Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about DataOps, an interesting methodology that can help organizations fast-track their data analytics operations. By Monisha Ravi With the current data trend, there is an ever-increasing demand for data professionals to […]
Five worthy reads: The unexpected costs following a cyberattack
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the worst data breaches that happened recently, their impact, and the cost of data breaches for companies. The COVID-19 pandemic has not only had an impact on the mental and […]
Five worthy reads: Understanding quantum computing and its impact on cybersecurity
Five worthy reads is a regular column on five noteworthy items we discovered while researching trending and timeless topics. In this week’s edition, let’s explore how quantum computing works and how it impacts cybersecurity. Quantum physics describes the behavior of atoms, and fundamental particles like electrons and photons. A quantum computer operates by controlling the […]
Five worthy reads: Are we ready for a passwordless future?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the possibilities and challenges of a passwordless era. This past year has been difficult for organizations globally, from having to deal with multiple cybersecurity issues due to evolving workforce models. But simple […]
Five worthy reads: The future of work in a post-COVID world
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the changing face of work in the wake of the COVID-19 pandemic and the vaccine roll out. Before 2020, the idea of entire organizations working from home would have seemed […]
Five worthy reads: The rise in credential stuffing attacks
Author: Abirami A Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye. Credential stuffing is perhaps the simplest form of cyberattack, but it continues […]
Five worthy reads: The road to empowering employees through data democratization
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In the first Five worthy reads of this year, we’ll explore data democratization in detail, from its definition to its pros and cons, and provide some ways to use it for data empowerment. Wouldn’t decision-makers want […]
Five worthy reads: Cybersecurity drift: Leveraging AI and ML to safeguard your network from threats
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, sticking with October’s cybersecurity awareness theme, we’ll take an in-depth look at both the good and the bad of artificial intelligence (AI) and machine learning (ML) in cybersecurity. It’s that time of year when […]