General | May 7, 2024Culturally intelligent tech: Enhancing emotion recognition worldwide In a time when technology permeates every aspect of our lives, the advancement of AI...
General | March 28, 2024Top tips: Benefits of data backup and recovery Top tips is a weekly column where we highlight what’s trending in the tech world today and...
General | March 28, 2023World Backup Day: Tips for a successful small business backup strategy In today's digital economy, businesses have access to more data than ever. As newer...
General | September 9, 2022Five worthy reads: Your data costs you more than you know Illustration by Dhanwant Kumar Five worthy reads is a regular column on five noteworthy...
Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...
General | April 27, 2018Five worthy reads: Data security is taking the world by storm Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Identity and access management | December 28, 2017Preparing for the GDPR: Designing Active Directory groups One aspect of the GDPR is the fact that all users who have access to personal data must be...
Identity and access management | August 24, 2017Ransomware basics: Part 1 There are many articles on ransomware. Many are trying to convince you that if you buy the...
ADManager Plus | December 4, 2015Securing content located in a distributed file system A distributed file system (DFS) is used to “mask” the location of content that is shared...
General | November 19, 2012Is Big Data Right for Your Business? President Obama Thinks So. When I attended Duke University’s Fuqua School of Business in the late 90s, one of my...
NetFlow Analyzer | January 29, 2010Data storage patterns in NetFlow Analyzer If you use or are evaluating NetFlow Analyzer, you may want to know how the product stores...