How Hackers Use Drones to Infiltrate Corporate Networks

January 15, 2019

Drones threaten the physical security of enterprises and their cybersecurity. Hackers and cyber terrorists take advantage of drones as a quiet, discreet technology, with the capability to carry heavy payloads over fences and right next to structures without attention. Nefarious actors use drones to sniff networks, intercept data, disrupt communications, or hack into servers. With the availability of consumer drones to the global market, pilots with malicious intention can hack networks, exposing sensitive client information and corporate intellectual property.

Spotlight

Carbon Black, Inc.

Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyber attacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud.

OTHER WHITEPAPERS
news image

Conversational AI using NVIDIA : NetApp Solutions

whitePaper | October 17, 2022

The NVIDIA DGX family of systems is made up of the world’s first integrated artificial intelligence (AI)-based systems that are purpose-built for enterprise AI. NetApp AFF storage systems deliver extreme performance and industry-leading hybrid cloud data-management capabilities. NetApp and NVIDIA have partnered to create the NetApp ONTAP AI reference architecture, a turnkey solution for AI and machine learning (ML) workloads that provides enterprise-class performance, reliability, and support.

Read More
news image

Protecting the Human Side of Cybersecurity

whitePaper | August 1, 2020

The majority of enterprise companies have hundreds of apps deployed in the cloud, and that trend is expected to continue, according to a new survey by IDG. That said, 52% of companies find that securing those apps continues to be challenging. But that doesn’t mean that the remaining 48% are fully confident in their cloud app security or are fully aware of all of the facets of cloud security they should be considering. “Cloud security is a broad issue,” says Jim Fulton, Director, Cloud & Edge Protection Solutions for Forcepoint. “From what I’ve seen, about 10% of companies really understand all of the facets.

Read More
news image

Getting Visibility into IT Operations with Effective Discovery and Service Mapping

whitePaper | July 23, 2020

IT Operations Management (ITOM) is more important than ever in today’s fast-changing world. It helps IT to ensure availability, maintenance and deployment of hardware, software, services and processes. By providing IT with a single platform for operations management, ITOM is the enabler of speed, agility, complete visibility and rapid problem detection. This maximizes business return from IT investment by cost-effectively achieving optimum IT performance.

Read More
news image

AI Test Drive clears the way for business case validation

whitePaper | August 26, 2022

Evolving data centers into intelligent hubs for digitized business processes poses numerous challenges for IT managers. Many organizations are already adopting hybrid IT concepts to make their data center operations more flexible. However, they also have to keep an eye on new requirements such as IoT, AI, blockchain, container technology as well as data security, legal regulations and climate change. How can all this be seamlessly integrated and managed? And, what will matter next for the data center of the future?

Read More
news image

Accenture Enterprise AI – Scaling Machine Learning and Deep Learning Models AWS Whitepaper

whitePaper | August 23, 2022

Today, there is a real-time, global, tectonic shift in the workplace caused by digital transformation. Accelerated by the Covid pandemic, this digital transformation has created never-seen-before opportunities and significant workplace disruption. Fully realizing the new market opportunities demands a modernized workforce.

Read More
news image

Blueprint for an AI Bill of Rights

whitePaper | October 26, 2022

The Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People was published by the White House Office of Science and Technology Policy in October 2022. This framework was released one year after OSTP announced the launch of a process to develop “a bill of rights for an AI-powered world.” Its release follows a year of public engagement to inform this initiative. The framework is available online at: https://www.whitehouse.gov/ostp/ai-bill-of-rights

Read More

Spotlight

Carbon Black, Inc.

Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyber attacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud.

Events