
Search > overlooking


Loopbreak.gg shines a light on Black stories in gaming | Donovan Erskine interview

Guest
The ChatGPT buzz and why it will be over sooner than you think

Guest
Avoiding the dangers of generative AI

Guest
A SaaS leader’s guide to pricing in 2023

Super Nintendo World is an IRL game, interactive and replayable

What are the dos and don’ts for success with low-code/no-code platforms?

How monitoring libraries rather than containers is key to open-source security

5 steps to deal with the inevitable data breaches of 2023

Real-time data and AI thrust manufacturing into the future

Guest
5 ways to use social commerce to maximize sales and brand impact

Guest
How endpoint management can transform retail

USPS signs data management contract worth up to $70M with Veritas Technologies

Gartner report shows zero trust isn’t a silver bullet

One-third of orgs don’t take cyberwarfare seriously despite the Russia-Ukraine war

50% of orgs report experiencing data breaches due to exposed API secrets

Guest
How startups can help you win the talent war with tailored employee benefits

OpenAI, Georgetown, Stanford study finds LLMs can boost public opinion manipulation

Why enterprises can’t afford to overlook API security in 2023

GamesBeat managing editor Mike Minotti’s top 10 games of 2022

Ranking every 2022 game I played (all 70 of them)| Kaser Focus

Why the industrial metaverse will eclipse the consumer one

Protecting your organization from rising software supply chain attacks

Guest
Why enterprise giants can’t escape cybersecurity breaches

Guest
Why ‘quiet quitting’ could fuel the next major cybersecurity breach

Gemini, Uber data breaches show third-party risk can’t be ignored

Shopping-related fraud: The coal in retailers’ stockings this holiday season

Uber breach shows third-party vendors are the weakest link

Sponsored
Human vs AI: For CFOs, it should be humans AND AI

Guest
Better together: Offsetting cybersecurity’s labor challenges with API integrations

What is risk-based vulnerability management?

Using PAM to secure digital identities, SPHERE announces $31M in funding

‘Quiet quitting’ poses a cybersecurity risk that calls for a shift in workplace culture

Guest
Feed your developers’ curiosity before it’s too late

Guest
Security and HR teams must work together in a hybrid work world

How zero-trust methods thwart malicious hackers

Why enterprises are getting zero trust wrong

Call of Duty: Warzone 2.0 features Al Mazrah map and DMZ extraction mode

How Apiiro leverages application security for the software supply chain

Guest