Editorial

Security automation and psychology share risks: the recency bias
Editorial Security automation and psychology share risks: the recency bias

The rate of information increase nowadays is unprecedented, making big data look like a virtual triangle-shaped bundle, whose base is continually growing larger as we speak. The older information lies somewhere beneath this immediate bunch of huge data, and this structure determines the prevalence

Do you know who might steal your healthcare data?
Editorial Do you know who might steal your healthcare data?

Smartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our

Don’t become a social engineering victim – know your Facebook
Editorial Don’t become a social engineering victim – know your Facebook

Managing a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, and friends are the most exposed by default

Network monitoring tools: take a walk down this lane for some of the best options
Editorial Network monitoring tools: take a walk down this lane for some of the best options

Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The continuous network

Will cognitive cyber-security one day protect your data?
Editorial Will cognitive cyber-security one day protect your data?

Cognitive computing simulates the human thought process in an artificial intelligence (cognitive) environment. Teaching a computer how to use the type of unstructured information usually employed by security analysts requires tools such as data mining, pattern recognition, human-computer

Hybrid cloud considerations: do you see enterprises being thrilled?
Editorial Hybrid cloud considerations: do you see enterprises being thrilled?

When two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud . The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the cloud services, allowing aggregation,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later