Blog

New Malware Takes Aim At Apple Developers

If you don't spend much time in the Apple ecosystem, you may not realize that Xcode is a completely legitimate tool used in macOS for developing a wide range of software and ...

3 fundamentals for a successful hybrid cloud

Learn how to manage infrastructure more easily, innovate faster, and improve security using the hybrid cloud. Read this one-pager to get guidance on using three fundamentals to create your hybrid cloud strategy: networking, identity and access management, and security. View: ...

Disruption Defined: Maersk navigates data to move goods globally

Welcome to the fourth industrial revolution where we're now experiencing the digital age. This revolution is transforming all industries, including shipping and logistics. Maersk, the integrated transport and logistics giant, has transformed their business using digital strategies. In the past, ...

Massive Security Camera Hack Hits Some Corporate Businesses

A large US hacker collective claimed credit for something you may not have heard of yet called "#OperationPanopticon." According to the group behind the attack, they compromised a high level administrator account ...

Where Artificial Intelligence Will Disrupt Next

With so many possible artificial intelligence (AI) applications, predicting trends can be challenging, especially in an age when innovation reigns supreme and new breakthroughs occur every day. So, in an effort to gain further insights into the future of AI, ...

Retail in the 2020s: The death of consumerism?

Thanks to new technologies and rising customer expectations, retailers have become experience hubs for millions of shoppers around the world. It's no secret that retail has fully embraced digital transformation, leading many experts to speculate about where the industry is ...

The Benefits Of SaaS For Managing Cloud Security Threats

As business become more digitalized, they must learn to contend with the increasing number of cloud security threats and incidents. Therefore, investing in the tools that can give them the ability to deal with and overcome these issues is quickly ...

Managing cybersecurity like a business risk

This powerful thought leadership article highlights the threat of data breaches and cyberattacks, while advocating for organizations to rethink their approach to cybersecurity. Microsoft urges businesses to view data transformation and threat analytics/modeling as growth opportunities while approaching security as ...

A step forward in the age of artificial intelligence

Artificial intelligence (AI) has come a long way, especially in recent times. In the past five years, adoption of AI-driven technology has significantly increased among the world's enterprises, leading to smarter machines and a validation of AI's role in these ...

HTTPS Becomes Default For Google Chrome For Added Security

For the last month or so, Google has been testing the notion of using HTTPS as the default protocol for all URLs a user types into the address bar. Those who have ...