Generative Data Intelligence

Tag: data security

Marriott Data Breach Affected 500 Million Guests at Starwood

Reading Time: 5 minutesData breaches are occurring with increasing frequency at name-brand companies, and it’s certainly cause for concern. Millions of customers...

What are the use cases and advantages of Cognitive Computing?

Cognitive computing has taken the tech industry by storm and has become the new buzzword among entrepreneurs and tech enthusiasts. Based on the...

New Zealand – Blockchain in Healthcare: Putting the patient in the center

The practice of providing health services is moving away from the traditional clinician centrist practice model. The prevailing line of thought revolves around...

Blockchain Is More Than Just Skin Deep For Dermatologists

Is the $120 billion global skincare industry next in line to be transformed by the blockchain? Leading skincare specialist, Dr Anna Karp, is...

Here’s What I Learned at RSAC 2018

Reading Time: 4 minutesThe RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year, but...

Here’s What I Learned at RSAC 2018 | Comodo Cybersecurity

Reading Time: 4 minutesThe RSA Conference is one of the biggest events in the world of cybersecurity. I wasn’t there this year,...

How Artificial Intelligence is changing the SaaS Landscape

There is no one moment when SaaS – Software as a Service – was conceived, because SaaS as a concept has a host...

Top 10 Features of an Effective Endpoint Security Strategy 2020

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

Ransomware Served Through Online Ads

Reading Time: 3 minutesCyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised...

Working with the NHS to build lifesaving technology

The five year partnership will build on the successful year-long joint project to build a smartphone app called Streams, which alerts clinical teams...

Comodo Launches New Cloud Delivered Secure Web Platform

Reading Time: 2 minutesWhen is building walls and boundaries a good thing? When sensitive corporate financial and internal data is at risk, of...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?