The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Archives for 2020
The real cost of ransomware: Protect yourself from cyberattack fallout
Ransomware remains the most common malware threat to small and medium-sized enterprises (SMEs). In the first half of last year alone, 61% of managed service providers (MSPs) reported attacks against their clients, sometimes multiple attacks in a single day. At the same time, says Ryan Weeks, CISO at Datto, a recent survey of over 150 […]
Microsoft Windows Virtual Desktop (WVD) Talk with Christiaan Brinkhoff – Podcast Episode 321
In episode 321, Douglas Brown interviews Christiaan Brinkhoff, Global Black Belt for Windows Virtual Desktop at Microsoft. Together they discuss the Microsoft Windows Virtual Desktop (WVD) solution. About Christiaan Brinkhoff Christiaan Brinkhoff works as a Global Black Belt for Windows Virtual Desktop at Microsoft. His primary focus areas are Azure Cloud-based – virtualization infrastructures for […]
Is Quantum Computing Ready for Prime Time?
Progress is steady, but the technology hasn’t matured enough for most enterprises to truly benefit. Here’s what needs to happen. Eyes are fixed on quantum computing. The president recently announced a goal to double AI spending and quantum computing R&D. Major technology vendors have taken steps to make quantum computers and simulators available to developers […]
Advancing AI with Neuromorphic Computing Platforms
Within the universe of AI-optimized chip architectures, what sets neuromorphic approaches apart is their ability to use intricately connected hardware circuits. Image: Wright Studio – stock.adobe.com Artificial intelligence is the foundation of self-driving cars, drones, robotics, and many other frontiers in the 21st century. Hardware-based acceleration is essential for these and other AI-powered solutions to do […]
3 Steps for Deploying Robotic Process Automation
RPA helps drive productivity and secure competitive advantages by maximizing resources already on hand. Here’s how to effectively deploy it in your business. Businesses everywhere strive to operate as productively as possible, and yet an influx of tech innovations can have the ironic consequence of making companies who don’t yet know how to best leverage […]
Unlocking Business Potential with Digital Data Optimization
Information is power. With data playing an increasingly important role in achieving enterprise success, IT leaders must learn how to squeeze the maximum value out of collected data. Image: NicoElNino – stockadobe.com Recent research from technology industry trade association CompTIA suggests that enterprises looking to maximize the value of their data need to implement new […]
New Innovations From Intuit Help Consumers and Small Businesses Access and Navigate U.S. Government Aid and Relief Programs
Leveraging its technology platform, the company launched Intuit Aid Assist, QuickBooks Capital for Paycheck Protection Program, and TurboTax Stimulus Registration MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)– Intuit (Nasdaq: INTU), proud maker of TurboTax, QuickBooks and Mint, today released Intuit Aid Assist, a free website with an interactive tool to help eligible small business owners and the self-employed […]
IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022
The Internet Security Forum predicts the coming threats with a very good track record so far. Get your company ready for these threats. Armed with a “state of the industry” survey, most companies try to identify gaps to play catch up. In cybersecurity, that is too late. Companies need to stay a step ahead of […]
Four steps to hiring the best CISO in an IoT world
Of all the new technology processes shaping the next wave of digital transformation, perhaps none is more prominent than the Internet of Things (IoT). As Phil Celestini, senior vice president and chief security and risk officer at Syniverse reports, this technology is spawning a new ecosystem of interconnected networks and data transactions that is rapidly expanding and redefining […]