en flag +1 214 306 68 37

Blog

Sandra Lupanava

Sandra Lupanava

Microsoft 365 Collaboration Tools: Comprehensive Overview

SharePoint

Microsoft 365 Collaboration Tools: Comprehensive Overview

Get a detailed guide to cloud-based collaboration in Microsoft 365 and learn how to choose suitable team collaboration tools.

Dmitry Nikolaenya

Cybersecurity Expert

Magic Out-of-the-Box – Does It Apply to SIEM Solutions?

Information Security

Magic Out-of-the-Box – Does It Apply to SIEM Solutions?

Our information security consultants give you the checklist to decide whether to replace or just upcycle your out-of-the-box SIEM system

Oksana Bandura

Oksana Bandura

The Great Expectations of the ImageNet Challenge 2017

Image Analysis

The Great Expectations of the ImageNet Challenge 2017

Computer vision scientists from around the world are competing to create the most accurate image analysis algorithm.

Dmitry Nikolaenya

Cybersecurity Expert

No Wanna – No Cry or the Ways to Prevent Ransomware Attacks

Information Security

No Wanna – No Cry or the Ways to Prevent Ransomware Attacks

There are ways to prevent or, at least, minimize the harm of WannaCry or suchlike attacks, as experts providing information security consulting say.

Natallia Babrovich

Financial and Banking IT Consultant and Lead Business Analyst, ScienceSoft

How digital and physical channels impact on customer satisfaction in retail banking

Banking IT

Mobile Apps

Finance IT

How digital and physical channels impact on customer satisfaction in retail banking

To satisfy customers, retail banks have to balance between digital initiatives, such as mobile banking development, and high-quality in-branch services.

Serguei Tchesnokov

Serguei Tchesnokov

Detecting APT Activity with Network Traffic Analysis

Information Security

Detecting APT Activity with Network Traffic Analysis

APT protection has recently become a byword as thousands of organizations keep facing network intrusions. The article focuses on network traffic analysis as a major means to detect advanced persistent threats.

Anastasia Yaskevich

Web and Mobile Researcher, ScienceSoft

Consumers' Attitude to Mobile Security: RiskIQ Report Takeaways

Mobile Apps

Consumers' Attitude to Mobile Security: RiskIQ Report Takeaways

As RiskIQ introduces disturbing findings on mobile users’ attitude to security, we reflect on some possible steps to address the situation.

Sandra Lupanava

Sandra Lupanava

SharePoint Virtual Summit 2017: Will SharePoint really become a driving force for your business?

SharePoint

SharePoint Virtual Summit 2017: Will SharePoint really become a driving force for your business?

Get key takeaways from the SharePoint Virtual Summit 2017 and see what the announced updates mean for your business.

Oksana Bandura

Oksana Bandura

Computer vision takes the food industry to the next level

Image Analysis

Computer vision takes the food industry to the next level

Image analysis is changing the food industry by facilitating visual inspection of various products.