Machine Learning

Breaking Down BEC
The Modern CISO's Framework for Identifying, Classifying and Stopping Email Fraud Business email compromise...

OWASP Top 10
The nonprofit Open Web Application Security Project (OWASP) works to improve the security of software,...

Securing web applications in healthcare
You might think that healthcare would not be a target for criminals, but WannaCry – a strain of ransomware...

The Creator Workflows reference guide
A tour of key low-code features and functionality on the Now Platform. Using the Now Platform for low-code...

Best price performance
Get the most value from your cloud infrastructure spend AWS offers the best price performance for virtually...

Managing the Cybersecurity Skills Shortage
The cybersecurity skills shortage has grown more urgent in recent months amid 'The Great Resignation'...

Refine your data strategy
Get more out of data and machine learning. Data, analytics, and machine learning have the potential to...

How Cloudflare Bot Management Works
Cloudflare Bot Management applies automated, data-driven approaches to managing bots. By applying machine...

Harden your attack surface with workflows and automation
Remote work and the acceleration of digital transformation during the COVID-19 pandemic has pushed more...

IDC Tech Spotlight: Employee Experience
A mature employee experience program can simplify workflows across interfaces, online systems, apps,...

Accelerate ML development at scale
High-performance, low-cost machine learning for any use case Thank you for your interest. Read the eBook,...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.