Remove 2013 Remove Data science Remove Examples Remove Mining
article thumbnail

How Are Computers Compromised (2020 Edition)

Adam Shostack

Understanding the way intrusions really happen is a long-standing interest of mine. For example, I believe that patch management is way harder than you’d believe if you read infosec twitter, but so what? Related: My 2013 SIRA talk, “ Building a Science of Security “, “ Zeroing in on Malware Propagation Methods.”

Mining 49
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.” 16 ZB (zettabytes) of data in 2006, then 2.83 So, at the outset, a good question to ask is What is DT ?