The cybersecurity trends organizations will soon be dealing with

In this interview with Help net Security, Brad Jones, VP of Information Security at Seagate Technology, talks about cybersecurity trends organizations will be dealing with soon, particlularly concerning cloud misconfiguration, data classification, software vulnerabilities, and the cybersecurity skills gap. Cybersecurity risks are an ever-evolving issue for all organizations. What are the main ones we are […]

Continue Reading

ODD Platform: Open-source data discovery and observability

Provectus released v0.8 of its Open Data Discovery Platform (ODDP), an open-source platform that helps data-driven enterprises democratize their data. Designed to overcome the limitations of conventional data catalogs, ODD helps to standardize data collection, improves compatibility of different catalogs, expands data lineage capabilities, and enhances data quality and observability. The latest version introduces enhanced […]

Continue Reading

Open source tool puts machine learning dataset analysis at data scientists’ fingertips

Comet released Kangas, an open-source smart data exploration, analysis and model debugging tool for machine learning. Kangas, available on GitHub, helps users understand and debug their data in a new and highly intuitive way. With Kangas, visualizations are generated in real-time; enabling ML practitioners to group, sort, filter, query and interpret their structured and unstructured […]

Continue Reading

Product showcase: ESET’s newest consumer offerings

It’s no secret that antivirus software is as essential to your computer as a power cord. However, the threats don’t stop at your devices. For example, criminals that are trying to steal your data can attack your Wi-Fi router, and phishing attempts can target your email. ESET’s newest consumer product release takes a comprehensive approach […]

Continue Reading

5 Kali Linux tools you should learn how to use

Kali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. Kali Linux also comes with several hundred specialized tools for carrying out penetration testing, security research, computer forensics, reverse engineering, vulnerability management, and red team testing. Here are 5 you should […]

Continue Reading