Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
Podcast
11 Aug 2025
Podcast: Key hurdles in AI from proof of concept to production
We talk to DDN CTO Sven Oehme about key technical and organisational hurdles when taking AI projects from test to production, in storage and building the technical team Continue Reading
By- Antony Adshead, Computer Weekly
-
Definition
11 Aug 2025
What is clinical informatics?
Clinical informatics is a specialized field of study in healthcare that focuses on using information technology and data analytics to improve patient care and administrative workflows in clinical settings. Continue Reading
-
News
11 Aug 2025
EDGX closes €2.3m funding to boost AI compute for satellites
Belgian space tech company gains funding to aid its mission to deliver the world’s fastest edge computing service for satellite constellations, enabling fast and efficient data processing from space Continue Reading
By- Joe O’Halloran, Computer Weekly
-
11 Aug 2025
AI storage: NAS vs SAN vs object for training and inference
Artificial intelligence operations can place different demands on storage during training, inference, and so on. We look at NAS, SAN and object storage for AI and how to balance them for AI projects Continue Reading
-
11 Aug 2025
CMA told to expedite action against AWS and Microsoft to rebalance UK cloud market
The Competition and Markets Authority (CMA) has published a summary of the final conclusions it has reached following the completion of its long-running probe into the inner workings of the UK cloud infrastructure services market Continue Reading
-
11 Aug 2025
Interview: Antony Hausdoerfer, group CIO, The AA
The vehicle recovery specialist is looking to artificial intelligence and connected vehicle technology to enhance customer experience and get drivers back on the road in the shortest possible time Continue Reading
-
Feature
11 Aug 2025
Looming retirements and the skills shortage
As many workers prepare to retire over the next few years, a large number of people will be leaving the tech talent pool, possibly exacerbating the skills shortage Continue Reading
By -
Blog Post
11 Aug 2025
Sysdig Sage, knows its cloud security threat onions
Sysdig is a “seasoned” player in the real-time cloud security arena. As such, the firm has now launched an agentic cloud security platform powered by Sysdig’s autonomous AI agents, which are ... Continue Reading
-
Podcast
11 Aug 2025
Is geospatial data the real game changer for digital twins?
In the podcast, the CEO of TwinMatrix Technologies explains the benefits and challenges of adding geospatial capabilities to digital twins. Continue Reading
By- David Essex, Industry Editor
-
News
11 Aug 2025
Arqit to join Vodafone network and ecosystem innovation centre
Innovation centre for leading-edge technologies welcomes encryption software service to scale its quantum-safe technology across operator’s ecosystem Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
11 Aug 2025
Watching the watchers: Is the Technical Advisory Panel a match for MI5, MI6 and GCHQ?
Dame Muffy Calder is chair of the Technical Advisory Panel (TAP), a small group of experts that advises the Investigatory Powers Commissioner on surveillance technology. Do they have what it takes to oversee the intelligence community? Continue Reading
By- Bill Goodwin, Investigations Editor
-
Feature
11 Aug 2025
Will CDPs deliver on the marketing promise of personalisation?
Customer data platforms are being touted by suppliers as the means to deliver the single customer view after which organisations have long lusted. Will the promise finally be delivered? Continue Reading
-
Tip
11 Aug 2025
Backup audit checklist and best practices for preparation
What must-have items satisfy an audit of your backup platform? Why is auditing important? Discover how the audit process can help your organization improve its backup process. Continue Reading
By -
Tip
11 Aug 2025
Agentic AI workflows: Trends, examples and best practices
Implemented correctly, agentic AI workflows can make business process management more responsive, flexible and autonomous. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Blog Post
10 Aug 2025
Why kebab-case should be a naming convention best practice
https://youtu.be/pQLJdjdr2MI They say there are only two difficult challenges in the world of computer programming: How to create a Java based Lambda function in AWS; and What to name things. Given ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
10 Aug 2025
What is JDBC's full form?
Some argue the full form of JDBC is Java Database Connectivity, while others argue it is a trademarked term and doesn't actually stand for anything. So which side of the debate is right? Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
09 Aug 2025
Apache Struts Hello World by example
Here's a simple Struts Hello World example for anyone interested in learning how to use the latest Struts 2.5 release. The Apache Struts Framework has come a long way in the last 20 years. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
09 Aug 2025
AWS Machine Learning Associate exam topics, tips and practice exams
The AWS Machine Learning Associate exam validates real-world ability to build, operationalize, deploy, and maintain ml solutions on aws. You will prepare data pipelines, select models, train and ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
09 Aug 2025
Apache Struts 2.5 with no Struts config XML file example
Learn to develop a modern Java web application with this Apache Struts 2.5 example. No Struts config XML files are required. This zero-config Struts example goes without! Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
09 Aug 2025
Top 10 JavaScript and JSON performance optimization tips
JavaScript can deliver highly interactive websites that actively engage the user in a way HTML alone never could. However, the increased engagement levels come with a performance cost that can ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
How to use Java's conditional operator ?:
Quickly learn how to use the Java ternary operator and see how this simple programming construct can help make your conditional logic, if statements and return statements clearer and more concise. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
AWS DevOps Professional Practice Tests on Exam Topics
The AWS Certified DevOps Engineer Professional exam validates your ability to provision, operate, and manage distributed systems on AWS with strong focus on automation, observability, reliability, ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
Practice Exams for the AWS Developer Certification (Associate)
This Certified AWS Developer Associate Practice Exam, pulled from Udemy and certificationexams.pro, is designed to help you understand each of the AWS Developer Exam Topics and pass the AWS ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
KCNA Practice Exams on all CNCF Exam Topics
Prepare for the KCNA exam with realistic practice questions that reflect the format and difficulty of the CNCF Kubernetes and Cloud Native Associate certification Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
Azure AI Engineer Exam Dumps and Braindumps (AI-102)
Here are some Azure AI Engineer Exam Dumps to help you pass the Microsoft AI Engineer certification with flying colors. Well, they're not actually Braindumps, just honest answers. We do things ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
KCNA Study Guide and Certification Questions
Study with high quality KCNA certification practice questions designed to mirror the real exam experience. Build foundational cloud native knowledge with confidence. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
Microsoft Azure AI Engineer Practice Exams
Looking for Microsoft Azure AI Engineer Certification practice exams? These AI Engineer sample questions and answers will not only help you pass the Azure certification, they'll help you learn as well! Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
Hibernate vs JPA: What's the difference between them?
Let us settle the Hibernate vs JPA debate for you. Here we explain the difference between JPA and Hibernate so that you'll never have to choose between the two database APIs. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
08 Aug 2025
Intel CEO's potential China links a warning for U.S. companies
President Donald Trump called for Intel CEO Lip-Bu Tan to resign, another signal of the administration's heightened focus on competition and support of domestic manufacturing. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Definition
08 Aug 2025
What is the three lines model and what is its purpose?
The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense. Continue Reading
By- Kinza Yasar, Technical Writer
- Amanda Hetler, Senior Editor
-
Blog Post
08 Aug 2025
What is Maven in Java? Crash course tutorial for beginners
Need to learn Apache Maven fast? This crash course Maven tutorial will quickly get you up to speed on the popular, open-source, Java build tool. Continue Reading
By- Cameron McKenzie, TechTarget
-
Definition
08 Aug 2025
What is a computer-assisted coding system (CACS)?
A computer-assisted coding system (CACS) is software that analyzes healthcare documents and automatically produces appropriate medical codes, like the International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM), ICD-10-CM and the American Medical Association's Current Procedural Terminology (CPT) for specific phrases and terms within the document. Continue Reading
By- Rahul Awati
- Alex DelVecchio, Content Development Strategist
-
Blog Post
08 Aug 2025
How to Transfer a Domain to Amazon's Route 53
https://youtu.be/m2b6SzaRuZg?si=HfNN_wh-6fR44vCI If you're already using a swath of AWS hosted services, it simply makes sense to move your domain names out of a hosting service like GoDaddy and ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Video
08 Aug 2025
Java, Spring Boot and AWS' Elastic Beanstalk
Think Java and Spring Boot applications are cumbersome to deploy? Let's let Amazon's Beanstalk put that myth to rest. Continue Reading
By- Cameron McKenzie, TechTarget
-
Feature
08 Aug 2025
AI and ERP: The digital labor evolution in manufacturing
Despite hype and growing pains, agentic AI finds a home in the enterprise with manufacturing process functionality. Continue Reading
By- Jim O'Donnell, News Director
-
Blog Post
08 Aug 2025
AZ-104 Practice Tests on Azure Administrator Exam Topics
These free AZ-104 Practice test questions cover all the Azure Administrator Associate exam topics and will help you get your Azure Administrator Associate certification fast. Continue Reading
By- Cameron McKenzie, TechTarget
-
Video
08 Aug 2025
Create a PowerShell script for Windows PATH variable cleanup
This step-by-step guide explains how to build a PowerShell script that automatically identifies issues with Windows PATH variables to improve system stability. Continue Reading
By -
News
08 Aug 2025
Omada Health revenue jumps 49% year-over-year post-IPO
The virtual chronic care provider reported strong financial results in Q2 2025, including sizeable revenue and membership growth, and a strong IPO showing. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Feature
08 Aug 2025
The cloud rush: The rise of data centers in North Carolina
North Carolina is emerging as a data center hub due to its renewable energy options, tax incentives and skilled workforce, but it faces challenges like hurricanes and grid strain. Continue Reading
By- Julia Borgini, Spacebarpress Media
-
News
08 Aug 2025
MSPs encouraged to tighten up security defences
Fears of attacks that exploit VPN vulnerabilities and compromise networks has underlined the need for the channel to remain vigilant Continue Reading
By- Simon Quicke, Microscope Editor
-
Definition
08 Aug 2025
What is FHIR (Fast Healthcare Interoperability Resources)?
Fast Healthcare Interoperability Resources (FHIR) is an interoperability standard developed by Health Level Seven International (HL7) to facilitate the exchange of healthcare information between various entities involved in the healthcare ecosystem. Continue Reading
By- Rahul Awati
- Shaun Sutner, Senior News Director
- Monica Vallejo, Editorial assistant
-
Tip
08 Aug 2025
How to prevent DoS attacks and what to do if they happen
The worst DoS attacks are like digital tsunamis that put critical business operations at risk. Learn how they work, ways to stop them and how systems can withstand the flood. Continue Reading
By -
Feature
08 Aug 2025
Experts weigh in on securing AI effectively
Using AI comes with security risks. Learn what the top attack vectors and privacy threats are, then discover how to mitigate them through proper strategy, monitoring and more. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
Feature
08 Aug 2025
Quiet cracking: The workplace trend employers can't ignore
Quiet cracking silently damages workplace productivity as employees disengage. This trend costs businesses through turnover, lost innovation and lack of productivity. Continue Reading
By- Rosa Heaton, Content Manager
-
News
08 Aug 2025
NSA partnering with cyber firms to support under-resourced defense contractors
The spy agency has sought out creative ways to help protect small companies supplying the U.S. military. Continue Reading
— Cybersecurity Dive -
News
08 Aug 2025
Citizen Lab founder flags rise of U.S. authoritarianism
Citizen Lab director and founder Ron Deibert explained how civil society is locked in 'vicious cycle,' and human rights are being abused as a result, covering Israeli spyware, the Khashoggi killing, and an erosion of democratic norms in the U.S. Continue Reading
— Dark Reading -
News
08 Aug 2025
Black Hat news: Exposed vaults, firmware flaws, AI hacks
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
News
08 Aug 2025
Researcher deploys fuzzer to test autonomous vehicle safety
As autonomous vehicles continue to evolve, new research highlights the importance of rigorous security testing to protect against both intentional attacks and unintentional unsafe commands in teleoperation systems. Continue Reading
— Dark Reading -
Feature
08 Aug 2025
How flawed security implementation drives clinician burnout
Properly implemented cybersecurity technology strikes a balance between security and usability, enabling quality patient care and privacy without adding to clinician burnout. Continue Reading
By- Jill Hughes, Associate Editor
-
Blog Post
08 Aug 2025
How to convert a PEM file to PPK format example
Need to SSH into a remote server with PuTTY but your PEM file just won do the trick? Here's a quick example of how to convert a PEM file to PPK format with PuTTYGen so your SSH sessions with PuTTY ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Aug 2025
Java's 4 JDBC driver types explained
Here we explain the difference between the four JDBC driver types, and how to choose the right JDBC driver for your database-driven Java apps. Continue Reading
By- Cameron McKenzie, TechTarget
-
Feature
08 Aug 2025
GenAI search vs. traditional search engines: How they differ
Search engines are the original way to browse the internet. GenAI search is a new method to explore and get answers to queries. Learn how it compares to traditional searches. Continue Reading
-
Definition
08 Aug 2025
What is an enterprise master patient index (EMPI)?
An enterprise master patient index (EMPI) is a database that is used to maintain consistent and accurate information about each patient registered by a healthcare organization across its various departments. Continue Reading
By- Rahul Awati
- Alex DelVecchio, Content Development Strategist
- Tayla Holman, Site Editor
-
Definition
08 Aug 2025
What is a private API?
A private API is an application programming interface that's designed for use within an organization and not for external consumption. Continue Reading
By -
Blog Post
08 Aug 2025
long to String in Java
The easiest way to convert from a long to a String in Java is to add the long to an empty set of double quotes with the plus operator. If that's not good enough, here's a list of other conversion ... Continue Reading
By- Cameron McKenzie, TechTarget
-
News
08 Aug 2025
O2 deploys small cells to boost mobile in Cornwall
Equipment upgrade will see customers in St Ives and Newquay benefit from better mobile connectivity after deployment of 13 small cells, with sites now live ahead of the peak summer season Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
08 Aug 2025
Channel catch-up: News in brief
Developments this week at Lenovo, Exertis Enterprise, Phoenix Software, NTT DATA and WatchGuard Technologies Continue Reading
By- Simon Quicke, Microscope Editor
-
News
08 Aug 2025
Interview: How PXP shifted off VMware
When a business begins to see less and less value from an incumbent IT provider, especially as its software becomes more expensive, it might be time to switch. Here’s how one company did just that Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Aug 2025
OpenAI closes gap to artificial general intelligence with GPT-5
As OpenAI’s latest large language model delivers smarter AI, experts are wary of the risks GPT-5 poses to human creativity Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
08 Aug 2025
What to expect from UiPath Fusion 2025
He calls them “robots” in fact, not software bots, automations or agents per se... UiPath CEO Daniel Dines often talks directly about robotic process automation (RPA) and its intelligent ... Continue Reading
-
News
08 Aug 2025
Cloudera touts hybrid data platform to power enterprise AI boom
At its Evolve APAC 2025 conference in Singapore, Cloudera promises to end the compromise between on-premise data control and public cloud convenience with its hybrid data platform Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
08 Aug 2025
Java Scanner User Input Example
This tutorial on how to use the Java Scanner for user input will quickly show you how to import java.util, take String, int, double and char input, and teach you the difference between the ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Tip
08 Aug 2025
Data backup plan template: Free download and guide
Download our free backup planning template to help you get started on or improve your current process. Explore the critical information to include in your document. Continue Reading
By -
Feature
08 Aug 2025
The cost of downtime and how businesses can avoid it
Disrupted operations cost businesses billions of dollars annually. Disaster planning, cyber resilience and monitoring system dependencies can help limit the damage. Continue Reading
By- John Moore, Industry Editor
-
Blog Post
07 Aug 2025
AWS AI Practitioner Certification Exam Dumps and Braindumps
Looking for AWS AI Practitioner certification braindumps and exam dumps? Well, we've got something even better. Over 500 tough, exam focused certification exam questions with incredibly thorough ... Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
Blog Post
07 Aug 2025
AWS AI Practitioner Practice Tests on all Exam Topics
Want to advance your career or give yourself some job security in the age of AI and ML? Then the AWS AI Practitioner certification might be right for you, and these AI Practitioner Practice tests ... Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
Blog Post
07 Aug 2025
Five Star AWS AI Practitioner Book ★ ★ ★ ★ ★
The AWS Certified AI Practitioner Book of Exam Questions & Answers by Cameron McKenzie is a clear and complete resource for passing the AWS Certified AI Practitioner exam (AIF-C01). It fits ... Continue Reading
-
Blog Post
07 Aug 2025
Five Star AWS Certified Cloud Practitioner Study Guide - ★ ★ ★ ★ ★
Looking for an AWS Cloud Practitioner study guide? This AWS certification book of practice questions for the AWS Cloud Practitioner test will help you study and pass the exam on the first try. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Aug 2025
AWS Cloud Practitioner Exam Dumps and Braindumps
Pass the AWS Cloud Practitioner Certification Exam with integrity. Put the Cloud Practitioner Exam Dumps and Braindumps aside, and learn honestly with the expertly sourced AWS practice test ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Aug 2025
Free AWS AI Practitioner Test Simulator Covering all Exam Topics
Want to pass the AWS AI Practitioner exam? First, know the exam topics being covered. Here's a set of tips, practice exams and most importantly, a look at the exam objectives. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Aug 2025
Google's Generative AI Leader Certification Exam Dumps and Braindumps
Looking for Google Cloud Generative AI Leader exam dumps and braindumps? Look no further. No, these aren't dumps themselves, they're better. Real questions built honestly to help you pass the GCP ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Aug 2025
Google Certified Generative AI Leader Sample Questions
GCP Generative AI Leader Exam Simulator The Google Cloud Certified Generative AI Leader exam validates your ability to understand, apply, and lead initiatives using Google Cloud’s AI and machine ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Aug 2025
AWS Cloud Practitioner Sample Questions on Exam Topics
These sample questions for the AWS Cloud Practitioner certification cover all of the cloud practitioner exam topics and will help you gain you get AWS certified as a cloud practitioner on your ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Aug 2025
AWS Cloud Practitioner Practice Test Questions
Want to pass the AWS Cloud Practitioner exam on the first try? Here's some humble advice that will hopefully get you past the post and help you attain another AWS accreditation. Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
Blog Post
07 Aug 2025
How to login to Docker with a Docker Hub access token
Have you been snared by Docker's "unauthorized: incorrect username or password" error when you login at the command line? Here's how to generate an access token in Docker Hub and fix it. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
07 Aug 2025
OpenAI's GPT-5 is out: Where it shines, and where it doesn't
Experts say it's an incremental release but shows some strengths that might interest enterprises. Continue Reading
By- Esther Shittu, News Writer
-
Tip
07 Aug 2025
9 top ERP software picks for the retail industry
Some ERP software is better than others for companies that are in the retail industry and need certain functionality. Learn some products that could work for your organization. Continue Reading
By- James Kofalt, DX4 Research
-
Opinion
07 Aug 2025
3 eye-catching vendor announcements from Black Hat
At Black Hat 2025, some vendors had intriguing acquisitions and announcements in the realms of shadow AI, unmanaged devices and browser security. Continue Reading
By- Gabe Knuth, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
News
07 Aug 2025
Trump's pharma import tariffs threaten drug pricing, generics
Trump's plan to raise pharma import tariffs up to 250% could drastically increase drug prices, eliminate access to affordable generics and limit R&D efforts across the industry. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
Definition
07 Aug 2025
What is integrated risk management (IRM)?
Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, risk tolerance profile and strategic decisions. Continue Reading
By- Nick Barney, Technology Writer
- Wesley Chai
-
News
07 Aug 2025
Credit Karma leader shares AI governance lessons learned
Start slow and break things -- that's how the head of data and AI at the fintech says enterprises should start building AI governance frameworks. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
07 Aug 2025
What is direct marketing?
Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or website or a request for further information) from a selected group of consumers in response to communication from a marketer. Continue Reading
-
Blog Post
07 Aug 2025
Find Jenkins Home and change the JENKINS_HOME directory location by example
How to change JENKINS_HOME When Jenkins runs, it stuffs all of its logs, cloned repos, plugin configurations and build artifacts into the Jenkins Home folder. Basically, every ounce of ... Continue Reading
By- Cameron McKenzie, TechTarget
-
News
07 Aug 2025
DOJ Oks UnitedHealth, Amedisys deal on divestiture conditions
DOJ said UnitedHealth and Amedisys could move ahead with the $3.3B acquisition as long as they both divest at least 164 of their home health and hospice facilities. Continue Reading
By- Sara Heath, Executive Editor
-
News
07 Aug 2025
Illinois 1st US state to ban AI in mental healthcare
Illinois has banned the use of AI in providing mental healthcare amid rising concerns about AI chatbots causing patient harm, including enabling dangerous behavior. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Definition
07 Aug 2025
What is IDoc (intermediate document)?
IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems. Continue Reading
By- Gavin Wright
- Jim O'Donnell, News Director
-
Feature
07 Aug 2025
Mastering AI search optimization: Key trends and strategies
As AI transforms search, brands must master both GEO and SEO to maintain visibility across evolving digital landscapes. Continue Reading
By- Griffin LaFleur, Swing Education
-
News
07 Aug 2025
Interview: Kirsty Roth, chief operations and technology officer, Thomson Reuters
As a technologist who also runs corporate operations, Thomson Reuters’ CTO believes her tech background gives her a unique edge as the business information group looks to transform its products with AI Continue Reading
By -
Definition
07 Aug 2025
What is COMSEC (communications security)?
Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written information that is transmitted or transferred. Continue Reading
By- Paul Kirvan
- Ben Cole, Executive Editor
-
News
07 Aug 2025
Context: Security continues to deliver for distribution in H1
Review of how the first half of the year has gone indicates that overall the market is growing, although the UK could pick up steam compared with mainland Europe Continue Reading
By- Simon Quicke, Microscope Editor
-
News
07 Aug 2025
Google Gemini AI bot hijacks smart homes, turns off the lights
Using invisible prompts, the attacks demonstrate a physical risk that could soon become reality as the world increasingly becomes more interconnected with artificial intelligence. Continue Reading
— Dark Reading -
News
07 Aug 2025
VexTrio cybercrime outfit run by legit ad tech firms
New research reveals that a malicious traffic distribution system (TDS) is run not by 'hackers in hoodies,' but by a series of corporations operating in the commercial digital advertising industry. Continue Reading
— Dark Reading -
News
07 Aug 2025
'ReVault' security flaws impact millions of Dell laptops
The now-patched vulnerabilities exist at the firmware level and enable deep persistence on compromised systems. Continue Reading
— Dark Reading -
Definition
07 Aug 2025
What is the Mitre ATT&CK framework?
The Mitre ATT&CK -- pronounced miter attack -- framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their cybersecurity strategies. Continue Reading
By- Paul Kirvan
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
News
07 Aug 2025
Critical zero-day bugs crack open CyberArk, HashiCorp password vaults
Secrets managers hold all the keys to an enterprise's kingdom. Two popular ones had longstanding, critical, unauthenticated RCE vulnerabilities. Continue Reading
— Dark Reading -
News
07 Aug 2025
U.S. still prioritizing zero-trust migration to limit hacks' damage
The zero-trust initiative, which gained steam during the Biden administration, is still underway. Continue Reading
— Cybersecurity Dive -
Feature
07 Aug 2025
Agile methodology reborn as COVID, AI transform enterprises
Enterprises grew disillusioned during the past decade with efforts to scale Agile, but global upheavals since 2020 have pushed some business transformations over the finish line. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
07 Aug 2025
Change Healthcare data breach victim count rises to 193 million
The Change Healthcare data breach tally has settled at 193 million, nearly double UnitedHealth Group's initial estimates. Continue Reading
By- Jill Hughes, Associate Editor
-
Blog Post
07 Aug 2025
Top 10 benefits of client-side rendering frameworks
As the name of this site implies, we're big advocates of server-side technologies. But we also recognize that integrating client-side technologies into the web architecture can be advantageous as ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Tip
07 Aug 2025
How to begin Wi-Fi 7 deployment
As Wi-Fi lifecycles move faster than ever, enterprises must consider when to deploy a new Wi-Fi standard. This article offers guidance on when to deploy Wi-Fi 7 in the enterprise. Continue Reading
By