Registration for the O’Reilly Strata Data Conference in New York 2017

Strata Data Conference | September 25–28, 2017| New York, NY Cutting-edge science and new business fundamentals intersect and merge at Strata Data Conference. It’s a deep-immersion event where data scientists, analysts, and executives get up to speed on emerging techniques and technologies by dissecting case studies, developing new skills, and sharing emerging best practices. Strata Data […]

How Cybersecurity Benefits from Hackers

With the number of cyber crimes climbing every day, and the costs of each cyberattack higher than the last, the word “hacker” has come to carry a very negative connotation. Business owners who are afraid of litigation cringe when they hear the word. Private individuals who are worried their identities will be stolen—or who have […]

What’s in Store for the Big Data and Security Debate

Data is becoming an increasingly important component of business models and marketing mixes. As a result of this, we are seeing the emergence of a culture of data collection that is startlingly creative and in some cases, arguably invasive. In the current data-obsessed business and tech environment, almost anything anyone does can be quantified and […]

Understanding the Security Risks of New Cloud Software

Cloud computing provides businesses with quality solutions for their IT needs, as well as substantial cost savings over purchasing and maintaining their own hardware and software. Cloud services are generally pay-as-you-go solutions that offer flexibility and are scalable to business growth. With rising competition among cloud providers, customers benefit from falling prices and improving services. […]

Cyber Intelligence and Defense for the Public Sector, Part 2: The Growth and Importance of Threat Intelligence

As attested to in our previous post in this series, the dynamic nature of today’s cyber threats has led to the evolution of cyber threat intelligence as an essential component of every enterprise’s cyber risk reduction strategy. Threat intelligence provides organizations with the information needed to make smarter, data driven decisions about protecting their sensitive […]

Cybersecurity Protocols to Implement in an Always-Connected Workforce

It used to be that workers would come into the office, sit at their desk, work for eight hours (with a break for lunch in there somewhere), and then go home. Now, however, work is moving out of the office and into, well… everywhere else. With teleconferencing, smartphones, cloud computing, and a long line of […]