A Watershed Moment for AI: Machine Learning at the Frontline of Cyber Threats

July 15, 2019

For years, researchers have been asking what else they can do to detect real fraud. In the annals of cyber warfare, the ability to use machine learning to detect and thwart threat confronts the very real problem of too many false alarms.

From College Campuses to Sports Stadiums, IoT May Hold the Key to Public Safety

June 12, 2019

Technology plays a critical role in addressing public safety emergencies, from surveillance cameras to biometric scanners. But it’s the Internet of Things that enables such devices to be connected, allowing for real-time threat monitoring and faster, smarter response tactics that keep the public—and those tasked with protecting them—safe.

GDPR, a Year In

May 28, 2019

It’s been a year this month since the European Union enacted the General Data Protection Regulation (GDPR). Hear from Margaret Franco, senior vice president of EMEA Marketing, Dell Technologies, as she shares her optimism around GDPR and why it is an opportunity to connect with customers on a personal level.

Four Ways Travel and Tourism Companies Are Capitalizing on Travelers’ Digital Footprints

February 27, 2019

As globetrotting becomes more accessible and popular than ever before, there’s great potential for companies to use data to anticipate traveler preferences, improve customer experiences, access untapped leads, and boost their bottom lines.

Photo by Tom Parkes on Unsplash

2019 Cybersecurity Predictions: Threats Grow as New Opportunities and Risks Emerge

January 23, 2019

Cybersecurity experts from RSA and Secureworks weigh in on the cyber threats—and—opportunities organizations will face on their digital transformation journey in 2019.

Three Key Components of a Cyber Resiliency Framework

January 10, 2019

Cybercrime is a lucrative business. Those without sufficient backups are forced to choose between paying the ransom or suffering the loss of data. When considering a cyber-resilient strategy, Eric Vanderburg, Vice President of Cybersecurity at TCDI, assets it must include these three key components.