A “critical period” for cybersecurity

| December 11, 2018

article image
The field of cybersecurity is undergoing a critical period, where learnings from cognitive and behavioral science provide us with a springboard for advancing the underlying structures and outcomes of information security strategies through a more layered approach.

Spotlight

Seasia Infotech

CMMi5 certified company provides IoT, MobileDevelopment, WebDevelopers, CloudSolutions DigitalMarketing and B2BMarketing services to businesses worldwide. We embrace the latest technologies to deliver solutions that address our clients’ business challenges. We focus on resolving the IT conundrum for our clients thereby enabling them to focus on their core business strengths.

OTHER ARTICLES

MariaDB Platform X5: New Tools and Features for Developers

Article | July 30, 2020

With the release of MariaDB Platform X5, we’ve added new tooling and features that offload development complexity so developers can focus on creating innovation solutions. MariaDB Platform X5 includes MariaDB Enterprise Server 10.5, pluggable engines (such as InnoDB, ColumnStore, MyRocks, Spider and now Xpand), connectors, and the MaxScale database proxy. And because there’s so much that’s included with the MariaDB Platform X5 release I figured it might be best to start with the high points before drilling down into more details in the future.

Read More

Make Microlearning More Effective By Using Chatbots

Article | February 18, 2020

If I ask you, "What is the most popular format for microlearning?" your response would most likely be "videos." For most of us, videos have become synonymous with microlearning. Interesting videos with the right storyline, engaging graphics, and optimal speed can be a great microlearning aid. But even when they come with a lot of benefits, videos are hard to maintain and update frequently. Considering this challenge, can you think of an easier approach that can be considered for developing microlearning? Personally, I learn well through Frequently Asked Questions (FAQs). Short questions and precise answers can make learning really effective. Owing to technology advancement, we can now create chatbots to consume nuggets of information in a question-and-answer format. A learner can ask a question and get a quick short answer at the point of need. These bots can be updated easily for frequently changing content and changes can be displayed to learners immediately.

Read More

Cloud Security and the Modern CISO: How to Move from Blocker to Enabler

Article | August 11, 2020

The revolution of the public cloud has irrevocably changed the role of the CISO in the modern enterprise. The cloud is the biggest enabler in a generation and is a massive opportunity for enterprises to start innovating at speed and scale. But only if they bring their security with them on the journey! But the pace of change in the new world can feel unsettling, so it is not uncommon for CISOs and security teams to want to stick to older models and to double down on familiar ways of working.

Read More

Black Hat 2020: Session Highlights and a Look Ahead

Article | August 14, 2020

Last week concluded another valuable Black Hat USA event – although held entirely virtually this year, the impact of the research, trends, and knowledge shared was as strong as ever. From new industry trends such as extended detection and response (XDR) to current event security considerations and best practices to detect and mitigate some of the most prevalent and challenging threats – the content did not disappoint! In case you missed them, below are a couple sessions that grabbed headlines and high audience engagement:

Read More

Spotlight

Seasia Infotech

CMMi5 certified company provides IoT, MobileDevelopment, WebDevelopers, CloudSolutions DigitalMarketing and B2BMarketing services to businesses worldwide. We embrace the latest technologies to deliver solutions that address our clients’ business challenges. We focus on resolving the IT conundrum for our clients thereby enabling them to focus on their core business strengths.

Events