By Josh Breaker-Rolfe Gartner has ceased publishing its Magic Quadrant for data loss prevention (DLP). This is perhaps the death knell for the decades-old concept; Gartner tends to only retire Magic Quadrants for industries they deem to have stagnated or transformed...
The latest in Privacy
by Jeff Broth According to recent research, it’s expected that 10% of major corporations will adopt an extensive and fully fledged zero trust system by 2026. So what is zero trust security all about? In cybersecurity, zero trust refers to an approach that security...
with Antoine Jebara, co-founder and general manager, MSP Products, JumpCloud The modern IT landscape can be particularly challenging, especially for small and medium-sized businesses that have limited budget and staff. Whether to help with IT management or to defend...
by Dmytro Reshetchenko, DICEUS The way artificial intelligence has disrupted modern-day business operations post dot com and the digital revolution is astounding. It reduces cost and increases efficiency, growth, customer retention, and user experience. Many...
by Kenneth Henao Technology is a double-edged sword. On one hand, it offers businesses unprecedented opportunities for growth and connectivity. On the other hand, it exposes them to a host of cyber threats that can compromise their data and disrupt their operations....
by Samantha Turner Not everyone knows what an online point cloud viewer is used for. It is a tool that allows users to view and manage point cloud data from anywhere, by going on the internet and connecting to a platform. It makes it easier for many people to have...
Featured article by Damien Troy A blockchain is a database which stores information electronically in digital format. They are distributed databases which are shared among computer networks. Blockchains are best known for their crucial role in cryptocurrency, such as...
by Zihao Li A triangle holds a significant position among geometric shapes due to its inherent strength, with an equilateral triangle, where all three sides are equal, being the strongest variant. As such, a triangle is a good analogy representing the “tech management...
by Katrina Thompson We all knew it would happen, and now it is - only not in the way we thought. And at the same time, in all the ways we thought. AI-driven cyber threat- hype may be old news, the danger is not. AI driven threats fall into two categories – the...
by Lewis Carling Cybersecurity threats are a growing issue for many businesses due to the susceptibility of their digital systems and data to attacks. It's crucial to equip employees with knowledge of security procedures and best practices through proper training....


