Close

Search Results for: vendor

WHAT IS PROACTIVE CYBER DEFENSE?

It?s not hard to understand the concept of proactive cyber defense: acting in anticipation of an attack against a computer or network. The goal is getting in front of attacks by

What is Cloud Workload Protection?

Cloud usage is increasing rapidly. Analysts forecast growth of 17 percent for the worldwide public cloud services market in 2020 alone. This proliferation comes on top of already widespread cloud adoption. In

Unpredictions for 2020 in Cyber Security

The end of the year tradition of prediction is becoming a guessing game as the pace of innovation is increasing towards pure randomness. So I will stop pretending I know

Risks of Artificial Intelligence on Society

Random Thoughts on Cyber Security, Artificial Intelligence, and Future Risks at the OECD Event – AI: Intelligent Machines, Smart Policies It is the end of the first day of a

Accountability – Where AI and Blockchain Intersect

Recently I?ve been thinking about the intersection of blockchain and AI. Although several exciting directions are rising from the convergence of these technologies, I want to explore a specific one:

Cyber-Evil Getting Ever More Personal

Smartphones will soon become the target of choice for cyber attackers?making cyber warfare a personal matter. The emergence of mobile threats is nothing new, though until now, it has mainly

Is It GAME OVER?

Targeted attacks take many forms, though there is one common tactic most of them share: Exploitation. To achieve their goal, they need to penetrate different systems on-the-go. The way this

Time to Re-think Vulnerabilities Disclosure

Public disclosure of vulnerabilities has always bothered me and I wasn’t able to put a finger on the reason until now. As a person who has been involved personally in

Taming The Security Weakest Link(s)

Overview The security level of a computerized system is as good as the security level of its weakest links. If one part is secure and tightened properly and other parts

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand

Google?s Aspired Hegemony

After writing yesterday about the launch of Google Pages Beta at Should Google Lead the Web Development Tools Market? I realized that Google has changed profoundly from what they were

A Product Roadmap in a Feed

Strategic Board was initially an idea about a new competitive intelligence/market intelligence tool for enterprises in the IT sector. Since then many things have changed including our concept and vision

Can Microsoft afford to ignore Linux?

Microsoft completed the acquisition of Sybari Software, their new anti-virus and anti-spyware line of business – The Windows Observer–Antivirus, Anti-Spyware Strategy Moves Forward for Microsoft. One line from the news

Web-based Apps Offline Capability

It seems that web-based applications can accomplish today the most extensive and complex tasks that were possible before only by locally installed software. One aspect that has not been addressed

Software As a Service – Perspectives

My perspectives on the important subject of software as a service presented on Venture Chronicles by Jeff Nolan: Software as a Service – Part 1. Evolving Relationships – Technology is

didn't find what you are looking for?

Search again