Ammar Alim Shares Insight on ‘Adversary Aware’ Applications
TechSpective Podcast Episode 104 Organizations invest signficant money and resources in cybersecurity in a constant, 24/7 battle to protect …
Reviews
Latest on TechSpective
IBM and the Emergence of Quantum Advantage
This week IBM presented a major quantum computing update, and it was a fascinating experience. IBM does a nice job …
Flawless Deepfake Audio Is a Serious Security Concern
Artificial intelligence has been around in some form for decades, but recent advances with generative AI models like OpenAI’s ChatGPT …
Standing Up a Security Program Management Office
By Ningjing Gao, Senior Group Program Manager, Security PMO Program management is not sexy — or easy. Think about it …
7 Steps to Get Your Startup Tech Company Up and Running
If you have come up with a seemingly brilliant idea for a tech company startup, the thought alone can be …
Igor Volovich Chats about Cybersecurity Compliance and Accountability
TechSpective Podcast Episode 103 Security equals compliance–at least in theory, assuming it’s effective security. But compliance doesn’t necessarily equal …
Subscribe to Our Newsletter
Technology
Virtual Reality Used to Train Future Footballers
Virtual reality has many applications, and some of them are still being …
Incorporate These New Gadgets into Your Kitchen for A Healthier You
It’s the start of a brand-new year, and more people are hoping …
Innovations and Security in Modern-Day Payment Technology
Paying someone for a business transaction of one form or another is …
How Casinos Are Embracing Cloud Computing
The shift away from land-based casinos to online gaming is happening quickly. And cloud computing has played a significant role …
IBM’s Carbon Capture Research Effort Validates Hybrid Cloud Model
I met with Mathias Steiner, who is a researcher out of the Rio de Janeiro IBM lab. He was talking …
Security
Overcoming Cyber Overwhelm: Three Security Goals to Focus on in 2023
Working in cybersecurity can be draining. It’s a high-pressure environment, and the stakes are only getting higher. A recent report found that 45% of cybersecurity professionals have considered …
5 Ways to Boost Your Business with Tech in 2023
Businesses of all sizes stand to benefit from incorporating advanced …
The Document Security Problem that the Trump and Biden Scandals Aren’t Focused On
Security is a state of mind and apparently that state …
Software
A Beginners Guide to 3D Modeling
3D modeling brings designs to life in a three-dimensional space through the manipulation of polygons, edges, and vertices in a 3D space. It can be done with the …
Hiren’s Boot CD: What it is and Why You Need it so Much
If you’ve never heard of a thing called Hiren’s Boot …
Safety, Security & Open Source in the Automotive Industry
Today’s cars are as much defined by the power of …
News & Analysis
The Amazing Success of IBM’s Mainframe
IBM just released its financials which show it has significantly outperformed its peers. Given IBM’s age, this is amazing in …
Intel and NVIDIA Partner to Create AI Powerhouse
Thanks to the recent emergence of Generative AI platforms, AI has become incredibly popular and visible of late. While much …
Apps
5 Ways to Increase Productivity in App Development
Improving the productivity of your app development team can result in higher …
How to Secure Your REST API
Application Programming Interfaces (APIs) are a set of protocols used in building …
Checkmarx Offers Holistic, Context-Aware Application Security Testing with Checkmarx Fusion
Regardless of the motivation or objectives, almost every cyberattack relies to some …