Become a Mautic community contributor by testing (easily)

Hi there! Many people are asking on our communication channel Slack how to become a contributor for the Mautic community. This is the first in a series of articles which explain the different ways you can contribute to the Mautic Open Source Community. Let’s get started with testing Mautic! Testing, Continue Reading

Defining the SD-Branch

One of the most important aspects of digital transformation is that it is a continual process. And most people don’t realize that it has been underway for several years, probably beginning when organizations decided to let users have access to the internet. Since then there have been several huge transformational Continue Reading

Closing the Cybersecurity Skills Gap with Programs for Veterans

People have been talking about the cybersecurity skills gap for almost as long as they have been talking about the rise in data breaches. It’s easy to get “gap” fatigue and ignore the problem, but the facts warn against that approach. The 2018 (ISC)2 Cybersecurity Workforce Study reports that the Continue Reading

The MediaDS Bridges Live-Streaming Video Production and Delivery

May 18, 2017 by Holly Regan In traditional broadcast workflows, there were people who created content, and other people who put it over the airwaves. But the traditional model is crumbling. In the world of the internet, user-generated content, social media and subscription-based TV, a new content delivery platform must emerge. Enter Continue Reading

The Open Security Requirement in the Age of the Cloud

In a 2015 article posted by Forbes, it was reported that 87 percent of people hadn’t heard of the term “Internet of Things” (IoT). At that time, Gartner Inc. estimated that there were 4.9 billion connected devices in use. Fast forward to 2017, and Gartner now reports that number has Continue Reading

BankBot, the Prequel

For us at FortiGuard, it always sounds like a bad idea for people to share malware source code,even if it is for academic or educational purposes. For example, on GitHub we can currently find more than 300 distinct repositories of ransomware, which gives you some idea about the attention that Continue Reading

A Closer Look at the Rapid Evolution of EHR Security

More than any other database containing sensitive information for a large quantity of people, electronic health records (EHRs) are an especially attractive target for hackers. The patient data they hold can be used for financial gain, as recent reports show that stolen healthcare databases are being sold on the deep Continue Reading

Innovation Insights: Protecting A Hyperconnected World

People, things, and ideas, connected together by IoT and the cloud, are driving the new digital economy. This new hyperconnected world is not only changing how companies do business, but also how people work, live, and learn. It is changing the world at an unprecedented rate.  What does this hyperconnected Continue Reading

Public and Private Cloud Adoption – What Financial Services Need to Know

Back in 1950 the first broadly available credit card was introduced to provide people with an alternative and more convenient payment option to cash. In the late 1950s mainframe computers debuted, and by 1969 the first ATM was installed. And in 1983 the first online banking service was launched on Continue Reading

PC Locker – A New Survey Locker in the Wild

A lot of people, located around the world, have been infected with ransomware – a type of malware that encrypts computer files and demands payment to have them unlocked. Some professionally written ransomware has been so financially successful for their authors, such as Locky and Cerber, that many others have Continue Reading

>