How Secure Are The Most Popular Mobile Payment Methods?
Mobility
29 shares2,976 views
Mobility
29 shares2,976 views

How Secure Are The Most Popular Mobile Payment Methods?

Megan Ray Nichols - February 27, 2019

The most popular mobile payment methods are so widely use that many don't think twice about their security - but are they truly safe?

Is Your Data At Risk? Here’s How To Protect Your Information Online
Big Data
2,332 views
Big Data
2,332 views

Is Your Data At Risk? Here’s How To Protect Your Information Online

Rehan Ijaz - January 11, 2019

  If you’ve opened up your inbox only to spot yet another email from a company saying they’ve been affected…

Wiping An iPhone With And Without An Apple ID In The Age of Big Data
Big Data
55 shares2,701 views
Big Data
55 shares2,701 views

Wiping An iPhone With And Without An Apple ID In The Age of Big Data

Diana Hope - January 9, 2019

Wiping an iPhone with or without an Apple ID has all kinds of nuance and unique steps in the age of big data. Here's what to know about it.

How Cybersecurity Is Creating Opportunities For Young People
IT
61 shares4,075 views
IT
61 shares4,075 views

How Cybersecurity Is Creating Opportunities For Young People

Andrej Kovacevic - January 4, 2019

If you're looking for a new career in technology, it's exciting to consider how cybersecurity is creating opportunities for young people.

Machine Learning is Moving Corporate VPN Security into The 21st Century
Machine Learning
53 shares3,898 views
Machine Learning
53 shares3,898 views

Machine Learning is Moving Corporate VPN Security into The 21st Century

Sean Mallon - December 6, 2018

Corporate VPN security is important to many businesses, but it has lagged behind for years. Thanks to machine learning, it's finally catching up.

Can Advancements In Data Science Address The Challenges To Cybersecurity?
Analytics
47 shares4,650 views
Analytics
47 shares4,650 views

Can Advancements In Data Science Address The Challenges To Cybersecurity?

Smith Willas - November 20, 2018

If you're curious about whether modern improvements to data science solve cybersecurity challenges, there's a whole lot to learn.

Merging Predictive Analytics Models And WAF For Top-Tier Security 
Analytics
67 shares3,858 views
Analytics
67 shares3,858 views

Merging Predictive Analytics Models And WAF For Top-Tier Security 

Ryan Kh - October 23, 2018

Keeping your data secure is a multi step process. To make sure your data is extra safe, you'll want use predictive analytics models and a firewall.

5 Ways to Minimize the Risks of Data Breaches in the Office
Big Data
47 shares3,548 views
Big Data
47 shares3,548 views

5 Ways to Minimize the Risks of Data Breaches in the Office

Samantha Thorenson - October 22, 2018

Your company data could be a risk in the most surprising of places - even seemingly harmless office scanners. Here's how to keep data safe.

GDPR Fines, Ransomware, and Cybersecurity: What You Need To Know
Best Practices
33 shares4,938 views
Best Practices
33 shares4,938 views

GDPR Fines, Ransomware, and Cybersecurity: What You Need To Know

Ryan Kade - July 17, 2018

While GDPR intends to create a more harmonious internet, it might increase your risk of ransomware and of hackers pitting you against potential GDPR fines.

Could Cryptocurrency Be the Answer to Accounting Fraud?
Best Practices
88 shares6,417 views
Best Practices
88 shares6,417 views

Could Cryptocurrency Be the Answer to Accounting Fraud?

Dan Matthews - March 6, 2018

Fraudulent accounting is a major issue for small businesses and large corporations. Cryptocurrency and blockchain could be the answer.