Trends
In-depth analysis of the latest tech trends, with highlights of the top research from the world's standard-bearer for computing professionals.
Recent Articles
By Farwa Sajjad
The Internet of Things (IoT) has become integral to business operations. Gartner predicts that there will be approximately 25 billion IoT devices by 2025. As more devices are connected to the internet, more threats emerge that may cripple a business’s digital infrastructure. It’s 2023, and IoT security is still a…
By Hiral Rana
In the constantly evolving world of cybersecurity, attackers are always looking for new vulnerabilities to exploit. While cybersecurity technology continues to advance, so do the methods of cyberattacks. According to research, cyber crimes are forecasted to cost organizations an estimated $10.5 trillion annually by 2025 worldwide. Because of this, it…
By Eugene Zaremba
E-signatures provide a fast and convenient way to get important documents signed. However, it’s important that electronically signed documents are kept secure and can have their validity proven when necessary. There are several features of e-signatures that make this possible which we’re going to explore. First, let’s take a look…
By Stephanie Shank
Does it feel like everywhere you turn, you’re hearing about another cybersecurity incident? Another business, perhaps even in your industry, has fallen victim to a scam. Another threat to prepare for? This article is another warning – but don’t let that stop you from reading on. It’s true that cybercrime…
By Tim Ferguson
Integrating security initiatives at every stage of the SDLC is gaining momentum. That is, DevOps is fast evolving into a more holistic, security-first process, known as DevSecOps. The DevSecOps approach has gained momentum recently, but teams have a long way to go when implementing its methods. A recent Ponemon study…
By Sam Prasanth
With more job opportunities, better public infrastructure, and easier access to essential resources available in urban centers across the globe, it’s no surprise that the population of our major cities continues to measurably outpace most rural environments. This can be seen in data suggesting 80% of global GDP is generated…
By Gilad David Maayan
Serverless authorization refers to a method of securing serverless applications, where the underlying infrastructure is managed by a cloud provider and runs functions in response to events. This authorization process ensures that only authorized users or systems can access the resources, data, or functions in the serverless application. Serverless authorization…
By Gilad David Maayan
What Is Application Maintainability? Application maintainability refers to the ease with which a software application can be maintained, updated, and modified over time to meet changing business requirements and to fix defects. A maintainable application is well-designed, well-documented, and easy to modify, with a clear separation of concerns, a modular…
By Surjit Singh Bawa
Cloud migration has been a central factor in today’s digital transformation, enabling new levels of access and storage at lower costs than traditional, physical servers. It’s predicted that within the next five years, 95 percent of all workloads will be on the cloud, according to 74 percent of global IT…
By Kulbir Sandhu
As the capabilities of artificial intelligence (AI) continue to grow, more businesses across varied sectors seek to access the possibilities AI can offer. With AI’s reach expanding further than ever, it is critical for businesses and software professionals to be aware of the largest problem facing AI today: bias. Algorithm…
By Chandra Shukla
When it comes to process automation, a measured and thoughtful approach is essential. Automating everything in a system may appear to be an attractive solution, but it can create risks and vulnerabilities that did not exist previously. That’s why organizations need to identify the parts of the system that can…
By San Murugesan
Late last year, we witnessed the launch of fascinating conversational artificial intelligence (AI) chatbots–also known as generative AI (GAI)–that could create impressive text, images, code, music, or video according to user requests. Driven by their promise, versatility, ease of use, and availability, these AI applications quickly gained the interest of…
By Dorina Domján
In the past decade, we’ve seen technology advance at an unprecedented rate. Technological advancements have permeated all sectors of activity, from entertainment, consumer behavior, healthcare, and even recruitment. The way recruiters and HR professionals go about filling open positions is changing – and changing fast. To keep up with these…
By Gilad David Maayan
What Is Enterprise Email Security? Enterprise email security refers to the various technologies and processes that organizations use to protect their email systems and networks from unwanted or malicious email, including spam, phishing, and malware. This can include email filtering, encryption, multi-factor authentication, and other security mechanisms to help ensure…
By Paul Baka
Data ethics are the guidelines that show how an organization handles data. With recent privacy scandals (think the Facebook-Cambridge Analytica scandal), users want to know how their data is collected, processed, stored, and distributed. But that’s not all. A study found that 97% of people are concerned that businesses may…
By Pohan Lin
Apache Spark RDD caused a lot of excitement when it was launched. Marketed as a replacement for the outdated Hadoop MapReduce, Apache Spark RDD promised fast, efficient, and flexible big-data processing. Has it fulfilled that promise? Is Apache Spark RDD still used? Is it a good framework for fast data…
By Gilad David Maayan
What Is XDR? Extended Detection and Response (XDR) is a security solution that combines multiple detection and response technologies across different security domains, such as endpoint protection, network security, and cloud security. The goal of XDR is to provide a more comprehensive view of an organization’s security posture, making it…
By John Thangaraj
Unexpected situations like the COVID-19 pandemic and the ongoing macroeconomic atmosphere are a wake-up call for companies worldwide to accelerate digital transformation exponentially. During the pandemic, when lockdowns and social-distancing restrictions transformed business operations, it quickly became apparent that digital innovation was vital to the survival of any organization. Why?…
By Gilad David Maayan
What Is a Service Mesh? A service mesh is a layer of infrastructure that sits between the individual microservices in a distributed application and the network. It provides a uniform way to connect, manage, and secure communication between these microservices. A service mesh typically consists of a number of sidecar…
By Christos Flessas
At the end of 2022, many cybersecurity companies published annual reports on the cybersecurity sector. Evolving and sophisticated attacks, scarcity of cyber resources, changes in data privacy laws, and highly experienced and trained bad actors are some of the cyber demons that tortured businesses and cybersecurity professionals throughout 2022. Additionally,…
There are no results for this search.
Analysis, Blogs, Commentary