2020
Many airports are still relying on legacy systems, making it nearly impossible to expect any human to be able to view and process the immense amounts of data and proactively respond to threats. In thi...
Read more
a tale of two siems
Sponsored by:
IBM
Published By:
Research Desk
Released:
May 06, 2020
The difference between operating in the best of times and worst of times is choosing the right SIEM. Keeping pace with advanced threats on a legacy SIEM can usher in an age of uncertainty for your cor...
Read more
cloud threat report 2019
Sponsored by:
Darktrace
Published By:
Research Desk
Released:
Mar 23, 2020
This report summarizes 11 case studies of cloud-based attacks identified by cyber AI, including spear phishing, insider threat, and zero-day malware. The case studies demonstrate how weak indicators ...
Read more
autonomous response: threat report 2019
Sponsored by:
Darktrace
Published By:
Research Desk
Released:
Mar 23, 2020
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were dist...
Read more
(isc)² report: cybersecurity assessments in mergers & acquisitions
Sponsored by:
ISC2
Published By:
Research Desk
Released:
Mar 16, 2020
Cybersecurity audits are now standard practice in the merger and acquisition process. And what these reviews uncover can substantially impact a target company’s valuation – and ultimately decide w...
Read more
6 critical steps on the path to security
Sponsored by:
Microsoft
Published By:
Research Desk
Released:
Dec 09, 2019
Quando l’impronta digitale in un’azienda cresce in modo esponenziale, di pari passo aumentano anche i requisiti di sicurezza. Come si fa a garantire sicurezza e adeguamento e a prevedere al con...
Read more
3 ways to protect data from insider threats
Sponsored by:
Code42
Published By:
Research Desk
Released:
Nov 25, 2019
90% of insider threats go undetected – often for weeks or months Stopping insider threats is one of the biggest challenges facing security teams because of limited data visibility. They can’t see ...
Read more
mind the gap: a roadmap to it/ot alignment
Sponsored by:
Tenable
Published By:
Research Desk
Released:
Nov 06, 2019
Modern-day industrial operations often span complex information technology (IT) and operational technology (OT) infrastructures. In a standard environment, thousands of devices exist and increasingly ...
Read more
thinkshield: surviving today’s onslaught of pc security threats
Sponsored by:
Lenovo
Published By:
Research Desk
Released:
Oct 24, 2019
In today’s rapidly changing security landscape, you simply can’t afford to let your guard down. Studies show that a staggering 4.5 billion records were compromised in the first half of 2018. The t...
Read more
thinkshield: is your security working harder than the hackers?
Sponsored by:
Lenovo
Published By:
Research Desk
Released:
Oct 24, 2019
It’s almost daily that reports emerge of another large company suffering a cybersecurity breach, resulting in severe fallout for their business. Or at least, contained before causing irreparable dam...
Read more
Posts navigation
Prev
1
2
3
Next
Whitepapers
News
Insights
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Master Data Management
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unifed Comm
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Mixed Reality
Virtual Reality
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Cost Management
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality
Cloud
Solutions
Virtualization
Data
Analytics
Big Data
Customer Data Platform
Digital
Digital Marketing
Social Media Marketing
Finance
Risk & Compliance
Human Resources
HR Solutions
Talent Management
IT Infra
App Management Solutions
Best Practices
Datacenter Solutions
Infra Solutions
Networking
Storage
Unified Communication
Mobility
Sales & Marketing
Customer Relationship Management
Sales Enablement
Security
Tech
Artificial Intelligence
Augmented Reality
Blockchain
Chatbots
Internet of Things
Machine Learning
Virtual Reality