I-Generative Data Intelligence

Tag: analytics

Stopping Fraud and Threats with XTN

By Guido Ronchetti, CTO of XTN Cognitive SecurityXTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions...

Increase web application security without causing any user disruption

In this podcast recorded at RSA Conference 2020, Jason A. Hollander, CEO, and Paul B. Storm, President at Cymatic, talk about how their...

Iphepha Elimhlophe: I-Actionable Anomalies - I-MixMode AI Iyenza Kanjani Idatha Yakho Yokuphepha Ihlakaniphe

Esimeni sanamuhla se-cybersecurity ehlala ishintsha kunezinkinga ezinkulu ezibhekene nochwepheshe eziqhubeka nokuba zimbi kakhulu. Lezi zinkinga zigxile ekushodeni...

Exploring the risky behavior of IT security professionals

Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing...

20+ Inspiring Data Scientists to Follow in 2020

As we decided to create a list of inspiring people to follow in data science, we asked for help from the data...

I-ChainLink Iyaphuma Nge-203% Ebuya Ngenyanga Eyodwa Nokuthrenda Kwemali Eyengeziwe Ye-Cryptocurrency

Uhlolojikelele Ikhishwe kabili ngesonto, lo mbiko uhlose ukukhomba izitayela ezibanzi emakethe ye-cryptocurrency. Ukuze ubonise intuthuko yakamuva kulokhu okuhamba ngokushesha...

Tether is Now Printing Millions, and That’s Huge for Bitcoin

Tether’s USDT money printer is up and running again, and it could be a sign of what’s to come next for Bitcoin and...

NVIDIA Data Science Workstation – Transforming AI and Big Data Analytics

Big data analytics and deep learning are fueling all areas of business and require massive computing power. Beyond deep...

I-Blizzard eshaywe ukuhlasela okukhulu kwe-DDoS; I-EA Sports ibhekene nenkinga yokusalela emuva

<!-- Blizzard hit by massive DDoS attack; EA Sports facing lagging issue ...

Suddenly, your whole team is remote. Now what?

I’m writing to you from my apartment, drinking a cup of Jing’s finest Ceylon breakfast tea, looking out the window at a sunny...

Open source software use grows in Germany, but compliance and risk management need improvement

A new report from Bitkom reveals that among companies that use open source, many aren’t sure of the best way to approach...

The New Generation of Cybersecurity Solutions: from Features to Outcomes

Today, businesses face a new set of challenges:more aggressive cyber threats (higher exposure to risk)increased attack surfacedifficulty to find adequate security staffincreasing...

Latest Intelligence

indawo_img
indawo_img
indawo_img