Technology Articles
Technology. It makes the world go 'round. And whether you're a self-confessed techie or a total newbie, you'll find something to love among our hundreds of technology articles and books.Articles From Technology
page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26
page 27
page 28
page 29
page 30
page 31
page 32
page 33
page 34
page 35
page 36
page 37
page 38
page 39
page 40
page 41
page 42
page 43
page 44
page 45
page 46
page 47
page 48
page 49
page 50
page 51
page 52
page 53
page 54
page 55
page 56
page 57
page 58
page 59
page 60
page 61
page 62
page 63
page 64
page 65
page 66
page 67
page 68
page 69
page 70
page 71
page 72
page 73
page 74
page 75
page 76
page 77
page 78
page 79
page 80
page 81
page 82
page 83
page 84
page 85
page 86
page 87
page 88
page 89
page 90
page 91
page 92
page 93
page 94
page 95
page 96
page 97
page 98
page 99
page 100
page 101
page 102
page 103
page 104
page 105
page 106
page 107
page 108
page 109
page 110
page 111
page 112
page 113
page 114
page 115
page 116
page 117
page 118
page 119
page 120
page 121
page 122
page 123
page 124
page 125
page 126
page 127
page 128
page 129
page 130
page 131
page 132
page 133
page 134
page 135
page 136
page 137
page 138
page 139
page 140
page 141
page 142
page 143
page 144
page 145
page 146
page 147
page 148
page 149
page 150
page 151
page 152
page 153
page 154
page 155
page 156
page 157
page 158
page 159
page 160
page 161
page 162
page 163
page 164
page 165
page 166
page 167
page 168
page 169
page 170
page 171
page 172
page 173
page 174
page 175
page 176
page 177
page 178
page 179
page 180
page 181
page 182
page 183
page 184
page 185
page 186
page 187
page 188
page 189
page 190
page 191
page 192
page 193
page 194
page 195
page 196
page 197
page 198
page 199
page 200
page 201
page 202
page 203
page 204
page 205
page 206
page 207
page 208
page 209
page 210
page 211
page 212
page 213
page 214
page 215
page 216
page 217
page 218
page 219
page 220
page 221
page 222
page 223
page 224
page 225
page 226
page 227
page 228
page 229
page 230
page 231
page 232
page 233
page 234
page 235
page 236
page 237
page 238
page 239
page 240
page 241
page 242
page 243
page 244
page 245
page 246
page 247
page 248
page 249
page 250
page 251
page 252
page 253
page 254
page 255
page 256
page 257
page 258
page 259
page 260
page 261
page 262
page 263
page 264
page 265
page 266
page 267
page 268
page 269
page 270
page 271
page 272
page 273
page 274
page 275
page 276
page 277
page 278
page 279
page 280
page 281
page 282
page 283
page 284
page 285
page 286
page 287
page 288
page 289
page 290
page 291
page 292
page 293
page 294
page 295
page 296
page 297
page 298
page 299
page 300
page 301
page 302
page 303
page 304
page 305
page 306
page 307
page 308
page 309
page 310
page 311
page 312
page 313
page 314
page 315
page 316
page 317
page 318
page 319
page 320
page 321
page 322
page 323
page 324
page 325
page 326
page 327
page 328
page 329
page 330
page 331
page 332
page 333
page 334
page 335
page 336
page 337
page 338
page 339
page 340
page 341
page 342
page 343
page 344
page 345
page 346
page 347
page 348
page 349
page 350
page 351
page 352
page 353
page 354
page 355
page 356
page 357
page 358
page 359
page 360
page 361
page 362
page 363
page 364
page 365
page 366
page 367
page 368
page 369
page 370
page 371
page 372
page 373
page 374
page 375
page 376
page 377
page 378
page 379
page 380
page 381
page 382
page 383
page 384
page 385
page 386
page 387
page 388
page 389
page 390
page 391
page 392
page 393
page 394
page 395
page 396
page 397
page 398
page 399
page 400
page 401
page 402
page 403
page 404
page 405
page 406
page 407
page 408
page 409
page 410
page 411
page 412
page 413
page 414
page 415
page 416
page 417
page 418
page 419
page 420
page 421
page 422
page 423
page 424
page 425
page 426
page 427
page 428
page 429
page 430
page 431
page 432
page 433
page 434
page 435
page 436
page 437
page 438
page 439
page 440
page 441
page 442
page 443
page 444
page 445
page 446
page 447
page 448
page 449
page 450
page 451
page 452
page 453
page 454
page 455
page 456
page 457
page 458
page 459
page 460
page 461
page 462
page 463
page 464
page 465
page 466
page 467
page 468
page 469
page 470
page 471
page 472
page 473
page 474
page 475
page 476
page 477
page 478
page 479
page 480
page 481
page 482
page 483
page 484
page 485
page 486
page 487
page 488
page 489
page 490
page 491
page 492
page 493
page 494
page 495
page 496
page 497
page 498
page 499
page 500
page 501
page 502
page 503
page 504
page 505
page 506
page 507
page 508
page 509
page 510
page 511
page 512
page 513
page 514
page 515
page 516
page 517
page 518
page 519
page 520
page 521
page 522
page 523
page 524
page 525
page 526
page 527
page 528
page 529
page 530
page 531
page 532
page 533
page 534
page 535
page 536
page 537
page 538
page 539
page 540
page 541
page 542
page 543
page 544
page 545
page 546
page 547
page 548
page 549
page 550
page 551
page 552
page 553
page 554
page 555
page 556
page 557
page 558
page 559
page 560
page 561
page 562
page 563
page 564
page 565
page 566
page 567
page 568
page 569
page 570
page 571
page 572
page 573
page 574
page 575
page 576
page 577
page 578
page 579
page 580
page 581
page 582
page 583
page 584
page 585
page 586
page 587
page 588
page 589
page 590
page 591
page 592
page 593
page 594
page 595
page 596
page 597
page 598
page 599
page 600
page 601
page 602
page 603
page 604
page 605
page 606
page 607
page 608
page 609
page 610
page 611
page 612
page 613
page 614
page 615
page 616
page 617
page 618
page 619
page 620
page 621
page 622
page 623
page 624
page 625
page 626
page 627
page 628
page 629
page 630
page 631
page 632
page 633
page 634
page 635
page 636
page 637
page 638
page 639
page 640
page 641
page 642
page 643
page 644
page 645
page 646
page 647
page 648
page 649
page 650
page 651
page 652
page 653
page 654
page 655
page 656
page 657
page 658
page 659
page 660
page 661
page 662
page 663
page 664
page 665
page 666
page 667
page 668
page 669
page 670
page 671
page 672
page 673
page 674
page 675
page 676
page 677
page 678
page 679
page 680
page 681
page 682
page 683
page 684
page 685
page 686
page 687
page 688
page 689
page 690
page 691
page 692
page 693
page 694
page 695
page 696
page 697
page 698
page 699
page 700
page 701
page 702
page 703
page 704
page 705
page 706
page 707
page 708
page 709
page 710
page 711
page 712
page 713
page 714
page 715
page 716
page 717
page 718
page 719
page 720
page 721
page 722
page 723
page 724
page 725
page 726
page 727
page 728
page 729
page 730
page 731
page 732
page 733
page 734
page 735
page 736
page 737
page 738
page 739
page 740
page 741
page 742
page 743
page 744
page 745
page 746
page 747
page 748
page 749
page 750
page 751
page 752
page 753
page 754
page 755
page 756
page 757
page 758
page 759
page 760
page 761
page 762
page 763
page 764
page 765
page 766
page 767
page 768
page 769
page 770
page 771
page 772
page 773
page 774
page 775
page 776
page 777
page 778
page 779
page 780
page 781
page 782
page 783
page 784
page 785
page 786
page 787
page 788
page 789
page 790
page 791
page 792
page 793
page 794
page 795
page 796
page 797
page 798
page 799
page 800
page 801
page 802
page 803
page 804
page 805
page 806
page 807
page 808
page 809
page 810
page 811
page 812
page 813
page 814
page 815
page 816
page 817
page 818
page 819
page 820
page 821
page 822
page 823
page 824
page 825
page 826
page 827
page 828
page 829
page 830
page 831
page 832
page 833
page 834
page 835
page 836
page 837
page 838
page 839
page 840
page 841
page 842
page 843
page 844
page 845
page 846
page 847
page 848
page 849
page 850
page 851
page 852
page 853
page 854
page 855
page 856
page 857
page 858
page 859
page 860
page 861
page 862
page 863
page 864
page 865
page 866
page 867
page 868
page 869
page 870
page 871
page 872
page 873
page 874
page 875
page 876
page 877
page 878
page 879
page 880
page 881
page 882
page 883
page 884
page 885
page 886
page 887
page 888
page 889
page 890
page 891
page 892
page 893
page 894
page 895
page 896
page 897
page 898
page 899
page 900
page 901
page 902
page 903
page 904
page 905
page 906
page 907
page 908
page 909
page 910
page 911
page 912
page 913
page 914
page 915
page 916
page 917
page 918
page 919
page 920
page 921
page 922
page 923
page 924
page 925
page 926
page 927
page 928
page 929
page 930
page 931
page 932
page 933
page 934
page 935
page 936
page 937
page 938
page 939
page 940
page 941
page 942
Filter Results
9,412 results
9,412 results
AI Coding with AI For Dummies Cheat Sheet Cheat Sheet / Updated 03-19-2024 Generative AI coding tools can improve your productivity as a coder, remind you about syntax, and even help you with testing, debugging, refactoring, and documentation, but it's up to you to know how to use them correctly. Get ten prompt engineering tips that can make the difference between AI spitting out garbage spaghetti code and crafting elegant code that works.
AI coding tools present unique challenges and hazards for software development teams, so check out some simple rules to make sure that generative AI doesn't tank your project. Then see what happened when ChatGPT was asked to list the top things human coders do that AI can never replace. View Cheat Sheet
Cybersecurity Nine Ways to Protect Against Advanced Email Threats Article / Updated 03-12-2024 Advanced email threats use a wide range of methods to attack company security, including sophisticated technology and an in-depth understanding of the weak points in the way that email recipients and senders communicate. To fight them, companies need to use tools including threat detection, threat hunting, and extended detection and response (XDR) technology.
Here are ten things you can use to protect against advanced email threats.
Use secure email threat defense
Use a comprehensive email security solution to detect quickly and respond effectively. Look for an email defense system that automatically and reliably does many of the things that you might wish users would do consistently, such as:
Assess the sender’s reputation
Asses the reputation of the email’s source URL
Scan content for concerning words and phrases
Scan file attachments and analyze their reputation and content
Spot and block spam
Optimize your defenses against major email threats
You can scan the horizon for current threats and note what threats are being blocked — or causing breaches — at your organization. You can then respond by working with your vendor; working with your email provider; training your security personnel and end users; educating upper management; and many more steps.
Use AI to understand and categorize threats
You can use AI to identify patterns that serve as indicators of an attack. These patterns are often so subtle that attackers aren’t aware of the breadcrumbs they’re leaving as they put together attempts at exploits. AI can spot these patterns before the bad actors do.
Use threat data to inform and expedite your response
Before a threat arrives, you can know:
What the recent patterns of threats look like
The signatures left by different kinds of threats
What attacks are leading to successful breaches
The best response to each different kind of breach
By using threat data, you help yourself at every step of the “funnel” of security breaches: reducing the number of attacks that reach user inboxes, reducing the impact when a malicious email is opened or a toxic file attachment is downloaded, and responding quickly and effectively to the remaining breaches that do occur.
Act quickly to ensure maximum protection against threats
By acting automatically against many threats, and by providing alerts and information about the threats that do appear, the best email security solutions give you a precious gift in responding to any remaining breaches: time.
With a solution in place, your best people are empowered to respond quickly and effectively to the breaches that do occur, while directing their focus to strategic efforts such as studying the breach, understanding how it occurred, and taking the steps needed to prevent a recurrence.
Unify visibility across control points
Look for a security provider that helps you unify visibility across multiple control points so you can, for instance, tie the damage that’s occurring from a successful breach to the original gaps in your defenses that allowed it to occur. You can then “mind the gap” and prevent the problem from recurring in the future.
Embrace automated tools to maximize resources
Automated tools save your people’s time and focus for the largest potential threats. These tools also allow your team to find a solution and then “set it and forget it,” using the automated tools to prevent the same problem from happening again.
Detect sooner, respond faster
You can’t solve a problem you don’t know you have — and most cybersecurity breaches get worse the longer it takes you to respond. Effective security solutions buy you time, removing some threats and giving you early notice of others.
Getting started
Visit Cisco.com and download your free copy of Advanced Email Threats For Dummies to learn more about advanced email threats. View Article
Cybersecurity Takeaways about Extended Detection and Response (XDR) Article / Updated 03-11-2024 What is XDR? It’s a recent addition to the swarm of acronyms bouncing around the business technology space. XDR platforms include tools for incident response, threat hunting, automation, threat detection, visualization, threat management, and more. What brings it all together is a centralized viewpoint of your entire security infrastructure.
Here are ten things you need to know about XDR including some key features to look for when shopping for an XDR solution.
Reduce time to detect and respond
At the end of the day, XDR platforms aim to reduce detection and response times. More data and more tools don’t mean faster security teams. They often mean overwhelmed security teams. XDR focuses on providing actionable information through machine learning-supported analytics and a centralized dashboard. On the response side, orchestration and automation features streamline the response process by providing easy-to-use and customizable tools for security staff.
Visualize integrated security data
XDR takes in a lot of information and must organize it to reduce alert fatigue, false positives, and general security operations hassle. Central dashboards are customizable information hubs for security teams to organize their data to fit the organization’s needs. Visualization tools such as incident maps should help identify threat sources and trace potentially new attack points.
Precise monitoring
Because XDR platforms usually come with machine learning-based analytics, and rely on secondary security tools for data collection, security teams should have a clear view of an organization’s ecosystem. Providing good information, rather than lots of information, cleans up what staff actually see, making it easier to focus on legitimate security concerns.
Contextualize alerts and reduce false positives
XDR’s centralized dashboard features provide context to security situations. Alerts coming in are more reliable because the XDR system has the relevant threat intelligence required to make decisions about what is concerning, abnormal behavior and what isn’t.
False positives are a waste of resources, and XDR’s comprehensive view of the IT infrastructure helps reduce their frequency.
Automated responses
Automation features have been around in the security space for some time, but XDR’s broad reach enables its automation tools to benefit from some fine-tuning. Many XDR products offer machine learning-supported automation that can take care of rote security tasks, so security staff can work on the harder jobs that need human intervention.
Keep it open
XDR isn’t a lone wolf and needs the support of specialized security tools. XDR platforms offer a lot of integration options, both with existing security tools and ones that may be added in the future.
Endpoint detection and response (EDR) and network detection and response (NDR) in particular are two tools to think about including when building out your security infrastructure.
Store and analyze logs at scale
Because of the powerful analytics tools XDR brings in, these platforms are able to process large amounts of security data. XDR solutions are easily scalable so your organization can grow over time, without worrying how your security analytics will have to change.
Address compliance requirements
The large amount of data that can be processed by XDR also means compliance and industry regulation requirements can be confidently met. Organizations involved in healthcare or finance are especially in need of extensive logging and analysis tools.
Siloed solutions are partial solutions
Security infrastructure has become so vast that siloing systems has become common. Enterprise-level IT infrastructure can’t rely on this separation of systems, as attackers expand and develop their attack strategies. Incomplete security information can lead to false positives and alert fatigue, because monitoring tools won’t have the full context of suspicious activity.
Remember the human factors
The security personnel managing these tools are the most important part of any successful IT security environment. Inefficient security solutions overwork security staff by burdening them with false positive threats, unnecessary alerts that lead to alert fatigue, and lackluster identification and response tools that slow them down.
Getting started
Visit Cisco.com and download your free copy of Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition to learn more about topic. View Article
Cybersecurity Risk-Based Cybersecurity with Managed Detection and Response (MDR) Article / Updated 02-15-2024 What is MDR?
Managed detection and response (MDR) is more a security service than it is a security tool. The words “detection and response” sound like the most important part of the acronym, and those are the meat and potatoes of any good security infrastructure, but what sets MDR apart is how the solution is managed.
MDR service providers offer businesses access to in-house security experts who monitor, alert, investigate, create response plans, and more. MDR providers’ detection and response tools are integrated into an existing IT infrastructure so the security pros can detect and respond to security threats.
MDR solutions are for small to midsize organizations that can’t support a full staff of security operations employees and larger organizations that wish to supplement their existing security solutions. MDR is a strong option for many organizations, but it’s important to remember that not all MDRs are created equal. At their core, MDR solutions offer integrated security tools monitored and managed by the provider’s security professionals, but there can be key differences among solutions.
For instance, it’s wise to select a vendor that uses the latest technologies, partners with you, and provides consulting and technical support, such as digital forensics and incident response (DFIR) services.
A risk-based approach to cybersecurity
A risk-based approach to cybersecurity is a key differentiator in the MDR market. Companies that use risk-based cybersecurity stop three times more attacks, find more than 50 percent of incidents within one day, and see impactful breaches reduced from 76 to 28 percent, according to an Accenture cybersecurity report.
To make these security options more accessible to small and midsize companies, a true risk-based, consultative approach to cybersecurity is recommended. A partnership between the client and the MDR vendor allows smaller organizations to protect themselves from the onslaught of cyberattacks, vulnerabilities, and risks without hiring an internal security team. A risk-based approach enables clients to tap into end-to-end solutions with a team of skilled, innovative professionals enabled by technology, automation, and advanced analytics to meet individual client organization needs.
Humans are the key
Just as humans are the driving force behind today’s security threats, they’re also behind the best security solutions for combating them. This humans-first approach to MDR integrates human intervention and problem-solving into almost every step of the threat response life cycle.
A truly successful MDR service must combine the intelligence and creativity of human minds with powerful security technology. An example of this philosophy in action is the thousands of alerts that security information and event management (SIEM) systems can produce. Security experts must sift through them so alert fatigue and false negatives don’t impact security operations. Accessibility to analysts for questions and updates is important because two-way conversations and real relationships build a strong cybersecurity program.
Consultative approach
A consultative approach to security provides access to experienced security practitioners. Look for an MDR that is with you throughout your journey to partner with you and design a program that focuses on your specific cybersecurity and compliance needs today, with the built-in capability to evolve your program as the cybersecurity landscape changes and as your needs and priorities change.
Access to security professionals provided by MDR services helps overcome security challenges. A select few MDR service providers offer risk assessments and penetration testing and have teams of people who know how to navigate compliance and regulation issues.
Look for an MDR partner whose business is built on the risk-based consultative approach for clients, enabling them to provide end-to-end solutions with a team of skilled, innovative professionals enabled by technology, automation, and advanced analytics to meet individual client organization needs.
Getting started
Visit Pondurance.com and download your free copy of Managed Detection & Response (MDR) For Dummies to learn more about MDR. View Article
Cloud Computing Your Business Performance Can Soar with Enterprise Automation Article / Updated 01-26-2024 In this article you will learn:
What enterprise automation is
Why you should implement enterprise automation
How enterprise automation will impact businesses in the future
What is enterprise automation?
Enterprise automation increases efficiency by replacing repetitive, manual, and error-prone business processes with intelligent, automated, and more reliable workflows. Enterprise automation is an ongoing and strategic driver of the digital business landscape that seamlessly connects data, applications, and services with people and their organizations.
With enterprise automation, companies remove bottlenecks, improve and accelerate the flow of data, empower IT resources with better productivity, and give non-IT business groups the ability to easily self-serve their data needs – across their enterprise.
Why enterprise automation?
Think about the IT and organizational challenges you face today.
You’re experiencing poor agility in certain areas. Meanwhile, the rapid pace of business requires digitalization, cloud adoption, and quick responsiveness. This situation is exactly what you want to aspire to; however, your business processes are sluggish and suffering where data silos persist. Collaboration between teams is more difficult than it should be.
Not only is business moving quickly, but the pace of innovation is increasing as well. Your project leaders, your customers, your internal business partners, and your employee expectations are ever increasing. This forces your organization to be more innovative and try new things as you seek to become faster and more efficient.
Competitors in your landscape aren’t sitting still. You need to leverage and exploit all the data you can across your enterprise — operational systems, functional applications, and multiple channels of data. All must be harnessed to survive, thrive, and excel in a competitive landscape and to take corporate intelligence to the next level.
You recognize that to be agile and responsive, and to achieve these aspirations, you need solutions to be agile and responsive and capable of connecting your entire enterprise, end-to-end.
That is what enterprise automation is all about and the inspiration behind Enterprise Automation For Dummies, sponsored by SnapLogic.
The future is enterprise automation
Enterprise automation done well uniquely combines data integration, app-to-app integration, and API development and management for API-led integrations and delivery of data services. And, it doesn’t have to be complicated. Easy-to-use, event-driven platforms, augmented with graphical (low-code and no-code) user interfaces and AI-assistance, enables you to get up and running sooner to remove manual burdens and automate business processes.
To learn more, download Enterprise Automation For Dummies to gain knowledge of integration principles and pick up insights on how to automate and orchestrate data across your enterprise and empower people. Enterprise Automation For Dummies includes case studies with summaries and achieved success metrics.
Download Enterprise Automation For Dummies today and chart your future. View Article
WordPress WordPress All-in-One For Dummies Cheat Sheet Cheat Sheet / Updated 01-18-2024 Tailor your blog with WordPress software, whether you're writing, editing, or publishing WordPress site content. An understanding of WordPress's dashboard controls and of the types of content available to you helps you get the most out of your website. Also, when all else fails, it's good to know where you can turn to for help with WordPress. View Cheat Sheet
Cybersecurity Data Security Posture Management (DSPM) For Dummies Article / Updated 01-16-2024 In this article you will learn:
what DSPM is
why you need DSPM
what you can do with DSPM
ten must-have capabilities to look for in a DSPM solution
how to get started with DSPM
Data is the lifeblood of modern business and data security in the cloud is top of mind for organizations everywhere. Data security posture management (DSPM) solutions address the need for an automated, scalable, and agile system across the full data security lifecycle — from discovery, classification, cataloging, and risk prioritization to access control, policy enforcement, remediation, and real-time monitoring. This helps organizations reduce risks and costs associated with cloud data security while improving their overall cybersecurity posture.
What is DSPM?
Data security posture management empowers organizations to implement a data-centric security strategy by first providing an accurate inventory of their sensitive data and identifying where it violates data security policies, thereby enhancing overall data security posture.
A data-centric security strategy emphasizes the importance of protecting your valuable data rather than focusing on systems and infrastructure.
Key capabilities in a DSPM solution include the following:
Global data visibility provides organizations with a comprehensive view of their sensitive data. This involves identifying the location and type of sensitive data to ensure proper protection measures are in place. All clouds — including infrastructure-as-a-service (IaaS), platform-as-service (PaaS), and software-as-a-service (SaaS) resources — need to be covered. The appropriate data owners must also be identified, to facilitate efficient communication of any data-related security or privacy issues.
Data hygiene is about keeping your data clean and healthy. It encompasses various actions that help organizations maintain clean and organized data in accordance with their data governance framework. This includes addressing and remediating misplaced, redundant, and obsolete data to streamline maintenance, optimize storage resources, and reduce potential security risks. Purging outdated or irrelevant data is another essential part of good data hygiene, resulting in the retention of only accurate and useful data.
Data security risk control involves immediately detecting and proactively remediating data risk factors to prevent data breaches. This capability detects and addresses three key data postures:
Overexposed data, such as public read access, or permissive access rights, which should be identified and mitigated to reduce the likelihood of unauthorized access or data breaches
Underprotected data, where there are missing controls like encryption, masking, or proper retention policies
Misplaced data, such as cardholder data subject to the Payment Card Industry Data Security Standards (PCI DSS) in an unauthorized environment or PII data in a development environment
Data access governance manages and controls access to sensitive data. This involves:
Identifying all internal and external users, roles, and resources with access to sensitive data
Monitoring and controlling access patterns based on their roles and responsibilities
Ensuring that only authorized users have access to sensitive assets
Regularly reviewing and updating access permissions based on actual usage
Privacy and compliance ensure that organizations adhere to data privacy regulations and industry standards, and make audits more manageable (and perhaps a little less painful and costly). Providing objective evidence for audits can be challenging, but having reporting from DSPM that shows you know where your data is and understand that its security posture can significantly ease compliance.
Why do you need DSPM?
For modern enterprises, data is fuel for innovation. These companies understand that data is a key asset and a source of competitive differentiation. They democratize data to unleash its full potential and make it accessible for application developers, data scientists, and business users. However, as data proliferates, security doesn’t travel with it — and adding the pace of change to the sprawl of cloud technology means that data security teams just can’t keep up. Malicious actors constantly target this new threat vector — the “innovation attack surface” — which has emerged as a result of several key trends:
Cloud transformation and data democratization: The cloud has enabled widespread data democratization, enabling easy access to data for developers, data scientists, and business users to support their innovation efforts. However, this freedom to access and use data without oversight creates unknown, unmanaged, and unprotected cloud data sources.
Technology sprawl and complexity: In the public cloud, each cloud service is configured and used differently, and each introduces new and unique risks. The ever-changing architectures are confusing and complex, and if you’re not careful, this can lead to some costly and even devastating mistakes with sensitive data stored in the cloud.
Cloud data proliferation: Nearly half of all data (48 percent) is stored in the public cloud today, and it’s only increasing, according to the Flexera 2022 State of the Cloud Report. Unfortunately, traditional data security controls are unable to keep up with the dynamic movement of data, so they must be configured from scratch every time data is created, copied, shared, or moved.
Death of the traditional perimeter: One of the many benefits of the cloud is that it is accessible from anywhere. Thus, the notion of a network perimeter — an on-premises data center protected by a firewall — has all but disappeared. The lack of a single choke point (a firewall) means sensitive data is exposed by design because anyone can access it from anywhere with the proper credentials (whether authorized or stolen).
Faster rate of change: Release cycles now happen in weeks, days, and hours rather than months and years. Unfortunately, security teams are usually not on that same quick schedule and still rely on slower manual approaches.
The changing role of security: In cloud computing, data security teams must evolve to securely enable the business rather than just slowing everyone down or letting risk grow exponentially. Data security in cloud computing must focus on protecting data from breaches and compromises while also empowering users to be productive.
What can you do with DSPM?
Data security, governance, and privacy teams can use DSPM to help keep their organization secure and compliant. Some common use cases for DSPM include the following:
Automating data discovery and classification: DSPM helps organizations automatically and continuously discover, classify, and categorize all of their known and unknown data — including sensitive, proprietary, regulated, abandoned, and shadow data — across multicloud environments, such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Snowflake, Microsoft 365, and more.
Enforcing data security policies automatically: DPSM automatically enforces data security policies at scale for all of your data as it travels through the cloud. DSPM converts data policies into specific technical configurations and shows where data security policies are violated. It also prioritizes issues for resolution and helps you fix those issues with clear, specific technical remediation instructions.
Controlling data exposure: As data rapidly proliferates in the cloud, security does not follow that data, often leading to crucial business data being exposed. DSPM pinpoints all of your exposed sensitive data that can lead to data breaches, ransomware attacks, and noncompliance penalties — whether it’s misplaced data (for example, sensitive data mistakenly stored in public buckets), misconfigured controls (for example, third-party access granted to sensitive data), or overly permissive access.
Controlling datacentric environment segmentation: DSPM helps you segment your cloud environments and apply location controls to comply with security and regulatory requirements. You can detect and receive alerts when sensitive or regulated data is placed in untrusted and/or unauthorized environments, review violations, and take action to remove the data or authorize the new environment.
Complying with data privacy and compliance frameworks: DSPM streamlines evidence collection for internal and external privacy and governance stakeholders through autonomous data discovery and classification of your sensitive and regulated data. A DSPM data policy engine continuously enforces regulatory compliance and standards requirements for data, regardless of the underlying technology or location.
Ten must-have capabilities to look for in a DSPM solution
When considering a DSPM solution for your organization, be sure to select one with the following important capabilities and features:
Autonomous: Automatically discover unknown, new, and modified data stores across all of your clouds — without needing credentials or manual configuration.
Continuous: Change is constant — especially in the public cloud — so your DSPM solution must be able to continuously monitor your environment for changes and automatically scan new cloud accounts, new data stores, and new data added to existing data stores.
Secure by design: Look for a solution that doesn’t extract data from your environment. Your DSPM should use the cloud service provider’s (CSP) application programming interface (API) and ephemeral serverless functions in your cloud account to scan your data.
Breadth and depth of coverage: Whether you’re using Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), Snowflake, Microsoft 365, or practically any combination of various cloud database, storage services, or software as a service (SaaS) apps, you need a single and consistent view of your data across clouds, geographies, and organizational boundaries to evaluate the risk to your data across all clouds.
Intelligent classification: Look for a solution that utilizes multistep contextual analysis to automatically identify sensitive data with low false positive (FP) and false negative (FN) rates. The solution should also include hundreds of predefined classification rules, data validators, and classification algorithms that extract the data insights you need without having to locate the data owner.
Extensive set of built-in datacentric policies: Look for a solution that provides out-of-the-box datacentric policies for common use cases like data security, proper governance, and privacy.
Customization features: You need a solution with robust customization features that are flexible and powerful enough to match your data taxonomy and address any unique requirements your organization may have such as sensitivity levels/definitions, data types, and custom industry policies.
Guided remediation: Look for a solution that provides a full analysis of why a security or compliance violation exists, evidence of its existence, and technical recommendations on how to fix it based on policy and environment.
Simple and quick deployment process: Your DSPM solution should be agentless and connectorless to simplify and accelerate the deployment process. Look for a solution that can be deployed in minutes and delivers time-to-value in a few days.
Easy integration with your ecosystem: Look for a DSPM solution with extensive integrations that include third-party systems such as IT service management (ITSM), security information and event management (SIEM), cloud security posture management (CSPM), extended detection and response (XDR), and data catalogs.
Getting started
Visit laminarsecurity.com to learn more. Download your free copy of Data Security Posture Management For Dummies to learn more about how DSPM enables organizations to harness the power of cloud data securely and efficiently. View Article
General Programming & Web Design Web Coding and Development All-in-One For Dummies Cheat Sheet Cheat Sheet / Updated 01-05-2024 One of the handiest features of web coding and development is that once you’ve learned a few basics, you can apply those basics to any project. A good example is the underlying structure of a page, which uses the same set of standard HTML tags, no matter how large or small the project. It’s also worth your time to learn how selectors work, because you use them to save you time both when you’re writing CSS rules and when you’re writing JavaScript code. Errors, too, are a fact of web coding life, so understanding the most common errors can help you debug your code faster and get back to more creative pursuits. View Cheat Sheet
General AI Five Ways Machine Health Delivers Real Business Value Article / Updated 12-05-2023 We depend on machines to produce everyday essentials — such as power, food, and medicine — and to support nearly every aspect of society. Thus, machine health is vital to overall manufacturing and business health. Machine health transforms reliability, maintenance, operations, and asset performance management by using artificial intelligence (AI) and Internet of Things (IoT) technologies to improve performance, reduce downtime, and help manufacturers reach Industry 4.0 standards.
Transform the way you work
In an era of labor shortages and technology innovation, manufacturing needs to move faster toward digitization. Using AI in manufacturing, companies can eliminate repetitive tasks, reduce inefficiencies, and strengthen data-driven decision making. With insights into the real-time condition of their machines, workers can break away from traditional maintenance schedules and manual tasks. This means more time for proactive work and collaboration with other departments, which leads to stronger cross-functional teams. It also leads to further innovations, such as process optimization. When employees have insights into the health of their machines, they can predict their workdays and own their schedules, opening up new opportunities for innovation and engagement.
Learn more about transforming the way you work with machine health at www.augury.com/use-cases/business-goal/transform-the-way-you-work.
Eliminate unnecessary downtime
Unplanned downtime can be expensive. There’s the cost of the repairs themselves, lost production and sales, and reputational damage. Maintenance and reliability teams often have to scramble to diagnose and fix the problem as quickly as possible — often resulting in overtime pay and expedited shipping costs for emergency spare parts. Sudden and catastrophic machine failures can also harm worker morale and jeopardize worker safety. Thus, reducing unnecessary downtime has a significant impact on both your top and bottom lines.
Learn more about eliminating unnecessary downtime with machine health at www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime.
Reduce loss, waste, and emissions
Reducing waste to improve sustainability has become a top priority for manufacturers for cost-cutting/efficiency purposes, as well as to promote a healthier planet. Healthy machines can run at capacity and with less downtime, leading to less waste and more efficient energy use. An industry study by the Electric Power Research Institute (EPRI) found that optimizing the performance of rotating assets — which account for approximately 54 percent of U.S. industrial electricity consumption — can reduce energy consumption by 12 to 15 percent.
Learn more about reducing loss, waste, and emissions with machine health at www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions.
Maximize yield and capacity
Real-time machine health insights allow maintenance teams to adjust shutdown schedules based on the current condition of the machine, its history, and the recommendations of experts. In the longer-term, machine health minimizes unplanned downtime by improving the health of your machines, reduces planned downtime by deferring nonessential maintenance activities, and can increase output on production lines with healthier machines running optimally.
Learn more about maximizing yield and capacity with machine health at www.augury.com/use-cases/business-goal/maximize-yield-and-capacity.
Optimize asset care
When it comes to asset care — from acquiring and storing parts to managing maintenance resources — manufacturers have traditionally taken a more preventive than predictive approach: Machines are serviced on fixed schedules, regardless of whether or not they need maintenance. Many manufacturers keep spare parts for critical machine assets in inventory because calendar-based maintenance dictates when parts should be replaced — whether or not replacement is needed. The alternative is overspending to get parts on short notice and expensive downtime while you wait for the parts to arrive. Whether hoarding parts or paying more for last-minute parts, both methods are inefficient and costly. Machine health empowers you to control how you spend time and money based on the real-time condition of your machine assets.
Learn more about optimizing asset care with machine health at www.augury.com/use-cases/business-goal/optimize-asset-care.
Start building a winning machine health culture
Machine health can transform operations for every manufacturer. Get your free copy of Machine Health For Dummies at //www.augury.com/machinehealthfordummies/.
How much will you save with Augury Machine Health? Use the ROI calculator at www.augury.com/value-calculator/ to see how much time and money you can save with Augury’s Machine Health.
View Article
Analytics Adobe Analytics For Dummies Cheat Sheet Cheat Sheet / Updated 12-03-2023 Adobe Analytics is the most powerful tool available for analyzing digital consumer data, but it’s easier to grasp if you know where to start. Master the most basic and widely applicable features in the easiest way. Get details on two standard calculated metrics in the analytics industry that focus on analyzing engagement on your site, app, or other digital property. Discover several tips to improve your productivity in Analysis Workspace. View Cheat Sheet
page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26
page 27
page 28
page 29
page 30
page 31
page 32
page 33
page 34
page 35
page 36
page 37
page 38
page 39
page 40
page 41
page 42
page 43
page 44
page 45
page 46
page 47
page 48
page 49
page 50
page 51
page 52
page 53
page 54
page 55
page 56
page 57
page 58
page 59
page 60
page 61
page 62
page 63
page 64
page 65
page 66
page 67
page 68
page 69
page 70
page 71
page 72
page 73
page 74
page 75
page 76
page 77
page 78
page 79
page 80
page 81
page 82
page 83
page 84
page 85
page 86
page 87
page 88
page 89
page 90
page 91
page 92
page 93
page 94
page 95
page 96
page 97
page 98
page 99
page 100
page 101
page 102
page 103
page 104
page 105
page 106
page 107
page 108
page 109
page 110
page 111
page 112
page 113
page 114
page 115
page 116
page 117
page 118
page 119
page 120
page 121
page 122
page 123
page 124
page 125
page 126
page 127
page 128
page 129
page 130
page 131
page 132
page 133
page 134
page 135
page 136
page 137
page 138
page 139
page 140
page 141
page 142
page 143
page 144
page 145
page 146
page 147
page 148
page 149
page 150
page 151
page 152
page 153
page 154
page 155
page 156
page 157
page 158
page 159
page 160
page 161
page 162
page 163
page 164
page 165
page 166
page 167
page 168
page 169
page 170
page 171
page 172
page 173
page 174
page 175
page 176
page 177
page 178
page 179
page 180
page 181
page 182
page 183
page 184
page 185
page 186
page 187
page 188
page 189
page 190
page 191
page 192
page 193
page 194
page 195
page 196
page 197
page 198
page 199
page 200
page 201
page 202
page 203
page 204
page 205
page 206
page 207
page 208
page 209
page 210
page 211
page 212
page 213
page 214
page 215
page 216
page 217
page 218
page 219
page 220
page 221
page 222
page 223
page 224
page 225
page 226
page 227
page 228
page 229
page 230
page 231
page 232
page 233
page 234
page 235
page 236
page 237
page 238
page 239
page 240
page 241
page 242
page 243
page 244
page 245
page 246
page 247
page 248
page 249
page 250
page 251
page 252
page 253
page 254
page 255
page 256
page 257
page 258
page 259
page 260
page 261
page 262
page 263
page 264
page 265
page 266
page 267
page 268
page 269
page 270
page 271
page 272
page 273
page 274
page 275
page 276
page 277
page 278
page 279
page 280
page 281
page 282
page 283
page 284
page 285
page 286
page 287
page 288
page 289
page 290
page 291
page 292
page 293
page 294
page 295
page 296
page 297
page 298
page 299
page 300
page 301
page 302
page 303
page 304
page 305
page 306
page 307
page 308
page 309
page 310
page 311
page 312
page 313
page 314
page 315
page 316
page 317
page 318
page 319
page 320
page 321
page 322
page 323
page 324
page 325
page 326
page 327
page 328
page 329
page 330
page 331
page 332
page 333
page 334
page 335
page 336
page 337
page 338
page 339
page 340
page 341
page 342
page 343
page 344
page 345
page 346
page 347
page 348
page 349
page 350
page 351
page 352
page 353
page 354
page 355
page 356
page 357
page 358
page 359
page 360
page 361
page 362
page 363
page 364
page 365
page 366
page 367
page 368
page 369
page 370
page 371
page 372
page 373
page 374
page 375
page 376
page 377
page 378
page 379
page 380
page 381
page 382
page 383
page 384
page 385
page 386
page 387
page 388
page 389
page 390
page 391
page 392
page 393
page 394
page 395
page 396
page 397
page 398
page 399
page 400
page 401
page 402
page 403
page 404
page 405
page 406
page 407
page 408
page 409
page 410
page 411
page 412
page 413
page 414
page 415
page 416
page 417
page 418
page 419
page 420
page 421
page 422
page 423
page 424
page 425
page 426
page 427
page 428
page 429
page 430
page 431
page 432
page 433
page 434
page 435
page 436
page 437
page 438
page 439
page 440
page 441
page 442
page 443
page 444
page 445
page 446
page 447
page 448
page 449
page 450
page 451
page 452
page 453
page 454
page 455
page 456
page 457
page 458
page 459
page 460
page 461
page 462
page 463
page 464
page 465
page 466
page 467
page 468
page 469
page 470
page 471
page 472
page 473
page 474
page 475
page 476
page 477
page 478
page 479
page 480
page 481
page 482
page 483
page 484
page 485
page 486
page 487
page 488
page 489
page 490
page 491
page 492
page 493
page 494
page 495
page 496
page 497
page 498
page 499
page 500
page 501
page 502
page 503
page 504
page 505
page 506
page 507
page 508
page 509
page 510
page 511
page 512
page 513
page 514
page 515
page 516
page 517
page 518
page 519
page 520
page 521
page 522
page 523
page 524
page 525
page 526
page 527
page 528
page 529
page 530
page 531
page 532
page 533
page 534
page 535
page 536
page 537
page 538
page 539
page 540
page 541
page 542
page 543
page 544
page 545
page 546
page 547
page 548
page 549
page 550
page 551
page 552
page 553
page 554
page 555
page 556
page 557
page 558
page 559
page 560
page 561
page 562
page 563
page 564
page 565
page 566
page 567
page 568
page 569
page 570
page 571
page 572
page 573
page 574
page 575
page 576
page 577
page 578
page 579
page 580
page 581
page 582
page 583
page 584
page 585
page 586
page 587
page 588
page 589
page 590
page 591
page 592
page 593
page 594
page 595
page 596
page 597
page 598
page 599
page 600
page 601
page 602
page 603
page 604
page 605
page 606
page 607
page 608
page 609
page 610
page 611
page 612
page 613
page 614
page 615
page 616
page 617
page 618
page 619
page 620
page 621
page 622
page 623
page 624
page 625
page 626
page 627
page 628
page 629
page 630
page 631
page 632
page 633
page 634
page 635
page 636
page 637
page 638
page 639
page 640
page 641
page 642
page 643
page 644
page 645
page 646
page 647
page 648
page 649
page 650
page 651
page 652
page 653
page 654
page 655
page 656
page 657
page 658
page 659
page 660
page 661
page 662
page 663
page 664
page 665
page 666
page 667
page 668
page 669
page 670
page 671
page 672
page 673
page 674
page 675
page 676
page 677
page 678
page 679
page 680
page 681
page 682
page 683
page 684
page 685
page 686
page 687
page 688
page 689
page 690
page 691
page 692
page 693
page 694
page 695
page 696
page 697
page 698
page 699
page 700
page 701
page 702
page 703
page 704
page 705
page 706
page 707
page 708
page 709
page 710
page 711
page 712
page 713
page 714
page 715
page 716
page 717
page 718
page 719
page 720
page 721
page 722
page 723
page 724
page 725
page 726
page 727
page 728
page 729
page 730
page 731
page 732
page 733
page 734
page 735
page 736
page 737
page 738
page 739
page 740
page 741
page 742
page 743
page 744
page 745
page 746
page 747
page 748
page 749
page 750
page 751
page 752
page 753
page 754
page 755
page 756
page 757
page 758
page 759
page 760
page 761
page 762
page 763
page 764
page 765
page 766
page 767
page 768
page 769
page 770
page 771
page 772
page 773
page 774
page 775
page 776
page 777
page 778
page 779
page 780
page 781
page 782
page 783
page 784
page 785
page 786
page 787
page 788
page 789
page 790
page 791
page 792
page 793
page 794
page 795
page 796
page 797
page 798
page 799
page 800
page 801
page 802
page 803
page 804
page 805
page 806
page 807
page 808
page 809
page 810
page 811
page 812
page 813
page 814
page 815
page 816
page 817
page 818
page 819
page 820
page 821
page 822
page 823
page 824
page 825
page 826
page 827
page 828
page 829
page 830
page 831
page 832
page 833
page 834
page 835
page 836
page 837
page 838
page 839
page 840
page 841
page 842
page 843
page 844
page 845
page 846
page 847
page 848
page 849
page 850
page 851
page 852
page 853
page 854
page 855
page 856
page 857
page 858
page 859
page 860
page 861
page 862
page 863
page 864
page 865
page 866
page 867
page 868
page 869
page 870
page 871
page 872
page 873
page 874
page 875
page 876
page 877
page 878
page 879
page 880
page 881
page 882
page 883
page 884
page 885
page 886
page 887
page 888
page 889
page 890
page 891
page 892
page 893
page 894
page 895
page 896
page 897
page 898
page 899
page 900
page 901
page 902
page 903
page 904
page 905
page 906
page 907
page 908
page 909
page 910
page 911
page 912
page 913
page 914
page 915
page 916
page 917
page 918
page 919
page 920
page 921
page 922
page 923
page 924
page 925
page 926
page 927
page 928
page 929
page 930
page 931
page 932
page 933
page 934
page 935
page 936
page 937
page 938
page 939
page 940
page 941
page 942