Data Foundry Blog

What Is a Zero-Day Attack? (and How to Minimize Risk)

In the digital age when nearly every business and industry is powered by sophisticated technology, updates are a fact of life. Software developers are constantly releasing new versions of their solutions while hardware manufacturers are consistently seeking new ways to improve their products.

Read More

5 IT Infrastructure Monitoring Tools that Make Your Job Easier

IT infrastructure monitoring

IT professionals are responsible for making sure all their organization’s hardware, software and network resources are running optimally and well-secured. However, keeping up with your IT infrastructure can be challenging — especially if, like many organizations, you have a hybrid infrastructure model. Fortunately, IT infrastructure monitoring tools can provide the insight you need to monitor resources across your environment to ensure everything is working as it should.

Read More

How IoT Is Changing the Oil and Gas Industry

oil platform, oil and gas IoT

Over the past few years, the Internet of Things (IoT) has transformed the way nearly every industry transmits, collects and uses data — and the oil and gas industry is no exception.

Energy companies who’ve invested in this new technology are enjoying cost savings, better-streamlined processes, more accurate forecasts for demands and other crucial advantages. And that’s likely why global IoT in the oil and gas market is expected to reach nearly $40 billion by 2023, according to a report from BIS Research.

Read More

Secure Edge Computing Spurs Innovation for Banks & Financial Firms

IoT devices and edge computing for banks

When we think of the Internet of Things changing our lives, we often think about smart watches, smart homes and smart cars, but IoT devices are also changing banking, manufacturing and heavy industry too. The IoT and edge computing are changing the way the banking industry does business, making everyday banking, trade and wealth management more transparent, accessible and efficient for customers.

Read More

Why Data Provenance Could Be the Next Big Thing for Cybersecurity

certified authentic

Data provenance is the documentation of the origin of a data product or piece of content. Data provenance answers questions of where a particular piece of information came from, what tools were used to create it, and whether or not it was modified over time. This information is often stored in meta data and can be used to verify a data product’s authenticity.

Read More

9 Technology Trends and Predictions for 2019

technology trends 2019

It’s almost the end of another year, and predictions for 2019 tech trends are rolling in. Many of last year’s predictions rang true for 2018, including the rise of cybercrime-as-a-service, data sovereignty, and hybrid cloud connectivity. It looks like some exciting technologies will finally take off next year and become more commonplace, like augmented analytics, AI integration and edge computing. After analyzing predictions form Gartner, Forbes, Tech Republic and others, here are what we think will the top 9 predictions to watch out for in 2019.

Read More

7 DDoS Attack Trends Spotted in 2018

ddos attack trends 2018

As organizations and businesses increasingly rely on the Internet to conduct standard business operations and generate revenue, DDoS attacks (Distributed Denial of Service) are the obvious choice for malicious actors to disrupt the status quo, make a statement, and/or cause serious financial consequences for their targets. Each year, it has become easier to hire third parties online to carry out attacks for a relatively low fee. These are some of the reasons DDoS attacks continue to increase year over year. As we are approaching the end of 2018, we’ve analyzed reports from leading DDoS mitigation providers to spot the top 7 DDoS trends over the last twelve months.

Read More

6 Healthcare Technology Trends and Their Impact on IT Infrastructure

healthcare technology trends

The future of healthcare is a smart one, where patients are more involved in their treatment plans, and they can consult with a healthcare professional from the comfort of their own homes. Doctors and nurses can monitor patients’ vital signs remotely, providing patients with more efficient treatment while reducing healthcare costs for an aging population. Here are six trends showing the impact of technology in healthcare and what it means for IT infrastructure and healthcare information management.

Read More

How to Get Ahead of Digital Disruption

digital disruption

Digital disruption makes businesses more competitive for many reasons, some of which include a reduction in the need for physical assets and materials and increased efficiency and agility. For example, Nest eliminated the need to have both an HVAC and security monitoring system, smart phones took the place of calculators, alarm clocks and cameras. These innovations disrupt entire industries because they are the obvious convenient choice for consumers. They also provide agility through scalable platforms that make it easy for companies to add and offer new services.

Read More

It’s Time to Protect Our Industrial IoT: 9 Ways to Make a Difference

Industrial IoT image abstract

As some of you may already know, elections aren’t the only thing Russian hackers are meddling in. They’ve infiltrated our energy and manufacturing sectors as well. This year, the FBI and Department of Homeland Security announced Russian government actors have hacked into energy, nuclear, water and critical manufacturing sectors.  In July, they announced Russian hackers had infiltrated utility control rooms where they could have thrown switches if they chose to do so. Russia aside, it has become painfully obvious our industrial IoT (IIoT) and infrastructure are vulnerable.

Read More

Page 1 of 912345...Last »