101,481 Results for:

  • Sort by: 

How to evaluate cloud certification training

By Brian Kirsch 07 May 2024

Certifications and training courses help IT pros acquire the knowledge and skills to succeed in cloud. Learn what to look for in courses and how to choose the right program. Read More

9 SharePoint best practices

By Reda Chouffani 07 May 2024

The breadth of SharePoint's features can make it a challenging tool to implement and maintain. These best practices can keep content managers on track. Read More

NCA unmasks LockBitSupp cyber gangster who toyed with pursuers

By Alex Scroxton 07 May 2024

The NCA and its partners have named the administrator of the LockBit ransomware gang, LockBitSupp, as Dmitry Khoroshev, who now faces sanctions and criminal charges Read More

U.S. agencies continue to observe Volt Typhoon intrusions

By Arielle Waldman 07 May 2024

A panel of experts at RSA Conference 2024 discussed Volt Typhoon and warned the Chinese nation-state threat group is still targeting and compromising U.S. organizations. Read More

What does the Data Protection and Digital Information Bill mean for UK industry?

By Peter Ray Allison 07 May 2024

The Data Protection and Digital Information Bill is the first shift in the UK’s data protection regime since leaving the EU, but what could it mean for UK industry? Read More

How to approach IT/OT convergence training and certification

By Mary E. Shacklett 07 May 2024

IT/OT convergence training involves rethinking existing processes and acquiring new skills to bridge the knowledge gap in areas like business process engineering and project management. Read More

How to detect deepfakes manually and using AI

By Andrew Froehlich 07 May 2024

Deepfakes rely on AI to generate realistic but counterfeit content. A variety of automated tools and manual hints can help organizations pinpoint deepfake videos and images. Read More

How to configure sudo privilege and access control settings

By Damon Garn 07 May 2024

Learn how to use the sudo command for access control configurations, from granting full administrative privileges to delegating roles. Read More

Polar Bear Pitching: Hot mobile apps come in from the cold

By Joe O’Halloran 07 May 2024

Flexing its current technological muscle, the city of Oulu in Finland shows that in addition to being a hub of 5G and 6G development, it is also a hot house for mobile apps, even from a hole in the ice Read More

What is a cloud security engineer, and how do I become one?

By Sean Michael Kerner 07 May 2024

A cloud security engineer has specific responsibilities for helping to secure cloud infrastructure, applications and IT assets. Read More