When developing a security plan, most organizations turn their focus internally to protect business interests. That used to work because most people didn’t give cybersecurity a second thought — that is, until their personally identifiable information (PII) was affected. But that isn’t the case anymore. With the increase in very…
Read More
While most kids were bickering with siblings and fawning over the newest toys, young Nat Prakongpan was building an enterprise network for his school. Before he became senior manager at the IBM Integration and Threat Intelligence Lab and built a state-of-the-art cyber range from the ground up, Nat spent his…
Read More
The remote work trend is here to stay — and it’s a growing phenomenon. Nearly two-thirds (63 percent) of companies have employees who work remotely, yet more than half of those companies (57 percent) do not have a remote work policy, according to a 2018 report from the freelancing website…
Read More
This is the third installment in a three-part series about machine learning. Be sure to read part one and part two for more context on how to choose the right artificial intelligence solution for your security problems. As we move into this third part, we hope we have helped our…
Read More