Results for “Quantum Computing”

  • Blog
    February 6, 2020
    We see the dissonance all the time. Organizations struggle to get their IT and accounting teams working together and IT’s desire to introduce cloud computing to the mix can often strike a flat note. Fortunately, harmony can be achieved in just three simple steps. On its face, “moving to the cloud” seems like a simple enough term. Yet, as we will see, the term “cloud” carries a lot of meanings.…
  • Blog
    May 6, 2024
    5:04 - As far as quantum, that’s a huge game changer that it’s hard to get your mind around.[…] Of course, the concern that many of us have, or most of the government has, is its impact on cryptology, on the data that we have encrypted, and that our adversaries will be able to break that encryption much more quickly. 8:05 - We need to increase diversity. Even things like neurodiversity, right?…
  • Blog
    May 3, 2023
    Imagine a murder scene: a broken window, muddy footprints, a knife and a body. Now imagine a computer incident: Hundreds of encrypted files. A ransom text file. A remote connection from an external Internet Protocol (IP) address. How does someone investigating such a security breach wind back the clock and peer into the past? What stories can voiceless clues tell? How can we separate evidence…
  • Blog
    January 19, 2018
    Corporate technology and security executives no doubt spend many a sleepless night anticipating what hackers might do next to attempt to gain access to valuable company assets. Keeping company and valuable customer data safe is Job One, as breaches can cost millions in lost assets, not to mention the reputational damage a corporation can suffer when an attack happens. Clearly, hackers can own the…
  • Blog
    October 4, 2022
    Enterprises across multiple industries and domains are increasingly turning to graph analytics, thanks to its power to uncover complex non-linear patterns and relationships in a dataset, which would not be easily visible or apparent using most traditional analytics techniques. Applications of graph analytics is wide-ranging, including customer relationship management, social network analysis and…
  • Blog
    June 25, 2020
    As financial service and financial technology companies move critical infrastructure to the cloud, they have a shared responsibility with cloud service providers (CSPs) to safeguard sensitive information. Regulators are becoming more prescriptive in their oversight of cloud operations, revealing a gap between regulatory expectations and a frequent lack of clarity among CSPs and institutions about…
  • Blog
    February 11, 2021
    The role of business intelligence and subsequently, analytics, has become more prominent in recent years and as such, the management of the infrastructure to support these platforms has become just as important. In June 2020, SAP released version 4.3 of BusinessObjects and in December of the same year, the first service pack was also released. The new release of 4.3 is known as the hybrid…
  • Blog
    January 2, 2020
    Companies have high hopes for transformational technologies, especially those that leverage the vast amount of data being collected. Approaches using methods such as artificial intelligence (AI), machine learning (ML) and deep learning are becoming increasingly accessible and gaining significant traction, as they allow for deep insights to be extracted from large and varied data sets. As noted in…
  • Blog
    March 7, 2018
    The Server Message Block (SMB) is an integral part of any successful organization’s technology assets. In this blog post, we’ll take an easily digestible look at SMB, including its history, why and how it is used and what SMB is used for during penetration tests. SMB was first referenced as “IBM PC Network SMB Protocol” in a 1985 document by IBM, and in 1987 as “Microsoft Networks/OpenNet-FILE…
Loading...