101,501 Results for:

  • Sort by: 

Ultimate guide on enterprise unified communications strategy

By Katherine Finnell, Sandra Gittlen, Luke O'Neill 27 Mar 2024

When formulating a unified communications strategy, enterprises need to consider several key elements. This step-by-step guide helps businesses plan their UC deployment. Read More

Qilin ransomware gang claims cyber attack on the Big Issue

By Alex Scroxton 26 Mar 2024

A ransomware attack on the systems of publisher and social enterprise Big Issue Group has been claimed by the Qilin gang Read More

Talkdesk releases on-prem AI contact center automation suite

By Don Fluckinger 26 Mar 2024

Contact center as a service users have a leg up on generative AI integrations because of the nature of cloud infrastructure, but on-premises customer service will get theirs. Read More

SQL injection vulnerability in Fortinet software under attack

By Arielle Waldman 26 Mar 2024

Fortinet and CISA confirmed CVE-2023-48788 is being actively exploited. But the Shadowserver Foundation found that many vulnerable instances remain online. Read More

Different types of database management systems explained

By Craig S. Mullins 26 Mar 2024

The various types of database software come with advantages, limitations and optimal uses that prospective buyers should be aware of before choosing a DBMS. Read More

6 data privacy challenges and how to fix them

By Jeff McCormick 26 Mar 2024

Fragmented data protection laws, technology disruptions, AI adoption, data governance and consumer trust are among the complex issues confronting businesses in need of remedies. Read More

Top.gg supply chain attack highlights subtle risks

By Alexander Culafi, Beth Pariseau 26 Mar 2024

Threat actors used fake Python infrastructure and cookie stealing to poison multiple GitHub code repositories, putting another spotlight on supply chain risks. Read More

Top 6 data security posture management use cases

By Todd Thiemann 26 Mar 2024

Data security posture management is a top 10 security issue for 2024, according to research. Check out the top six use cases for DSPM and weigh in on other possibilities. Read More

Cern: Challenges of GPU datacentre management

By Cliff Saran 26 Mar 2024

Cern is a major user of Kubernetes. The container orchestration technology offers a way to democratise AI hardware Read More

WikiLeaks founder Julian Assange given temporary reprieve over extradition

By Bill Goodwin, Sander Priston 26 Mar 2024

Court seeks assurances from the US that Assange will be given First Amendment Rights, will not prejudiced at trial because of his nationality, and will not be subject to the death penalty Read More