Home » Technical Topics » Data Security

Data Security

Data security is a complex area, with articles covering everything from encryption techniques to privacy compliance to intelligent access, biometrics and single sign-on solutions.

cloud computing technology concept transfer database to cloud. T

Cloud Computing Services, Features and Benefits

  • Dinesh B 

Cloud computing services have grown in popularity significantly over the years. Many sectors are moving to cloud computing services for business operations. Cloud computing enables businesses to store, manage, and process essential data using remote servers hosted on the internet.

Influencer marketing concept. Business, Technology, Internet and network concept.

Social Media Sentiment Analysis Using Twitter Datasets

Several hundreds of thousands of raw data files are uploaded by users every day to social media sites. Online user data provides access to an enormous amount of information regarding products, services, places, and events, which makes it suitable for sentiment analysis. Valuable information can be extracted by analyzing the sentiment of the data.

Silhouette of a man with a dark face. A lonely man who turns awa

Data Erasure: How to Remove your Information from the Internet?

  • Anas Baig 

Today, data has evolved into one of the most crucial resources in the world. Unlike tangible resources like wood and fuel, the same data set can be used repeatedly and for different applications. Tons of user information gets observed or generated by tech and algorithms to facilitate the personalization we see today.

hacker coding at night cybersecurity concept

9 Ways IT Can Do Proactive Cybersecurity

  • Anas Baig 

By taking a proactive approach to cybersecurity, IT departments can help protect their organizations from the ever-growing number of cyber attacks. Here are nine ways IT departments can do proactive cybersecurity.

hooded hacker solar winds hack concept

Cybercrime after COVID-19

  • Paul Cawthon 

The COVID-19 pandemic remains fresh in our memories as it affected many aspects of our lives. Cyberspace is no exception. With the imperative need to stay safe, individuals had to create alternate methods to work, school, communicate and access services. However, this period also saw cybercriminals double their efforts to exploit the situation.

blackhole

How to Make Black-box Systems more Transparent

This article is intended to users relying on machine learning solutions offered by third party vendors. It applies to platforms, dashboards, traditional software, or even external pieces of code that are too time consuming to modify. One of the goals is to turn such systems into explainable AI.

Browse By Topic