Contributing Authors

    Protecting Sensitive Data: The Death of an SMB

    90% of small businesses lack any type of data protection for their company and customer information. Due to this lack of care, 61% of data...

    Lighting Illumination Design : Photoshop vs Lighting Design Software

    Energy is the backbone of any country’s economy. With the latest trends across the globe, economies are trying to reduce the energy consumption with...

    Shaping Smarter Cities Gateways: The Intermediary Between Sensors and the Cloud

    The Internet of Things (IoT) is becoming an indispensable part of our daily lives: Where would you be without the ability to turn on the hot...

    BitLocker in the big picture of Encryption and Compliance

    Extended support for Windows 7 is going to end in January 2020, less than 18 months away.  Many companies are of course choosing to...

    How data captured by surveillance cameras is driving actionable insights

    Whether at restaurants, ATMs, retail stores or other public spaces, surveillance cameras are not difficult to spot nowadays. These cameras are rapidly increasing in...

    What does it take to become an Automotive Electronics Engineer?

    Every engineer I know tracks NASA, its space programs and aeronautics and aerospace research, and secretly longs to work on mission-critical systems. He may have...

    2018: A Year of Change for IT Security?

    How will we look back on the state of security in 2018? We believe it will be seen as an inflection point – a...

    Not Your Mom’s Trip to the Market: Grocery Shopping Automation

    Fifty-five years ago, America and other countries around the world watched as George Jetson literally dropped his kids (in pods) off at school and...

    Is Your Data Hackproof?

    Just when the global cyber community was slowly recovering from the infamous WannaCry ransomware attacks that caused havoc across the globe last year, two...

    Trends in the Cyberattack Landscape, Security Threats and Business Impacts

    C-suite executives understand that to transform their businesses, they must embrace the integration of new technologies. Most rank improvement in information security and business...

    Non-Invasive Blood Glucose Measurement Remains Just Out of Reach

    According to the International Diabetes Federation’s 2015 report, an estimated 415 million people suffer from diabetes. That year, one person died every six seconds...

    LPWA Technologies are the Gateway to IoT Connectivity for Smart Cities in India

    Smart city trial programmes are becoming ubiquitous globally, and the connectivity infrastructure is aligning with low power wide area (LPWA) technologies to enable applications...

    How and Why Bitcoin Mining Poses Security Risks

    From 2017 to 2018, the cost of one Bitcoin increased over one thousand percent. This rapid growth dominated headlines and ignited a cryptocurrency boom that left...

    Machine Learning Algorithms for Zero Time to DDoS Attack Mitigation

    DDoS attacks are growing in complexity and volume and represent a major threat to any organization. Service providers and enterprises require expertise and knowledge...

    The 3 Dragons of Network Monitoring

    Network performance can be a beast. But the IT team that is properly prepared, with the right tools, can prevail in even the most difficult...

    Related News