Internet of Things

  • Economics of Insecurity (By Malcolm Harkins, Chief Security & Trust Officer)

    White Papers // Apr 2018 // provided by Cylance

    The reactive nature of information security has led to the creation of multi-layered, inefficient, and ineffective solutions. Security providers have embraced a philosophy of inevitable data breaches which fosters a culture of mediocrity and apathy. Misplaced public trust allows the AV sector to fail while avoiding the downside of standard ...

    Continue
  • Combating the Scourge of Fileless Attacks

    White Papers // Apr 2018 // provided by Cylance

    Fileless malware poses a serious threat to traditional AV solutions by using discrete methods often invisible to standard threat detection. By hijacking legitimate resources to attack a host system, fileless malware can camouflage its presence and operate unnoticed. Cylance provides advanced tools that deprive fileless threats of the resources ...

    Download Now
  • Leverage the concepts of machine learning and IoT

    Research // Apr 2018 // provided by ZDNet

    The concept of machine learning is not new to the world of computing. The birth of the term happened in the late 1950s, inspired from related fields in computing such as pattern recognition and artificial intelligence. Read now how the primary cause for the re-emergence of machine learning is the ...

    Continue
  • Don't jump into IoT, too soon

    Research // Apr 2018 // provided by ZDNet

    Find out why you need to understand the architectural layers, design principles, and subsystems involved in a solution, before jumping on the boat with an IoT solution. Make sure you start by first exploring a few fundamental principles and concepts which are relevant to an enterprise-grade IoT solution.

    Read More
  • The Imperva Incapsula DDoS Response Playbook

    White Papers // Apr 2018 // provided by Imperva

    Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is ...

    Download Now
  • Live Webcast - How AWS migration and a new monitoring vision support Nasdaq’s business transformation

    Webcasts // Mar 2018 // provided by AppDynamics

    Nasdaq is transforming - focusing on technology-driven innovation centered around its core strengths in market-powering technologies, data, and analytics. Supporting this move, Nasdaq is cloud-enabling all core applications using AWS for agility and using AppDynamics to speed up, visualize, and validate the migration process. An AppDynamics-driven migration has ...

    Watch Now
  • IT leader’s guide to edge computing

    Ebooks // Apr 2018 // provided by Tech Pro Research

    Companies of all sizes and across various industries are moving to edge computing to generate, collect, and analyze data so they can take immediate action on that information. This guide looks at the pros and cons of edge computing and how its real-world usage has been working out. From ...

    View This Now
  • The Internet of Things: From Information to Insights

    White Papers // Mar 2018 // provided by QlikTech

    The Internet of Things (IoT) touches so many different parts of our lives; even if you don’t know it! IoT technology is new and emerging, yet so many people are already benefitting from it, including you! Download this eBook to learn about: The ins and outs of IoT and its ...

    Read More