by Marketing | Jul 10, 2017 | Security
American Banker recently explored the need for retailers to consider data security rules used by banks in order to reduce security breaches. From the article: “Target’s recent settlement with 47 states and the District of Columbia over the retailer’s 2013 data breach...
by Marketing | Jun 22, 2017 | Uncategorized
Cyber criminals can be extremely difficult to detect, but there’s one growing source of security that might be able to fight back: machine learning. Machine learning is a type of artificial intelligence (AI) that gives computers the ability to learn without being...
by Marketing | Jun 1, 2017 | Uncategorized
In April, CHI Corporation had the opportunity to host a webinar on eliminating database issues with our partners Kaminario, the leader in all-flash storage, and Soaring Eagle Database Consulting. The webinar features input and commentary from Jeff Garbus, CEO/Founder...
by Paul Comfort | May 17, 2017 | Security
What makes me want to cry is how much this whole thing has been blown out of proportion by people sensationalizing it for various reasons, be it for advertising views, pushing product, or trying to incite panic. There are some things that make this different. These...
by Marketing | May 10, 2017 | Networking, Security
Are you leading with endpoint security? If end-user devices are not secured, any smartphone, tablet or laptop becomes a potential entry point for a cyber threat. Business Solutions recapped some of the top reasons to lead with endpoint security, particularly for small...
by Marketing | Apr 27, 2017 | Security
The 2017 IBM X-Force Threat Intelligence Index reported more than 4 billion records leaked in 2016, a number that was more than the combined total of the previous 2 years. A recent article from IBM’s Security Intelligence blog calculated the losses at more than $630...
by Marketing | Apr 10, 2017 | Uncategorized
We live in a highly interconnected world, relying on devices every day—and not just our mobile phones. Other popular devices include baby monitors, security cameras, routers and our vehicles. Unknown to the owner, some of these devices are sold to consumers with...
by Marketing | Mar 16, 2017 | Security
Ransomware is expanding to a new target. “Ransomware gangs have moved from consumer computers to health care networks, and they are likely to go after manufacturing companies next, according to researchers at the Georgia Institute of Technology.” – InfoWorld Many of...
by Marketing | Mar 2, 2017 | Storage
It may be hard for some of us to imagine, but a day will come when the majority of cars on our roads and highways are driving themselves. These autonomous, or self-driving, cars have the capability of sensing their environment and navigating without human input...
by Rob Oddo | Feb 8, 2017 | Security
Many vendors today are leveraging ransomware as a sales opportunity. I recently had a conversation with Paul Comfort, our security expert here at Chi, and he provided some practical thoughts about ransomware that I felt were worth sharing. To many, this may seem like...