false

Muhammad Raza

Muhammad Raza is a technology writer who specializes in cybersecurity, software development and machine learning and AI.  

Learn 4 Min Read

Software-Oriented Architecture (SOA) Defined

Learn how software oriented architecture works, including its key features and characteristics. We’ll also look at how to solve common SOA limitations.
Learn 4 Min Read

Asset & Application Discovery: How It Works

Protecting and securing your IT assets starts with knowing what IT assets you have. Learn how IT asset discovery works here.
Learn 3 Min Read

Intelligent Applications Explained

Intelligent Applications are a Top 10 Strategic Tech Trend from Gartner. Learn how an app can become intelligent — and what that means for business.
Learn 4 Min Read

Secure By Design: What Makes Software SbD

As the digital landscape continues to evolve, new cyber threats continue to emerge. It’s imperative to have safeguards in place early on in the product development process. That’s where Secure by Design comes in.
Learn 4 Min Read

Information Retrieval & Intelligence: How It Works for AI

A long-standing activity in information systems, information retrieval (IR) is totally changing the game for AI. Get the full story here.
Learn 3 Min Read

Adversarial Machine Learning & Attacks on AIs

AI and ML are very useful tools, except when we realize just how vulnerable to attack they are. Learn all about adversarial attacks on ML and AI here.
Learn 10 Min Read

What is Threat Modeling?

Get started with threat modeling today. We’ll define threat modeling, discuss how it works, and share simple and advanced threat modeling frameworks.
Learn 5 Min Read

How Data Architecture Determines How Your Data Can Be Used

Data architecture determines how you can use your data. Read on to learn how to choose data storage, data pipeline and data management strategies.
Learn 4 Min Read

Secure AI System Development

CISA & NCSC have issued joint guidelines for developing secure AI systems. Let's understand these guidelines, so we can mitigate risk in AI development.
Learn 4 Min Read

Endpoints and Endpoint Detection: Importance & Risk Mapping

Endpoints sound like an afterthought...not like the most important part of your cybersecurity posture. Learn what endpoints are, and why detecting them is so important.
Learn 4 Min Read

Network Latency & How To Improve Latency

Latency is the delay that happens in computer networking. It's not easy to control, but there are ways to improve it. Get the full story here.
Learn 5 Min Read

Cyber-Physical Systems (CPS) Explained

Cyber-physical systems, CPS: the applications of cyber physical systems are almost boundless. Get the full story here.
Learn 3 Min Read

The Twofish Encryption Algorithm

Twofish is not vulnerable to a simple brute force attack, but is it the right choice for you? Get the full story here.
Learn 5 Min Read

Data Privacy: The Ultimate Guide

Data privacy awareness is on the rise, and that can mean big changes for business. Understand what data privacy might mean for you.
Learn 4 Min Read

Fault Tolerance: What It Is & How To Build It

Fault tolerance is a critical way for your business to be resilient. Learn what fault tolerance means, how to build it & how AI can help.
Learn 4 Min Read

Multi-Stage Attacks & How To Detect Them

Today's cyberattacks are sophisticated: there are multiple steps to take in order to have a huge impact. Get ahead of each step with this primer on detecting multistage attacks.
Learn 4 Min Read

The Digital Immune System (DIS) Explained

A strategic trend per Gartner, the digital immune system is a framework for ensuring your business resilience and health. Get the full story on this concept here.
Learn 4 Min Read

What Is Human Centric Software?

Human centric software is a way of designing software for both tangible metrics and harder to measure concepts like user preference & satisfaction.